IETF RFC 5758
Internet X.509 Public Key Infrastructure: Additional Algorithms and Identifiers for DSA and ECDSA
Organization: | IETF |
Publication Date: | 1 January 2010 |
Status: | active |
Page Count: | 8 |
scope:
Introduction
This specification defines the contents of the signatureAlgorithm, signatureValue, and signature fields within Internet X.509 certificates and CRLs when these objects are signed using DSA or ECDSA with a SHA2 hash algorithm. These fields are more fully described in RFC 5280 [RFC5280]. This document also identifies all four SHA2 hash algorithms for use in the Internet X.509 PKI.
This document profiles material presented in the "Secure Hash Standard" [FIPS180-3], "Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Standard (ECDSA)" [X9.62], and the "Digital Signature Standard" [FIPS186-3].
This document updates RFC 3279 [RFC3279] Sections 2.1, 2.2.2, and 2.2.3. Note that RFC 5480 [RFC5480] updates Sections 2.3.5, 3 (ASN.1 Module), and 5 (Security Considerations) of RFC 3279.
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119].
Document History
