Pending. (Still need that later example?)
Pending.
...
http://www.isi.edu/in-notes/iana/assignments/media-types/*/
Generally yes with two caveats:
Still not sure. ACTION Reagle: write up issue on list and talk to TimBL.
Simon: doesn't see much of a different, but with respect to functionlity if its EncryptedData then it's part of the document; EncryptedKey you don't have to worry about replacing *back* into the document.
ACTION Reagle: more discussion (continue with Takeshi Imamu) about what a "XML encoded" key means (as distinct from a ds:KeyValue) and propose some text for the spec explaining when to use EncryptedData versus EncryptedKey.
ACTION Eastlake: tweak text.
Reagle: let's continue to discuss this, we can always revert to "If you care about integrity, sign it."
Reagle: Christian, are you disagreeing that the nonce is useful, or only redudant?
Christian: agrees that the nonce can help with securing the whole chain of blocks (not the just the two following blocks) but feels that is redundant with an IV if you choose a *random* IV.
Reagle: If we accept Christian's assertion that a random IV is sufficient for mitigating plain-text attacks, is it acceptable to get rid of the Nonce attribute?
Hirsch/Simon/Eastlake: Yes.
Reagle: what if the nonce would be used for other algorithms and modes beyond the ones we specify?
Eastlake: those can be accomodated via EncryptionMethod's <ANY/> as parameters...
Reagle: OK, let's check with crypto experts that random IV is sufficient (no need for nonce), that it mitigates attacks against the whole sequence of chained blocks (and then remove the nonce) and whether encrypting the IV (to protect against "Type B" attack) is useful. But otherwise, be prepared to remove Nonce (unless objection on list and elsewhere).