Additional Methods for Generating Key Identifiers Values (RFC7093)
Original Publication Date: 2013-Dec-01
Included in the Prior Art Database: 2013-Dec-21
Internet Society Requests For Comment (RFCs)
S. Turner: AUTHOR [+3]
2. Additional Methods for Generating Key Identifiers
Independent Submission S. Turner Request for Comments: 7093 IECA Category: Informational S. Kent ISSN: 2070-1721 BBN J. Manger Telstra December 2013
Additional Methods for Generating Key Identifiers Values
This document specifies additional example methods for generating Key Identifier values for use in the AKI (Authority Key Identifier) and SKI (Subject Key Identifier) certificate extensions.
Status of This Memo
This document is not an Internet Standards Track specification; it is published for informational purposes.
This is a contribution to the RFC Series, independently of any other RFC stream. The RFC Editor has chosen to publish this document at its discretion and makes no statement about its value for implementation or deployment. Documents approved for publication by the RFC Editor are not a candidate for any level of Internet Standard; see Section 2 of RFC 5741.
Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at http://www.rfc-editor.org/info/rfc7093.
Copyright (c) 2013 IETF Trust and the persons identified as the document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document.
al. Informational [Page 1]
RFC 7093 Additional Examples For KIs December 2013
[RFC5280] defines the AKI (Authority Key Identifier) and SKI (Subject Key Identifier) certificate extensions. [RFC5280] describes two example mechanisms for generating AKI and SKI values: a 160-bit SHA-1 (Secure Hash Algorithm) hash of the public key and a four-bit type field with the value 0100 followed by the least significant 60 bits of the SHA-1 hash. Both of these...