<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.0.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="-o*+"?>
<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-cose-key-thumbprint-05" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="COSE Key Thumbprint">CBOR Object Signing and Encryption (COSE) Key Thumbprint</title>

    <author initials="K." surname="Isobe" fullname="Kohei Isobe">
      <organization>SECOM CO., LTD.</organization>
      <address>
        <email>isobekohei@gmail.com</email>
      </address>
    </author>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization></organization>
      <address>
        <email>hannes.tschofenig@gmx.net</email>
      </address>
    </author>
    <author initials="O." surname="Steele" fullname="Orie Steele">
      <organization>Transmute</organization>
      <address>
        <postal>
          <country>United States</country>
        </postal>
        <email>orie@transmute.industries</email>
      </address>
    </author>

    <date year="2024" month="July" day="08"/>

    <area>Security</area>
    <workgroup>COSE</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 66?>

<t>This specification defines a method for computing a hash value over a
CBOR Object Signing and Encryption (COSE) Key. It defines which fields
in a COSE Key structure are used in the
hash computation, the method of creating a canonical form of the fields,
and how to hash the byte sequence. The resulting hash value can be used
for identifying or selecting a key that is the subject of the thumbprint.</t>



    </abstract>



  </front>

  <middle>


<?line 75?>

<section anchor="introduction"><name>Introduction</name>

<t>This specification defines a method for applying a cryptographic hash function
(a.k.a. thumbprint) to a CBOR Object Signing and Encryption (COSE) Key structure
<xref target="RFC9052"/>.  It defines which fields
in a COSE Key structure are used in the hash computation, the method of creating
a canonical form for those fields, and how to hash the byte sequence.  The resulting
hash value can be used for identifying or selecting the key that is the subject of
the thumbprint, for instance, by using the COSE Key Thumbprint value as a "kid"
(key ID) value. The use of the thumbprint of the key as a naming scheme is one
of the main use cases of this document. Another use case are key derivation
functions that utilize the thumbprints of the public keys of the endpoints,
as well as other context, to the derived symmetric key.</t>

<t>This specification defines how thumbprints of COSE keys are created, see
<xref target="thumbprint"/> and <xref target="required"/>.
Additionally, a new CBOR Web Token (CWT) confirmation method is added to the
IANA "CWT Confirmation Methods" registry created by <xref target="RFC8747"/>. See Section 3.1 of
<xref target="RFC8747"/> for details about the use of a confirmation claim in a CWT
with a proof-of-possession key.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all
capitals, as shown here.</t>

</section>
<section anchor="thumbprint"><name>COSE Key Thumbprint</name>

<t>The thumbprint of a COSE Key MUST be computed as follows:</t>

<t><list style="numbers" type="1">
  <t>Construct a COSE_Key structure (see Section 7 of <xref target="RFC9052"/>) containing
only the required parameters representing the key as described in 
Section 4 of this document.</t>
  <t>Apply the deterministic encoding described in Section 4.2.1 of <xref target="RFC8949"/>
to the representation constructed in step (1).</t>
  <t>Hash the bytes produced in step (2) with a cryptographic hash function H.
For example, SHA-256 <xref target="RFC6234"/> may be used as a hash function.</t>
</list></t>

<t>The resulting value is the COSE Key Thumbprint with H of the COSE Key. The
details of this computation are further described in subsequent
sections.</t>

<t>The SHA-256 hash algorithm MUST be supported, other algorithms MAY be supported.</t>

</section>
<section anchor="required"><name>Required COSE Key Parameters</name>

<t>Only the required parameters of a key's representation are used when
computing its COSE Key Thumbprint value. This section summarizes the
required parameters.</t>

<t>The "kty" (label: 1) element MUST be present for all key types and the integer
value found in the IANA COSE Key Types registry MUST be used. The tstr data
type is not used with the kty element.</t>

<t>Many COSE Key parameters depend on the chosen key type. The subsection below list
the required parameters for commonly used key types.</t>

<section anchor="octet-key-pair-okp"><name>Octet Key Pair (OKP)</name>

<t>The required parameters for elliptic curve public keys that use the OKP key type,
such as X25519, are:</t>

<t><list style="symbols">
  <t>"kty" (label: 1, data type: int, value: 1)</t>
  <t>"crv" (label: -1, value: int)</t>
  <t>"x" (label: -2, value: bstr)</t>
</list></t>

<t>Details can be found in Section 7.1 of <xref target="RFC9053"/>.</t>

</section>
<section anchor="ecc"><name>Elliptic Curve Keys with X- and Y-Coordinate Pair</name>

<t>The required parameters for elliptic curve public keys that use the EC2 key type, such
as NIST P-256, are:</t>

<t><list style="symbols">
  <t>"kty" (label: 1, data type: int, value: 2)</t>
  <t>"crv" (label: -1, data type: int)</t>
  <t>"x" (label: -2, data type: bstr)</t>
  <t>"y" (label: -3, data type: bstr)</t>
</list></t>

<t>Details can be found in Section 7.1 of <xref target="RFC9053"/>.</t>

<t>Note: <xref target="RFC9052"/> offers both compressed as well as uncompressed point
representations. For interoperability, implementations following this
specification MUST use the uncompressed point representation. Hence,
the y-coordinate is expressed as a bstr. An implementation that uses
the compressed point representation MUST compute the uncompressed
representation for the purpose of the thumbprint calculation.</t>

</section>
<section anchor="rsa-public-keys"><name>RSA Public Keys</name>

<t>The required parameters for an RSA public key are:</t>

<t><list style="symbols">
  <t>"kty" (label: 1, data type: int, value: 3)</t>
  <t>"n" (label: -1, data type: bstr)</t>
  <t>"e" (label: -2, data type: bstr)</t>
</list></t>

</section>
<section anchor="symmetric-keys"><name>Symmetric Keys</name>

<t>The required parameters for a symmetric key are:</t>

<t><list style="symbols">
  <t>"kty" (label: 1, data type: int, value: 4)</t>
  <t>"k" (label: -1, data type: bstr)</t>
</list></t>

