Skip to content

Latest commit

 

History

History
313 lines (222 loc) · 15.1 KB

bcr-2020-006-urtypes.md

File metadata and controls

313 lines (222 loc) · 15.1 KB

Registry of Uniform Resource (UR) Types

BCR-2020-006

© 2020 Blockchain Commons

Authors: Wolf McNally, Christopher Allen
Date: May 12, 2020
Revised: March 21, 2023


Introduction

A limited, base-32 character set is required by Uniform Resources (UR) [BCR5] in order to be compatible with both URI syntax [RFC3986] and QR Code alphanumeric mode [QRCodeAlphaNum]. In addition, [BCR5] specifies:

Each UR encoded object includes a type component as the first path component after the UR scheme. Types MUST consist only of characters from the English letters (ignoring case), Arabic numerals, and the hyphen -.

Because this namespace intersects with but does not enclose existing type namespace definitions such as [MIME] and because defined types like MIME do not uniformly specify CBOR encoding (required by [BCR5]) a new namespace is necessary to easily identify the type of data encoded in a UR.

This document is a registry of UR types and CBOR tags maintained by Blockchain Commons. Each entry in the registry records the type string, its associated CBOR tag, a brief description of the type, and either a link to the type defintion or a reference to the type definition within this document. Additional types may be added by contacting this document's maintainers.

Types specified within this document are specified in [CDDL], the Concise Data Definition Language used as a human-readable notation for CBOR structures.

User-Defined Types x-*

All types with the prefix x- are reserved for user-defined UR types.

CBOR-Wrapped Types cbor-*

All types with the prefix cbor- are reserved for existing non-CBOR media types wrapped in a CBOR byte string. The only types currently specified in this registry are cbor-png for [PNG] images and cbor-svg for [SVG] images.

Tags for Embedding

Each UR type defines a CBOR encoding. When a UR type is suitable for embedding within another CBOR structure, it MUST be tagged with a CBOR tag defined for this purpose. When a UR type is used as the top-level CBOR object encoded into a UR, the object MUST NOT be tagged, as this information is provided by the UR type component.

This document also lists the tag, if any, defined for the particular CBOR strucure contained in the UR encoding. The tags listed here may or may not currently be listed in IANA's registry of CBOR tags [CBOR-TAGS] but the intent is that they will be registered as they come into us.

Registry

Type Tag Description Definition
cbor 24 Wrapped cbor [CBOR]
bytes Undifferentiated byte string (for testing only) [BCR5]
cbor-png PNG image [PNG]
cbor-svg SVG image [SVG]
cose-sign 98 COSE_Sign: Signed message (multiple recipients) [COSE]
cose-sign1 18 COSE_Sign1: Signed message (single recipient) [COSE]
cose-encrypt 96 COSE_Encrypt: Encrypted message (multiple recipients) [COSE]
cose-encrypt0 16 COSE_Encrypt0: Encrypted message (implied recipient) [COSE]
cose-mac 97 COSE_Mac: Authenticated message (multiple recipients) [COSE]
cose-mac0 17 COSE_Mac0: Authenticated message (implied recipient) [COSE]
cose-key COSE_Key: An encryption key [COSE]
cose-keyset COSE_KeySet: A set of encryption keys [COSE]
envelope 200 Gordian Envelope [Envelope]
assertion 201 Envelope assertion [Envelope]
known-value 202 Envelope known value [Envelope]
wrapped-envelope 203 Wrapped envelope [Envelope]
digest 204 Cryptographic digest [SecureComponents]
encrypted 205 Secure message [BCR-2022-001]
compressed 206 Compressed data [SecureComponents]
request 207 Distributed request [Envelope]
response 208 Distributed response [Envelope]
function 209 Function identifier [Envelope]
parameter 210 Parameter identifier [Envelope]
placeholder 211 Function placeholder [Envelope]
replacement 212 Function replacement [Envelope]
crypto-seed 300 Cryptographic seed This document
agreement-private-key 301 Agreement private key [SecureComponents]
agreement-public-key 302 Agreement private key [SecureComponents]
crypto-hdkey 303 Hierarchical Deterministic (HD) key [BCR-2020-007]
crypto-keypath 304 Key Derivation Path [BCR-2020-007]
crypto-coin-info 305 Cryptocurrency Coin Use [BCR-2020-007]
crypto-eckey 306 Elliptic Curve (EC) key [BCR-2020-008]
crypto-address 307 Cryptocurrency Address [BCR-2020-009]
crypto-output 308 Bitcoin Output Descriptor [BCR-2020-010]
crypto-sskr 309 SSKR (Sharded Secret Key Reconstruction) shard [BCR-2020-011]
crypto-psbt 310 Partially Signed Bitcoin Transaction (PSBT) This document
crypto-account 311 BIP44 Account [BCR-2020-015]
cid 312 Common Identifier [BCR-2022-002]
seed-digest 313 Seed digest [BCFoundation]
nonce 314 Cryptographic nonce [SecureComponents]
password 315 Hashed password (e.g., Scrypt) [SecureComponents]
crypto-prvkeys 316 Private key base [SecureComponents]
crypto-pubkeys 317 Public key base [SecureComponents]
salt 318 Salt [SecureComponents]
crypto-sealed 319 Sealed message [SecureComponents]
signature 320 Signature [SecureComponents]
signing-private-key 321 Signing private key [SecureComponents]
signing-public-key 322 Signing public key [SecureComponents]
crypto-key 323 Symmetric Key [SecureComponents]
400–410 Used as descriptor types in crypto-output.
500 Used as response type for OutputDescriptorResponse
600 Object Digest This document and as defined in each type

