IETF RFC 5758 PDF

IETF RFC 5758 PDF

Name:
IETF RFC 5758 PDF

Published Date:
01/01/2010

Status:
[ Active ]

Description:

Internet X.509 Public Key Infrastructure: Additional Algorithms and Identifiers for DSA and ECDSA

Publisher:
Internet Engineering Task Force

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
$9.6
Need Help?

Introduction

This specification defines the contents of the signatureAlgorithm, signatureValue, and signature fields within Internet X.509 certificates and CRLs when these objects are signed using DSA or ECDSA with a SHA2 hash algorithm. These fields are more fully described in RFC 5280 [RFC5280]. This document also identifies all four SHA2 hash algorithms for use in the Internet X.509 PKI.

This document profiles material presented in the "Secure Hash Standard" [FIPS180-3], "Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Standard (ECDSA)" [X9.62], and the "Digital Signature Standard" [FIPS186-3].

This document updates RFC 3279 [RFC3279] Sections 2.1, 2.2.2, and 2.2.3. Note that RFC 5480 [RFC5480] updates Sections 2.3.5, 3 (ASN.1 Module), and 5 (Security Considerations) of RFC 3279.

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119].


Edition : 10
File Size : 1 file , 13 KB
Number of Pages : 8
Published : 01/01/2010

History


Related products

IETF RFC 7953
Published Date: 08/01/2016
Calendar Availability
$11.4
IETF RFC 3081
Published Date: 03/01/2001
Mapping the BEEP Core onto TCP
$9.6

Best-Selling Products