</section>
<section anchor="hss-lms"><name>HSS-LMS</name>

<t>The required parameters for HSS-LMS keys are:</t>

<t><list style="symbols">
  <t>"kty" (label: 1, data type: int, value: 5)</t>
  <t>"pub" (label: -1, data type: bstr)</t>
</list></t>

</section>
<section anchor="others"><name>Others</name>

<t>As other key type values are defined, the specifications
defining them should be similarly consulted to determine which
parameters, in addition to the "kty" element, are required.</t>

</section>
</section>
<section anchor="miscellaneous-considerations"><name>Miscellaneous Considerations</name>

<section anchor="why-not-include-optional-cose-key-parameters"><name>Why Not Include Optional COSE Key Parameters?</name>

<t>Optional parameters of COSE Keys are intentionally not included in the
COSE Key Thumbprint computation so that their absence or presence
in the COSE Key does not alter the resulting value.  The COSE Key
Thumbprint value is a digest of the parameters required to represent
the key as a COSE Key -- not of additional data that may also
accompany the key.</t>

<t>Optional parameters are not included so that the COSE Key Thumbprint refers
to a key -- not a key with an associated set of key attributes.
Different application contexts might or might not include different
subsets of optional attributes about the key in the COSE Key structure.
If these were included in the calculation of the COSE Key Thumbprint,
the values would be different for those COSE Keys, even though the keys
are the same. The benefit of including only the required parameters is that the
COSE Key Thumbprint of any COSE Key representing the key remains the same,
regardless of any other attributes that are present.</t>

<t>Different kinds of thumbprints could be defined by other specifications
that might include some or all additional COSE Key parameters, if use
cases arise where such different kinds of thumbprints would be useful.</t>

</section>
<section anchor="selection-of-hash-function"><name>Selection of Hash Function</name>

<t>A specific hash function must be chosen by an application to compute
the hash value of the hash input.  For example, SHA-256 <xref target="RFC6234"/> might
be used as the hash function by the application.  While SHA-256 is a
good default choice at the time of writing, the hash function of
choice can be expected to change over time as the cryptographic
landscape evolves.</t>

<t>Note that in many cases, only the party that creates a key will need
to know the hash function used.  A typical usage is for the producer
of the key to use the thumbprint value as a "kid" (key ID) value. In
this case, the consumer of the "kid" treats it as an opaque value that
it uses to select the key.</t>

<t>However, in some cases, multiple parties will be reproducing the COSE Key
Thumbprint calculation and comparing the results.  In these cases,
the parties will need to know which hash function was used and use
the same one.</t>

</section>
<section anchor="thumbprints-of-keys-not-in-cose-key-format"><name>Thumbprints of Keys Not in COSE Key Format</name>

<t>Keys that are in other formats can be represented as COSE Keys.
Any party in possession of COSE Keys can use the COSE Key Thumbprint.</t>

</section>
<section anchor="relationship-to-digests-of-x509-values"><name>Relationship to Digests of X.509 Values</name>

<t>COSE Key Thumbprint values are computed on the COSE Key object required to
represent a key, rather than all parameters of a COSE Key that the key is
represented in.  Thus, they are more analogous to applications that
use digests of X.509 Subject Public Key Info (SPKI) values, which are
defined in Section 4.1.2.7 of <xref target="RFC5280"/>, than to applications that
use digests of complete certificate values, as the "x5t" (X.509
certificate SHA-1 thumbprint) <xref target="RFC9360"/> value defined for X.509
certificate objects does.  While logically equivalent to a digest of
the SPKI representation of the key, a COSE Key Thumbprint is computed over
the CBOR representation of that key, rather than over an ASN.1
representation of it.</t>

</section>
<section anchor="confirmation-method"><name>Confirmation Method</name>

<t><xref target="RFC8747"/> introduced confirmation methods for use with CBOR
Web Tokens (CWTs) with the addition of the "cnf" claim. CWTs have
been defined in <xref target="RFC8392"/>. This specification adds a new
confirmation method based on COSE Key Thumbprints.</t>

<t>The proof-of-possession key is identified using the "ckt" claim,
the COSE Key Thumbprint claim. This claim contains the value of
the COSE Key Thumbprint encoded as a binary string. Instead of
communicating the actual COSE Key only the thumbprint is conveyed.
This approach assumes that the recipient is able to obtain the
identified COSE Key using the thumbprint contained in the "ckt"
claim. In this approach, the issuer of a CWT declares that the
presenter possesses a particular key and that the recipient
can cryptographically confirm the presenter's proof of possession
of the key by including a "ckt" claim in the CWT.</t>

<t>The following example demonstrates the use of the "ckt" claim
in a CWT as part of the confirmation method (with line-breaks inserted
for editorial reasons):</t>

<figure><artwork><![CDATA[
   {
    /iss/ 1 : "coaps://as.example.com",
    /aud/ 3 : "coaps://resource.example.org",
    /exp/ 4 : 1361398824,
    /cnf/ 8 : {
      /ckt/ [[TBD1]] : h'496bd8afadf307e5b08c64b0421bf9dc
                  01528a344a43bda88fadd1669da253ec'
     }
   }
]]></artwork></figure>

<t><xref target="IANA"/> registers the "ckt" claim and the confirmation method.
The "ckt" claim is expected to be used in the "cnf" claim.</t>

</section>
<section anchor="cose-key-thumbprint-uris"><name>COSE Key Thumbprint URIs</name>

<t>This specification defines Uniform Resource Identifiers (URIs)
to represent a COSE Key Thumbprint value. The design follows
the work of the JSON Web Key (JWK) Thumbprint URIs, specified
in <xref target="RFC9278"/>. This enables COSE Key Thumbprints to be used,
for example, as key identifiers in contexts requiring URIs.
This specification defines a URI prefix indicating that the
portion of the URI following the prefix is a COSE Key Thumbprint.</t>

