Browse Prior Art Database

The Profile for Algorithms and Key Sizes for Use in the Resource Public Key Infrastructure (RFC7935)

IP.com Disclosure Number: IPCOM000247391D
Original Publication Date: 2016-Aug-01
Included in the Prior Art Database: 2016-Sep-01
Document File: 18 page(s) / 18K

Publishing Venue

Internet Society Requests For Comment (RFCs)

Related People

G. Huston: AUTHOR [+3]

Abstract

This document specifies:

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 15% of the total text.

Internet Engineering Task Force (IETF)                         G. Huston Request for Comments: 7935                            G. Michaelson, Ed. Obsoletes: 6485                                                    APNIC Category: Standards Track                                    August 2016 ISSN: 2070-1721

                 The Profile for Algorithms and Key Sizes            for Use in the Resource Public Key Infrastructure

Abstract

   This document specifies the algorithms, algorithms' parameters,    asymmetric key formats, asymmetric key size, and signature format for    the Resource Public Key Infrastructure (RPKI) subscribers that    generate digital signatures on certificates, Certificate Revocation    Lists (CRLs), Cryptographic Message Syntax (CMS) signed objects and    certification requests as well as for the relying parties (RPs) that    verify these digital signatures.

Status of This Memo

   This is an Internet Standards Track document.

   This document is a product of the Internet Engineering Task Force    (IETF).  It represents the consensus of the IETF community.  It has    received public review and has been approved for publication by    the Internet Engineering Steering Group (IESG).  Further    information on Internet Standards is available in Section 2 of    RFC 7841.

   Information about the current status of this document, any    errata, and how to provide feedback on it may be obtained at    http://www.rfc-editor.org/info/rfc7935.

Huston & Michaelson          Standards Track                    [Page 1]
 RFC 7935                 RPKI Algorithm Profile              August 2016

 Copyright Notice

   Copyright (c) 2016 IETF Trust and the persons identified as the    document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal    Provisions Relating to IETF Documents    (http://trustee.ietf.org/license-info) in effect on the date of    publication of this document.  Please review these documents    carefully, as they describe your rights and restrictions with respect    to this document.  Code Components extracted from this document must    include Simplified BSD License text as described in Section 4.e of    the Trust Legal Provisions and are provided without warranty as    described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   3

     1.1.  Terminology . . . . . . . . . . . . . . . . . . . . . . .   3

   2.  Algorithms  . . . . . . . . . . . . . . . . . . . . . . . . .   3

   3.  Asymmetric Key Pair Formats . . . . . . . . . . . . . . . . .   4

     3.1.  Public Key Format . . . ....