Dismiss
InnovationQ/InnovationQ Plus content will be updated on Sunday, June 25, 10am ET, with new patent and non-patent literature collections. Click here to learn more.
Browse Prior Art Database

Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile (RFC3279)

IP.com Disclosure Number: IPCOM000007991D
Original Publication Date: 2002-Apr-01
Included in the Prior Art Database: 2002-May-10
Document File: 28 page(s) / 54K

Publishing Venue

Internet Society Requests For Comment (RFCs)

Related People

L. Bassham: AUTHOR [+3]

Abstract

This document specifies algorithm identifiers and ASN.1 encoding formats for digital signatures and subject public keys used in the Internet X.509 Public Key Infrastructure (PKI). Digital signatures are used to sign certificates and certificate revocation list (CRLs). Certificates include the public key of the named subject.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 7% of the total text.

Network Working Group                                            W. Polk

Request for Comments: 3279                                          NIST

Obsoletes: 2528                                               R. Housley

Category: Standards Track                               RSA Laboratories

                                                              L. Bassham

                                                                    NIST

                                                              April 2002

                   Algorithms and Identifiers for the

                Internet X.509 Public Key Infrastructure

       Certificate and Certificate Revocation List (CRL) Profile

Status of this Memo

   This document specifies an Internet standards track protocol for the

   Internet community, and requests discussion and suggestions for

   improvements.  Please refer to the current edition of the "Internet

   Official Protocol Standards" (STD 1) for the standardization state

   and status of this protocol.  Distribution of this memo is unlimited.

Copyright Notice

   Copyright (C) The Internet Society (2002).  All Rights Reserved.

Abstract

   This document specifies algorithm identifiers and ASN.1 encoding

   formats for digital signatures and subject public keys used in the

   Internet X.509 Public Key Infrastructure (PKI).  Digital signatures

   are used to sign certificates and certificate revocation list (CRLs).

   Certificates include the public key of the named subject.

Table of Contents

   1  Introduction  . . . . . . . . . . . . . . . . . . . . . .   2

   2  Algorithm Support . . . . . . . . . . . . . . . . . . . .   3

   2.1  One-Way Hash Functions  . . . . . . . . . . . . . . . .   3

   2.1.1  MD2 One-Way Hash Functions  . . . . . . . . . . . . .   3

   2.1.2  MD5 One-Way Hash Functions  . . . . . . . . . . . . .   4

   2.1.3  SHA-1 One-Way Hash Functions  . . . . . . . . . . . .   4

   2.2  Signature Algorithms  . . . . . . . . . . . . . . . . .   4

   2.2.1  RSA Signature Algorithm . . . . . . . . . . . . . . .   5

   2.2.2  DSA Signature Algorithm . . . . . . . . . . . . . . .   6

   2.2.3  Elliptic Curve Digital Signature Algorithm  . . . . .   7

   2.3  Subject Public Key Algorithms . . . . . . . . . . . . .   7

   2.3.1  RSA Keys  . . . . . . . . . . . . . . . . . . . . . .   8

   2.3.2  DSA Signature Keys  . . . . . . . . . . . . . . . . .   9

   2.3.3  Diffie-Hellman Key Exchange Keys  . . . . . . . . . .  10

Polk, et al.                Standards Track                     [Page 1]

RFC 3279               Algorithms and Identifiers             April 2002

   2.3.4  KEA Public Keys . . . . . . . . . . . . . . . . . . .  11

   2.3.5  ECDSA and ECDH Public Keys  . . . . . . . . . . . . .  13

   3  ASN.1 Module  . . . . . . . . . . . . . . . . . . . . . .  18

   4  References  . . . . . . . . . . . . . . . . . . . . . . .  24

   5  Security Considerations . . . . . . . . . . . . . . . . .  25

   6  Intellectual Property Rights  . . . . . . . . . . . . . .  26

   7  Author Addresses  . . . . . . . . . . . . . . . . . . . .  26

   8  Full Copyright Statement  . . . . . . . . . . . . . . . .  27

1  Introduction

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",

   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this

   document are to be interpreted as described in [RFC 2119].

   This document specifies algorithm identifiers and ASN.1 [X.660]

   encoding formats for digital signatures and subject public keys used

   in the Internet X.509 Public Key Infrastructure (PKI).  This

   specification supplements [RFC 3280], "Internet X.509 Public Key

   I...