<t>The following URI prefix is defined to indicate that the portion
of the URI following the prefix is a COSE Key Thumbprint:</t>

<figure><artwork><![CDATA[
  urn:ietf:params:oauth:ckt
]]></artwork></figure>

<t>To make the hash algorithm being used explicit in a URI, the prefix
is followed by a hash algorithm identifier and a COSE Key Thumbprint
value, each separated by a colon character to form a URI representing
a COSE Key Thumbprint.</t>

<t>Hash algorithm identifiers used in COSE Key Thumbprint URIs MUST be values
from the "Hash Name String" column in the IANA "Named Information
Hash Algorithm Registry" <xref target="IANA.Hash.Algorithms"/>. COSE Key Thumbprint URIs
with hash algorithm identifiers not found in this registry are not
considered valid and applications will need to detect and handle this
error, should it occur.</t>

<t>Since the URN is encoded as a string, the output of the COSE Key
Thumbprint computation described in <xref target="thumbprint"/> MUST be base64url
encoded without padding.</t>

<t><xref target="RFC7515"/> specifies Base64url encoding as follows:</t>

<t>"Base64 encoding using the URL- and filename-safe character set
defined in Section 5 of RFC 4648 <xref target="RFC4648"/>, with all trailing '='
characters omitted and without the inclusion of any line breaks,
whitespace, or other additional characters.  Note that the base64url
encoding of the empty octet sequence is the empty string.
(See Appendix C of <xref target="RFC7515"/> for notes on implementing base64url
encoding without padding.)"</t>

<t>The base64url encoding of the thumbprint shown in <xref target="example"/> is
shown below (with a line-break added for readability purposes).</t>

<figure><artwork><![CDATA[
SWvYr63zB-WwjGSwQhv53AFSijRKQ72oj63RZp2iU-w
]]></artwork></figure>

<t>The full example of a COSE Key Thumbprint URI is shown below, again
with a line-break added.</t>

<figure><artwork><![CDATA[
urn:ietf:params:oauth:ckt:sha-256:
SWvYr63zB-WwjGSwQhv53AFSijRKQ72oj63RZp2iU-w
]]></artwork></figure>

</section>
</section>
<section anchor="example"><name>Example</name>

<t>This section demonstrates the COSE Key Thumbprint computation for the
following example COSE Key containing an ECC public key.</t>

<t>For better readability, the example is first presented in CBOR diagnostic format (with
the long line broken for display purposes only).</t>

<figure><artwork><![CDATA[
  {
    / kty set to EC2 = Elliptic Curve Keys /
    1:2,
    / crv set to P-256 /
    -1:1,
    / public key: x-coordinate /
    -2:h'65eda5a12577c2bae829437fe338701a10aaa375e1bb5b5de108de439c0
8551d',
    / public key: y-coordinate /
    -3:h'1e52ed75701163f7f9e40ddf9f341b3dc9ba860af7e0ca7ca7e9eecd008
4d19c',
    / kid is bstr, not used in COSE Key Thumbprint /
    2:h'1decade2facade3'
  }
]]></artwork></figure>

<t>The example above corresponds to the following CBOR encoding
(with link breaks added for display purposes only):</t>

<figure><artwork><![CDATA[
A50102200121582065EDA5A12577C2BAE829437FE338701A10AAA375E1BB5B5DE108D
E439C08551D2258201E52ED75701163F7F9E40DDF9F341B3DC9BA860AF7E0CA7CA7E9
EECD0084D19C0258246D65726961646F632E6272616E64796275636B406275636B6C6
16E642E6578616D706C65
]]></artwork></figure>

<t>Not all of the parameters from the example above are used in the COSE Key
Thumbprint computation since the required parameters of an elliptic curve
public key are (as listed in <xref target="ecc"/>) "kty", "crv", "x", and "y".</t>

<t>The resulting COSE Key structure, in CBOR diagnostic format with
line-breaks added for better readability, with the minimum parameters
in the correct order are.</t>

<figure><artwork><![CDATA[
{
   1:2,
  -1:1,
  -2:h'65eda5a12577c2bae829437fe338701a
       10aaa375e1bb5b5de108de439c08551d',
  -3:h'1e52ed75701163f7f9e40ddf9f341b3d
       c9ba860af7e0ca7ca7e9eecd0084d19c'
}
]]></artwork></figure>

<t>In CBOR encoding the result is (with line-breaks added for display
purposes only):</t>

<figure><artwork><![CDATA[
A40102200121582065EDA5A12577C2BAE829437FE338701A10AAA375E1BB5B5DE
108DE439C08551D2258201E52ED75701163F7F9E40DDF9F341B3DC9BA860AF7E0
CA7CA7E9EECD0084D19C
]]></artwork></figure>

<t>Using SHA-256, the resulting thumbprint is:</t>

<figure><artwork><![CDATA[
496bd8afadf307e5b08c64b0421bf9dc01528a344a43bda88fadd1669da253ec
]]></artwork></figure>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>A COSE Key Thumbprint will only uniquely identify a particular key if a
single unambiguous COSE Key representation for that key is defined and
used when computing the COSE Key Thumbprint.</t>

<t>If two asymmetric keys are used by different parties with different
key identifiers then the COSE Key Thumbprints will still be equal since
the key identifier itself is not included in the thumbprint calculation
(similarly to other optional parameters in the COSE_Key structure).
When the inclusion of certain optional parameters in the thumbprint
calcuation is important for a given application, this specification
is not the appropriate choice.</t>

<t>While thumbprint values are useful for identifying legitimate keys,
comparing thumbprint values is not a reliable means of excluding the
use of particular keys (or transformations thereof). The reason is
that an attacker may supply a key that is a transformation of a key
in order to have it appear to be a different key.  For instance, if
a legitimate RSA key uses a modulus value N and an attacker supplies
a key with modulus 3*N, the modified key would still work about 1/3
of the time, but would appear to be a different key.</t>