Object Digests

It is sometimes desirable that a CBOR-encoded object refer to another object by its unique SHA-256 digest. The method of deriving a digest for a particular type is unique to that type and MAY be defined by that type. The hash algorithm input for the SHA-256 hash (called the digest source) MUST only include data that uniquely and permanently identifies the object, and MUST NOT include data that may change over time, such as object's name or other incidental metadata. This document defines the method for producing the digest source for crypto-seed below. [BCR-2020-007] describes the method for producing the digest source for a crypto-hdkey. See BCR-2021-002: Digests for Digital Objects for more information.

When UR types refer to other objects using a digest, it MUST be tagged #6.600 and the byte string length MUST be exactly 32.

CDDL

digest = #6.600(bytes .size 32)

Byte String bytes

The type bytes contains a single, deterministic length byte string having a length from 1 to 2^32-1 bytes. This specification places no semantic interpretation on the contents of the string. Because of this, its usefulness is generally limited to development and testing purposes. Actual applications of Uniform Resources SHOULD use a more specific type.

CDDL

bytes

Example/Test Vector

  • CBOR diagnostic notation:
h'00112233445566778899aabbccddeeff'
  • Encoded as binary using [CBOR-PLAYGROUND]:
50                                  # bytes(16)
   00112233445566778899AABBCCDDEEFF
  • As a hex string:
5000112233445566778899AABBCCDDEEFF
  • As a UR:
ur:bytes/gdaebycpeofygoiyktlonlpkrksfutwyzmwmfyeozs
  • UR as QR Code:

Cryptographic Seed crypto-seed

The type crypto-seed contains a single, deterministic length byte string having a length from 1 to 64 bytes. Semantically, this byte string SHOULD be a random or pseudorandom sequence generated by a cryptographically-strong algorithm.

The type may also include a creation-date attribute which is the number of days since the Unix epoch upon which this seed was generated. This attribute is tagged with #6.1 in accordance with [CBOR-TAGS].

The type may also include name, which SHOULD be a short name for the seed, and note, which is an arbitrary amount of text describing the seed.

CDDL

seed = {
	payload: bytes,
	? creation-date: date,
	? name: text,
	? note: text
}
payload = 1
creation-date = 2
name = 3
note = 4
date = #6.1(int / float) ; epoch-based date/time

Example/Test Vector

  • For a 16 byte (128-bit) seed generated on May 11, 2020, in the CBOR diagnostic notation:
{
  1: h'c7098580125e2ab0981253468b2dbc52',
  2: 100(18394)
}
  • Encoded as binary using [CBOR-PLAYGROUND]:
A2                                     # map(2)
   01                                  # unsigned(1) payload:
   50                                  # bytes(16)
      C7098580125E2AB0981253468B2DBC52 # payload
   02                                  # unsigned(2) creation-date:
   D8 64                               # tag(100)
      19 47DA                          # unsigned(18394)
  • As a hex string:
A20150C7098580125E2AB0981253468B2DBC5202D8641947DA
  • As a UR:
ur:crypto-seed/oeadgdstaslplabghydrpfmkbggufgludprfgmaotpiecffltnlpqdenos
  • UR as QR Code:

Seed Digest Source Specification

When a unique identifier to a crypto-seed is needed, an extract of its fields, called the digest source is created and then used as input to the SHA-256 hashing algorithm. The resulting digest can be compared to digests produced the same way to determine whether a seed has a particular identity. See BCR-2021-002: Digests for Digital Objects for more information.

