<- Go to Data Types Go to ToC

1. Definition 2. Functional Requirements 3. Syntax 4. Semantics

1 Definition

.

2 Functional Requirements

3 Syntax

https://schemas.mpai.community/AIF/V3.0/data/Security.json

4 Semantics

Label Description
Hash Identifies allowed hash algorithms.
– AIF-ALGO-HASH-SHA256 SHA‑256 hash algorithm.
– AIF-ALGO-HASH-SHA384 SHA‑384 hash algorithm.
– AIF-ALGO-HASH-SHA512 SHA‑512 hash algorithm.
– AIF-ALGO-HASH-SHA3-256 SHA‑3‑256 hash algorithm.
– AIF-ALGO-HASH-SHA3-512 SHA‑3‑512 hash algorithm.
– AIF-ALGO-HASH-BLAKE3 BLAKE3 hash algorithm.
– AIF-ALGO-HASH-CUSTOM Implementation‑specific hash algorithm.
Signature Identifies allowed signature algorithms.
– AIF-ALGO-SIG-ED25519 Ed25519 signature algorithm.
– AIF-ALGO-SIG-ECDSA-P256-SHA256 ECDSA P‑256 with SHA‑256.
– AIF-ALGO-SIG-ECDSA-P384-SHA384 ECDSA P‑384 with SHA‑384.
– AIF-ALGO-SIG-RSA-PSS-SHA256 RSA‑PSS using SHA‑256.
– AIF-ALGO-SIG-RSA-PSS-SHA384 RSA‑PSS using SHA‑384.
– AIF-ALGO-SIG-DILITHIUM2 Dilithium‑2 post‑quantum signature algorithm.
– AIF-ALGO-SIG-FALCON512 Falcon‑512 post‑quantum signature algorithm.
– AIF-ALGO-SIG-CUSTOM Implementation‑specific signature algorithm.
MAC Identifies allowed message authentication code algorithms.
– AIF-ALGO-MAC-HMAC-SHA256 HMAC using SHA‑256.
– AIF-ALGO-MAC-HMAC-SHA384 HMAC using SHA‑384.
– AIF-ALGO-MAC-CMAC-AES CMAC using AES.
– AIF-ALGO-MAC-CUSTOM Implementation‑specific MAC algorithm.
Encryption Identifies allowed symmetric encryption algorithms.
– AIF-ALGO-ENC-AES-256-CBC AES‑256‑CBC encryption.
– AIF-ALGO-ENC-AES-256-CTR AES‑256‑CTR encryption.
– AIF-ALGO-ENC-CHACHA20 ChaCha20 encryption.
– AIF-ALGO-ENC-CUSTOM Implementation‑specific encryption algorithm.
AEAD Identifies allowed authenticated-encryption-with-associated-data algorithms.
– AIF-ALGO-AEAD-AES-256-GCM AES‑256‑GCM authenticated encryption.
– AIF-ALGO-AEAD-CHACHA20-POLY1305 ChaCha20‑Poly1305 authenticated encryption.
– AIF-ALGO-AEAD-CUSTOM Implementation‑specific AEAD algorithm.
KeyExchange Identifies allowed key‑exchange or key‑agreement algorithms.
– AIF-ALGO-KX-X25519 X25519 key exchange.
– AIF-ALGO-KX-ECDH-P256 ECDH using P‑256.
– AIF-ALGO-KX-ECDH-P384 ECDH using P‑384.
– AIF-ALGO-KX-KYBER512 Kyber‑512 post‑quantum key encapsulation.
– AIF-ALGO-KX-CUSTOM Implementation‑specific key‑exchange algorithm.
Hybrid Identifies allowed hybrid classical + post‑quantum algorithms.
– AIF-ALGO-HYBRID-X25519-KYBER512 Hybrid X25519 + Kyber‑512.
– AIF-ALGO-HYBRID-ECDH-P256-DILITHIUM2 Hybrid ECDH‑P256 + Dilithium‑2.
– AIF-ALGO-HYBRID-CUSTOM Implementation‑specific hybrid algorithm.

 

<- Go to Data Types    Go to ToC