<t>Producing thumbprints of symmetric keys needs to be done with care. Developers
MUST ensure that the symmetric key has sufficient entropy to prevent
attackers to precompute tables of symmetric keys with their corresponding
hash values. This can be prevented if the symmetric key is a randomly
selected key of at least 128 bit length. Thumbprints MUST NOT be used 
with passwords or other low-entropy secrets. If a
developer is unable to determine whether all symmetric keys used in an
application have sufficient entropy, then thumbprints of symmetric keys
MUST NOT be used. In general, using thumbprints of symmetric keys should
only be used in special applications. In most other deployment scenarios
it is more appropriate to utilize a different naming scheme for key
identifiers.</t>

</section>
<section anchor="IANA"><name>IANA Considerations</name>

<t>IANA is requested to add the following entry to the IANA "CWT Confirmation
Methods" registry established by <xref target="RFC8747"/>:</t>

<t><list style="symbols">
  <t>Confirmation Method Name: ckt</t>
  <t>Confirmation Method Description: COSE Key SHA-256 Thumbprint</t>
  <t>JWT Confirmation Method Name: jkt</t>
  <t>Confirmation Key: [[TBD1]]</t>
  <t>Confirmation Value Type(s): binary string</t>
  <t>Change Controller: IETF</t>
  <t>Specification Document(s): [[This document]]</t>
</list></t>

<t>Furthermore, IANA is requested to add a value to the IANA "OAuth URI" registry
established with <xref target="RFC6755"/>:</t>

<t><list style="symbols">
  <t>URN:  urn:ietf:params:oauth:ckt</t>
  <t>Common Name:  COSE Key Thumbprint URI</t>
  <t>Change controller:  IETF</t>
  <t>Specification Document:  [[This document]]</t>
</list></t>

</section>
<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>We would like to thank the authors of <xref target="RFC7638"/> for their work on the
JSON Web Key (JWK) Thumbprint specification. This document applies JWK
Thumbprints to COSE Key structures.</t>

<t>Additionally, we would like to thank Carsten Bormann, Ilari Liusvaara,
Laurence Lundblade, Daisuke Ajitomi, Michael Richardson, Michael B. Jones,
Mallory Knodel, Joel Jaeggli, and Brendan Moran for their feedback.</t>

</section>


  </middle>

  <back>


    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8949">
  <front>
    <title>Concise Binary Object Representation (CBOR)</title>
    <author fullname="C. Bormann" initials="C." surname="Bormann"/>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="December" year="2020"/>
    <abstract>
      <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
      <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="94"/>
  <seriesInfo name="RFC" value="8949"/>
  <seriesInfo name="DOI" value="10.17487/RFC8949"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>

<reference anchor="RFC9052">
  <front>
    <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="August" year="2022"/>
    <abstract>
      <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
      <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="96"/>
  <seriesInfo name="RFC" value="9052"/>
  <seriesInfo name="DOI" value="10.17487/RFC9052"/>
</reference>

<reference anchor="RFC9053">
  <front>
    <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="August" year="2022"/>
    <abstract>
      <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
      <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9053"/>
  <seriesInfo name="DOI" value="10.17487/RFC9053"/>
</reference>

<reference anchor="RFC8747">
  <front>
    <title>Proof-of-Possession Key Semantics for CBOR Web Tokens (CWTs)</title>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <author fullname="L. Seitz" initials="L." surname="Seitz"/>
    <author fullname="G. Selander" initials="G." surname="Selander"/>
    <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
    <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
    <date month="March" year="2020"/>
    <abstract>
      <t>This specification describes how to declare in a CBOR Web Token (CWT) (which is defined by RFC 8392) that the presenter of the CWT possesses a particular proof-of-possession key. Being able to prove possession of a key is also sometimes described as being the holder-of-key. This specification provides equivalent functionality to "Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs)" (RFC 7800) but using Concise Binary Object Representation (CBOR) and CWTs rather than JavaScript Object Notation (JSON) and JSON Web Tokens (JWTs).</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8747"/>
  <seriesInfo name="DOI" value="10.17487/RFC8747"/>
</reference>

<reference anchor="RFC8392">
  <front>
    <title>CBOR Web Token (CWT)</title>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
    <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
    <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
    <date month="May" year="2018"/>
    <abstract>
      <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8392"/>
  <seriesInfo name="DOI" value="10.17487/RFC8392"/>
</reference>

<reference anchor="RFC7515">
  <front>
    <title>JSON Web Signature (JWS)</title>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <author fullname="J. Bradley" initials="J." surname="Bradley"/>
    <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
    <date month="May" year="2015"/>
    <abstract>
      <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7515"/>
  <seriesInfo name="DOI" value="10.17487/RFC7515"/>
</reference>

<reference anchor="RFC4648">
  <front>
    <title>The Base16, Base32, and Base64 Data Encodings</title>
    <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
    <date month="October" year="2006"/>
    <abstract>
      <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4648"/>
  <seriesInfo name="DOI" value="10.17487/RFC4648"/>
</reference>

<reference anchor="RFC6755">
  <front>
    <title>An IETF URN Sub-Namespace for OAuth</title>
    <author fullname="B. Campbell" initials="B." surname="Campbell"/>
    <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
    <date month="October" year="2012"/>
    <abstract>
      <t>This document establishes an IETF URN Sub-namespace for use with OAuth-related specifications. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6755"/>
  <seriesInfo name="DOI" value="10.17487/RFC6755"/>
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC7638">
  <front>
    <title>JSON Web Key (JWK) Thumbprint</title>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
    <date month="September" year="2015"/>
    <abstract>
      <t>This specification defines a method for computing a hash value over a JSON Web Key (JWK). It defines which fields in a JWK are used in the hash computation, the method of creating a canonical form for those fields, and how to convert the resulting Unicode string into a byte sequence to be hashed. The resulting hash value can be used for identifying or selecting the key represented by the JWK that is the subject of the thumbprint.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7638"/>
  <seriesInfo name="DOI" value="10.17487/RFC7638"/>
</reference>