The digest source of a crypto-seed is just the payload byte string. All other fields are ignored. For the example test vector above, the payload is:

c7098580125e2ab0981253468b2dbc52

So the digest would be the SHA-256 hash of those bytes:

e824467caffeaf3bbc3e0ca095e660a9bad80ddb6a919433a37161908b9a3986

When encoded as CBOR (diagnostic notiation):

crypto-seed-digest = 600(h'e824467caffeaf3bbc3e0ca095e660a9bad80ddb6a919433a37161908b9a3986')

Encoded as binary:

D9 0258                                 # tag(600)
   58 20                                # bytes(32)
      E824467CAFFEAF3BBC3E0CA095E660A9BAD80DDB6A919433A37161908B9A3986

Partially Signed Bitcoin Transaction (PSBT) crypto-psbt

The type crypto-psbt contains a single, deterministic length byte string of variable length up to 2^32-1 bytes. Semantically, this byte string MUST be a valid Partially Signed Bitcoin Transaction encoded in the binary format specified by [BIP174].

CDDL

bytes

Example/Test Vector

  • CBOR diagnostic notation:
h'70736274ff01009a020000000258e87a21b56daf0c23be8e7070456c336f7cbaa5c8757924f545887bb2abdd750000000000ffffffff838d0427d0ec650a68aa46bb0b098aea4422c071b2ca78352a077959d07cea1d0100000000ffffffff0270aaf00800000000160014d85c2b71d0060b09c9886aeb815e50991dda124d00e1f5050000000016001400aea9a2e5f0f876a588df5546e8742d1d87008f000000000000000000'
  • Encoded as binary using [CBOR-PLAYGROUND]:
58 A7                                   # bytes(167)
70736274FF01009A020000000258E87A21B56DAF0C23BE8E7070456C336F7CBAA5C8757924F545887BB2ABDD750000000000FFFFFFFF838D0427D0EC650A68AA46BB0B098AEA4422C071B2CA78352A077959D07CEA1D0100000000FFFFFFFF0270AAF00800000000160014D85C2B71D0060B09C9886AEB815E50991DDA124D00E1F5050000000016001400AEA9A2E5F0F876A588DF5546E8742D1D87008F000000000000000000
  • As a hex string:
58A770736274FF01009A020000000258E87A21B56DAF0C23BE8E7070456C336F7CBAA5C8757924F545887BB2ABDD750000000000FFFFFFFF838D0427D0EC650A68AA46BB0B098AEA4422C071B2CA78352A077959D07CEA1D0100000000FFFFFFFF0270AAF00800000000160014D85C2B71D0060B09C9886AEB815E50991DDA124D00E1F5050000000016001400AEA9A2E5F0F876A588DF5546E8742D1D87008F000000000000000000
  • As a UR:
ur:crypto-psbt/hdosjojkidjyzmadaenyaoaeaeaeaohdvsknclrejnpebncnrnmnjojofejzeojlkerdonspkpkkdkykfelokgprpyutkpaeaeaeaeaezmzmzmzmlslgaaditiwpihbkispkfgrkbdaslewdfycprtjsprsgksecdratkkhktikewdcaadaeaeaeaezmzmzmzmaojopkwtayaeaeaeaecmaebbtphhdnjstiambdassoloimwmlyhygdnlcatnbggtaevyykahaeaeaeaecmaebbaeplptoevwwtyakoonlourgofgvsjydpcaltaemyaeaeaeaeaeaeaeaeaebkgdcarh
  • UR as QR Code:

COSE Structures cose-*

[COSE] specifies CBOR-encoded structures for transmitting signed and/or encrypted objects. This document specifies UR types starting with cose- for the various COSE messages in their untagged form.

Implementations

Typescript/Javascript Implementation: ur-registry

Java Implementation: hummingbird

Normative References

Informative References