<reference anchor="RFC6234">
  <front>
    <title>US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF)</title>
    <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
    <author fullname="T. Hansen" initials="T." surname="Hansen"/>
    <date month="May" year="2011"/>
    <abstract>
      <t>Federal Information Processing Standard, FIPS</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6234"/>
  <seriesInfo name="DOI" value="10.17487/RFC6234"/>
</reference>

<reference anchor="RFC5280">
  <front>
    <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
    <author fullname="D. Cooper" initials="D." surname="Cooper"/>
    <author fullname="S. Santesson" initials="S." surname="Santesson"/>
    <author fullname="S. Farrell" initials="S." surname="Farrell"/>
    <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <author fullname="W. Polk" initials="W." surname="Polk"/>
    <date month="May" year="2008"/>
    <abstract>
      <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5280"/>
  <seriesInfo name="DOI" value="10.17487/RFC5280"/>
</reference>

<reference anchor="RFC9360">
  <front>
    <title>CBOR Object Signing and Encryption (COSE): Header Parameters for Carrying and Referencing X.509 Certificates</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="February" year="2023"/>
    <abstract>
      <t>The CBOR Object Signing and Encryption (COSE) message structure uses references to keys in general. For some algorithms, additional properties are defined that carry parameters relating to keys as needed. The COSE Key structure is used for transporting keys outside of COSE messages. This document extends the way that keys can be identified and transported by providing attributes that refer to or contain X.509 certificates.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9360"/>
  <seriesInfo name="DOI" value="10.17487/RFC9360"/>
</reference>

<reference anchor="RFC9278">
  <front>
    <title>JWK Thumbprint URI</title>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <author fullname="K. Yasuda" initials="K." surname="Yasuda"/>
    <date month="August" year="2022"/>
    <abstract>
      <t>This specification registers a kind of URI that represents a JSON Web Key (JWK) Thumbprint value. JWK Thumbprints are defined in RFC 7638. This enables JWK Thumbprints to be used, for instance, as key identifiers in contexts requiring URIs.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9278"/>
  <seriesInfo name="DOI" value="10.17487/RFC9278"/>
</reference>


<reference anchor="IANA.Hash.Algorithms" target="https://www.iana.org/assignments/named-information">
  <front>
    <title>Named Information Hash Algorithm Registry</title>
    <author >
      <organization></organization>
    </author>
    <date />
  </front>
</reference>


    </references>



  </back>

<!-- ##markdown-source:
H4sIAAAAAAAAA61c63PbupX/rhn9D1jnQ+yupOhtWzOdrfza+CaxU9vZtNvp
dCASknBNkSpB2VEz6d++5wGAoEQn6e127vTKEggcnMfvPHnb7XazUegiURNx
fnZ7J25nv6qoEPd6kep0IWQai8s0yrfrQmepODy/vb88Eu/UVjwsN6vZOtdp
0WzI2SxXT7AD/Lr3Y5xFqVzB/nEu50Vbq2LejjKj2o9q2y78wnZ31GxEslCL
LN9OhCniZqPZ0Ot8Iop8Y4p+t3va7cNZuZITca+iTa6LbbPxnOWPizzbrPn4
ZgO2he/iibhOC5Wnqmhf4MG4myngPn+TSZYCOVtlmo21njQbQuTzSMWm2Cbu
eyGKLAo/6zRWaeG/MVle5Gpuyi+2q+rfRa6jcn2UrVbwfPm7ThOdBqepL0U7
0aZow0azLIGF7ex3/4k/Af9Wcr0GadjVwINNscxypLyNK3A3eOBdR1ybbKb4
K+b5u2ypdPi1WkmdTITGbx7xxz8s8JsOEMgLshzOub88v/0A/Oy0xPuHiw6e
WTnqbUc8mGiZzVWqF+F5b2WaKrP3oz11Sb92Cv8rHP6lAyLaO+C2I+4LpZLK
ZW5zrSpfA60y1f+QqJsT8ZDL1Kw2RfWmGTz0h8L91AE5blA2zHYUzCYtUOE+
pbpQMWwPKkhMTrN8BTs/KdKQu6vzfq936j6fnA7Lz73joft82h31g88Dv+Z4
eOw/D079muNRb+Q+D8fDkwkpfTrfPft4PDhxn8f9gT9v1D/p+vMG4/Jz/5jX
X09vpp230iw70wQsSxfLlZnw1YW1+4Mb4G4M5mJPBTvHB4R/QNypBahmvj1w
D8p8oUC5l0WxNpM3b56fnztaprIDAnkjjQHwIG1/g3KL27rc2W4QA5MnYi4T
o/DC7XZbyBmcICNShYelNsKsVaTnOmKKYjXXqFlSrBQofyxgS7Sq9aYgnALd
ApKfZLJRIntSuZDNxr8EaGA8hT/leamjpZhrlcQG5QH7e2wDMjdRscmVACgS
GwOsgwXFEm5CNDBRRHULv3YEZ3MRAXZZciOZZilcLsGLrPBHXMontsDCgcxl
9gzIwxfDH2fbQgmj/r5RaaTAAOGrXJlNQjsG14etxYwpazaQTRqhS8+3uA7+
NGA/kSUDwBL2lgUAAp1hNswuS08Jzx0np5WO44Sk9goRNs9i4AZJ9uflBnCW
bC0fUBLZIpdrYDnfYr5J7Y6HsvPYkZ2AjCPkiPwXXZWXWLPx9as10m/fOuLf
lrj4WYGDQHcljnyAZcYLXfyEzKtCtwq3J3XxXaHjti+LHaKBitxbvFmKrjNS
LSAIjnDb1Ph7S41EiR886hgg4xBPu7444p9YcYHMfR1z3+B62gDgA48Cd6FW
CmkFx91s2FUA7yntE0kDAqRvYQm4yw2CT0dM0wzW5X4NSQ/3jlWunywcOWUz
zA9Ak0T/Q+0QZhxl680sATWFTfxXKo3XGa5BqwU9UkmCxPPRUZaiZ2+hTHEx
nQwCAicPSpLzVp0fmA7pRJUWYjxRgXciLVNxC4RMKl4u/vaNtOrr1xxUSOcq
BrVvNqZxrPEEmSTbFrJZPbNFfVYz8ZA9KrSezw9HSP5cO59gtRrIlHEMd+Ar
NRvoYcQBrBfn4fIPtNwcgLqy83BkogqRGaJPRDO8VwrjOXpq0OmREgYLSAFj
VYA3h6Nn2aYgVloNklUio0TqlWDz/fwA0SH4L/i8zrNs3oZ/1pkBZTG41HH+
lXhQOehZlmSLLYuC1QSjSCMOPny6fzho8b/FzS19vrv846fru8sL/Hz/dvr+
vf/AK5oN+Ov203u7AD+Vj0Jo9eHy5oKfhm/Fzlcfpn8+IDSAXW4/Plzf3kzf
HzDiBPpNkgcZgM1rDHTXuULmgurFykS5nhFKNRtn5x9Fb8gcxwgGGMrMhagF
Pj8vVcrQk6XJ1v4J/N0iSCuZEy+TBEPztS7AYbfwCAM6mQrQcGVZWIcEX18F
iugYW7X2AGSJvXAZRlO+yTxLkuzZUFDU66B+MRTb5/5WBedDEyjSMW4foD0p
M+hQSriJsSNetyA4ZdMQa5lDuAKsNPAdsNMggAaAucNaQdu484b7AIRU9wGG
0NlZ6y9I08AcwPIB0bMY969s6vfr9MkUrLAg3Pz2jQ60SOIptHrvWMO7mEKt
xWHviGgYdDiec/7EoDmA1w6X9o+ENZXvOGQI+4mEKzBI9UWu1gk4BND6dn80
ZjoxNAWlWsmt90UE5JVtOk4XyuiFnYZ1RnW6RMS9dZjrVpAvgQzTgoOTQOCQ
yUrmm5zQuMJocHnsVyHiNMx04ylzlyK6pY+DnY6azXoNCSBCLuO8X2IEWG9l
iTWQO6dl/nYfS3X7+srjM66+/Z5qktWAOr42uzrggxM0YjBYHxxrcBovumrk
Iboeq3dms1rJHFygYXSvIcFz6eCx2B6Iw0TOFCRavSMBMQZBk+OTJY9jPvCL
FHZs1xgOAuDgDRG6FipvNlgD5pCN+eCKHEtJNz3nnYk7Ai/MIUUB32NiAYE/
noHaBAGA5QiqD9lxsXVU0jU+yHRbnhGwOVZrRaBIj0UYqKWefj6QNIi5BgwA
J435O8dPdYKzCcuKgIeo8uxgHXklbsF+C6scOheHt+8+HpXGUr8lxBt6jXgS
bfKnaoTCEY3haAb28geCfzIbCHfBNv/UH416py1UHoLZ9q5UW8RTemwiKCAk
UaG8aXWUP5Wr2z3/MwbrtOBL8HPf/4zZHt3twhqvjV+9BnggD2AQM2qKYIhb
l+7m53Tzd3hlEvSf2qRff26fZ+DCdQpRBzP06ysVRd/+vzh6ed4vOSqQoRQB
3lyDZn5E+PgtXO2/wNXq8lrOBkssd2FNcGh7ULfmN0vgJsMcPnCxsGiOPJwB
JhIGg/VbD+CiYvAA5fcUNiPChChmOuReKKTJ1iqXMwjICwhTNbqblV9mYwP2
zxpStmrsTPDgBLV/6g50goPE/KrFxrttR6XeAIqoL8FNJPENk4sdirxuGN7l
B0cyhTbY2aNylys2W0RlzNdZbe4EiWW0SaR3sGAgd/dT8ZG1F43jR3oP4scn
Sn3/Deo7YK1LX1TeUjPVj7SX7nDvM6WfukI1s/oNFxgycY8/ugAR9/b+vv3+
w/2PqLLLfML2L5I0YpJALj9F1C1GJMSpqUtDHUrxjpw0cnYZc8WiYjwGI6o5
Rcr44wqj/U0SU1SjVzqROTgwDDgheOM80AW2issozUbJgBYlEDbhdMEr39z6
YUJJzzsbLn3QJgLMkKnKNoYCfw25syOP7vl5uRWAQeI6jZJNDA5uzTltXYT1
XxRWuQXVaMotZ7Yg8KQuOaYAQvP+ZZWvLpQKQ06TMRbAYvA5EoIEwBaswbBF
R4rqS5VIN84URysSWJrb2K8SHNvaj3sCFW6n5IKJuYj1QhlfSKlkNFY3QQQe
WxipfLnFk9NuEzEYavpSgVU3vBiG95AJZuDuIrw4xlB2o85LjEbeVrgZcKk2
OM3VnNSY6n2PJVH8BycroFnGZJGmsoJRRDHdpgAEmAGwYmR1odEtUcYMmZhz
ELYyY8RKL5YFSoc/BDQCM+2TGC6BGLn2krnblacEZQk8fle6PkUFaq5JMoDg
z4q0raJbIYjv5joBb6yfssb87IzTkxvUFr1yt4R6UnhItlksHaWG2mmMACAo
DmtnKgXrJ14yeVRB/F5Koo0XZb11oCKFcXZtep1jwyY1npoWOsGFzOMEXKLb
wqZbJefpYLyE3ZEUsBT5o05jmxiWBbTIc4wxECtSvPEuDrK6k2I4pTDZiowZ
85nAOmpyCIC+OQYEWDsxhLoa5Y5VE4oWA4HVkukFC3vMN4nz6vdcyWUNocT+
yhfMAfP9HXZy99UGcGHmUxm4MppPYBFgaDYcYfUKGyrzstqtU1jS+ZkiALKt
2QjqAH4PT9SMlSogA3b+vNRJmYIjrDUbiyyLUVwSMBGvoAFRLXgUekUUPkMC
DvrUqjkGK4r2IRvkQkynIuu9oqVMF7ZrRJtZUiuVkGYDnFFsIgleVD1lyZPN
2jAKtqV04DGqKAm7VVoMKERhq+1cATUew0CFUoXRHlDxmFKZd5d0zm/FFP03
NQ82Ri4I7H1IyMWc3BfGydtnPvotXq7Ni93S/HWKsscSClyCOUmOfgWssbvz
gwXeBCy/oN2Aw2v5942FJLor+DiOhpEUbj5UfMTb7BkAKafwgEzKsm2FTg90
itimEd6QSzMueOFFd3sPFU8Y4iemgOSdcvcIu1SDjZ/UojCfygpfORHlIpxY
uDlUFcwzpjOk2HAOWbkDLuxSOGN9qNbtKcy4IRdTIsYVNUfxgXc+x+RQxKIS
d099gubRk63KQzxW9tOt1Td4OKh1V8Ic3MYpRw1adwSSwgmEYl6apV4jMy4o
uqCb/Kkz6p6K/yEXhKtfrC/ZFoWr6mY7vjHjxlMQngS5DxtKS0Dgt6SwSFIx
eq8c5nfzEQW5YRNsRT6WgqiNcQVuoGuVYVcPADxbYKCJwUaJRcZqMjIr3r36
vW2ZlQkWddDF4f3Hd9fWoOAkVh2ZKxtU71Z5e51+p6xVYzv/27cW3/SniEHG
JsAKAQhQsOtS/nALZAdfRgXYOtENQBgsRJDtVdqrnM8PxkCGtWZHNuJNzRYs
QEMhrAdvYCeCFSAgyhX2QWFSJOcDVLYXZNZuZlzCWCuUbaBYvsaLCvWE0Ec6
hS2sur1AJ/bUiGcEUjG9v+n09tJtjH0KZ8M1bS38JWxRadsIV3Fdz4yxGgVH
YSvS2Wz4XpuhZps5KouUPl1ykBul8wNubXWwrWUAip4UulaVikCrmKLBKTW3
axqKsK/hdh9Wh/dbezNp2EJreF5WfV/opaFQbM9ZqzhoEh9Ej4Wl3gJtbQLF
tyOquYln+zWswi4OeXkDaqf4Go1OZU6BN1CBbs0USsYcB2Sr1SYlllgCJcTm
YQTnPXexo3Hpk9pShkpUgm3mmaQqKjrIMgYGHYz0Wit+TM4S6tNlM7wNx8gB
n/ypJcPCog7zoEwQiJlwCebWte0JOlLYY2ugh/01NUFBQ2B5rsIg3YFi7pwE
BSXkANF/csWAa/S7d8JoNq3GRmToVqFsSGK3f21YXZCYUl0qkcpsG6QZMtQW
n0d9fvDKV1b9bOwJt1tR70tyNlAZLQg2czMdwA/QELypW1RnCYdkizih155B
pPNocAJCYTuHJ2oUGGiWa9Aa+NXA+UdU0/nnP/9JDbKvPOb0BiTxRvTEBAjJ
JE1KSdOxhOPEHTaKaaHcxG/EIFwIHMw2eaT88ixf+OUQvb4RQ1jeG4x7g9OT
k/7Q/QRQ8UacwE+WBvzqsXgj/vKXh7OL3l//Cr8sXw9Px7P4RM5lPB90j9Vo
1j2JxsNZd9jvzeanceQeDf/X7YFzkoPhUA4Hs1ienMDTcW88Po1lfzRQ0Wv7
EHcpv1lmIExiHwcwkls36LN3ROObQTWS6NhOU6gVphK9z6oTOSFWOvyuQYtP
d9fmB2MXn1JNgzp3VhLi2lktXOEQNziiwD2MVr7bZUNdxdE419ZmLMP5VaeK
v9zf3tAQBm5x+Mvnd0e7NLccsaiJDvJx2M9DvkoRcWobfibgV8sqssvgwCgI
xIM76qBKwvEZ2h1S0fnBqBesQQyY6y+wSVxirYefLA/9Gy4Py/nKP2zqeVoD
B+GRxjtFuK8lQJVQZk/3KPQvHx/a+iZPJzjSPKGY1EwynM2dgLp6A3jIIC98
VGVuV/aTZwpPJPUFlYZITxc8uwIktQJKQNSu4cHVCrm7Uyk3sqZasm2TtSUU
ei2jkOLC7RdlCVbFlhJnMDFIynhMjYUZFmxwlu0lmbx9iSrjjfQla/Qd3Seb
U8zzjL3JAe2KQ6rinhz6AVK7WaWVRvH+FKslp2aMVTAo7c7Fog29DBbkEl5k
O5dvg/61DprVtvhJURcVsoFQuKbm5LES5FeST6yr47QLDgbC/2EgQb0ulecZ
pM62Lo+1uija5CSBe43FZlbrG8LKMC7igIhVK9sUEEHvlhmr6XRQ1a4MT+zM
mDnRYQA5Hm7yBEi0xyLXsDa6xqAWYjEfOePkMzzq4MyIM/dwORmzMwJ0wEvK
38uY6dPde276ziH9wKnjtpFzFeizwSHzmgxshAwAcgROXzOc4idMwrjGDOKA
4EIneNLr37/GQpLdE/KvlS4KWwJwF+WpBghoXOKNNSGMJARHEgC8kBNCsLKW
OE8JGGxrmmUtsTwBEqqywIQ773KYarN2EHG1hrw/oxECNzHqRmr4NxsONxuH
OHI3XeOEA8DcuU8/rUzQMYC64lBl0OXEo+qO35Xw0YFD59m+RPf7ljxKRjpl
nRHmU9jQpR94suLQDieVEZkdQkRS4c/Ytoldf9Tw5BMh8P3npz/n48E/ztqf
n3/97/vnPy6fRoPp1b3+9e7dH4/72a/jwd3/rvv6U/u5xGz0LRsQvYsyq2WG
KjYgkwNiwZcuJE7evUBzSdmLvmNilhKLn5PfRv0rcWnJ/vrK8bQMdqzi78XN
P2pr2Xojxg27Mbh/tJyxw9z68vw86CbTvbFqPFMFWmQgNgYktxv6Op2bQoSl
G87uYy0XaUbjcwzzrBkcSYEDWzhLoyFWGhzVZp3IUjEouwu0owzWaTYIm0gA
vDja8fvaAZM3vLo36buIG3KhJ/ccjX24Ne3epOcXlXyYiC/hgIFb3J8sX49H
KpYj2euPjo+j/kyqk/7pcHA8V4PByXG3J3tdKeXgeKR6s9loNopVr3sSq+Hg
NOo2GyejUS9+XXvgtu7AARzYU6O+io9HsHlvPJgfz0/VsBvH89P5YNibDeLo
dCZPxl05P1bdSB7DP+pUqSjudk+ajWHcO43KAx81DQdjK7pVTl694PEtEXjp
HuSnMlb9ucR/DSiP+FaxRKcYcpY9YZaQg16sM+yY2H5yqZGkJQ5tAOhcHvdo
0TeAjXrNKGO76ajb6/b73W6v3xud9Lvj0eXFdDQl4Zz3z6aXLJyrSxbOtNed
TqcgnMve2dnobHRxCcK5aDYuQTznXRTORb+P+/QuR/3LC8fzq+Or08th9+Li
6vQKeH42uDg/PZsCz6dXx5fd8+kx/HN5Cttcnl8A14cXPdgN9xmOL8aj4/74
dNwbD8dX40H/ctyHv3vjy/Hw+BQ+j8aD8dmw6z6Nz8fNBv0KK0fHJ7Dy4rgL
3448s2+oA53UtI99MFaVxe77ED+MIowPT16abUx35q8gW6gMpIhDiApw0s5F
IjjS9e2IZwpaPDnVwtkonmo+2B7UzJvut2Zb38EYhpiwGlBqUR2Y+UIezvqu
Nqvgir71T1qMb1zkMTp/O0hNcmBAcgjjUeSnEMJn7t+BigAofgoE/J7fQQPG
gmajNNzrtGqMQQcGYWK/wrJnmSj5F0xz+G+aJhgCGOe/ZZrNhjPO0DT99T9R
aGqbmK2diY5KYbG81o/KMj8qwQQBgHs/tmZ0ZloLyJR38GhqqiF4THwtYLtf
GdRz7MniDROcW5OrmV5saFBnr8Mfxg5chw/zc3rJwc8sB+/zvdSbIs0CdHrO
IDkIR71MiUWQz5ad9bKpVyzDgY7dYkexVOlLp9qsDCCBW5GAXBClE5SVEzRB
Bq4Lo5K5G0DenfGon9kDX1UOV2G5mJKCrGaSJoDa6gsQGNV8dteopCDYr8Hi
83e2K4IyAZHFgsOi/goLJtKNcYuFxkGSIGltcbZbKQZRxQJvb9v7eQZ7Y/TB
bXiSI7eKdtvTXpAQf++9yJZARl3oFW6EMm/xlLvr8O5uZEmQoI2Jpjr8SsmU
3Iz64krOFNLamnFVzQGkUG3x1WFfUyBFyVU2P3IvYGL5l/IV7tumOJwio0cQ
Ho5J4WsAyXbnRUu5s6mf6SfvwB6BXgIED6sL9yIO1+5kODWCb0DYcVn3fp6e
Y30m4BOOdD5Sf4HfwsziDSiGbajccAEiIJoIprejg0Er99Dgdzf2DUeAdGpf
8HtSWIVg66BqJk9D9d4MfIkNxypaYgbf8uIfXAm142PQ7a/00HfMHmslrrAZ
Z6ntsUXoUcWFeoKMbE1+l2oUKjWbPEinq9OiS3yzaTMHHabmjcKm3pqsEcDs
iWDD8cnYb/0ALxdd98lzsYDOg8B1591N4/pe3N+3hyFizGuoJAUC/YmzVbLF
d1cSroXjb6hIBUhfQvbU65+Imca/0kWx7FTwzL3L5qvnNltdS2P4tTdfl4DA
uu04AbljrnCA4pocQOzYizRtUtfpCqdBFdc2ED2rfHFRowSoCKeQSOn3hdBy
AP0dVbAyDq5FHbKFSsH9JS1fLfqeNnFJDfQWPWHQWiBww5m/oFZHu68y7GYX
/HrROsm29AKMiVQKqJQZGoMB7vCcQYCDOKBj3zUN9b/6xivCH8NC6ansgCy/
HFNx7pDtU6uFfCT+rLlur4xtlUC0sJMuIXe3Louqf5ETuLr3JifsCMLWZrn3
Nqcdba5pmVMBdyKoMl6/4IIqjGv+jzl4N+zmwMI6dlv8Uv+6qT3k15pD3mEi
7Lpge7/SIAu9Y3RojibV/jEt5hkxeAbUMUlUPhHXlw9X+NN9pQlyYd/+o23g
uPCNQDy32bjit9FQI1riRTlJN0sVyuZ2ugEj/XR3Xcqi2QiFQUb89et/4BTe
8Wjk5fHp7mby3V4FsgNfTbIMfKnUFbAiCljxA17AglpOvBLTCOerEhUvqMRI
8elnZZ1Eoh/t/SXk7xRI0H/3xJT1yvHgxNYrGWK5mWa77N/vplXCFQvA5bu1
7ARBzd6FqSyh/n7uyDZZfav6uf4W5zIHKafiDH1/CqHTNQQbWrzXG/MkQSoQ
0byXsCVmye83aTxLZAxqciG12cA+0191ka10S3zQ0VKqRNzhvwGvMQpz3511
xC/gCDE6+gDEZKDI79IsVgCBv2Tw+y9SLRaJ5vz4DM6Kwe98yMClBJycg1ud
gauDq/0fE9NpPiRIAAA=

-->

</rfc>

