亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? draft-ietf-pkix-rsa-pkalgs-00.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 4 頁
字號:
PKIX Working Group                         R. Housley (RSA Laboratories)Internet Draft                             B. Kaliski (RSA Laboratories)expires June 2003                                          December 2002       Additional Algorithms and Identifiers for RSA Cryptography        for use in the Internet X.509 Public Key Infrastructure       Certificate and Certificate Revocation List (CRL) Profile                  <draft-ietf-pkix-rsa-pkalgs-00.txt>Status of this Memo   This document is an Internet-Draft and is in full conformance with   all provisions of Section 10 of RFC 2026.  Internet-Drafts are   working documents of the Internet Engineering Task Force (IETF), its   areas, and its working groups.  Note that other groups may also   distribute working documents as Internet-Drafts.   Internet-Drafts are draft documents valid for a maximum of six months   and may be updated, replaced, or obsoleted by other documents at any   time.  It is inappropriate to use Internet-Drafts as reference   material or to cite them other than as "work in progress."   The list of current Internet-Drafts can be accessed at   http://www.ietf.org/ietf/1id-abstracts.txt.   The list of Internet-Drafts Shadow Directories can be accessed at   http://www.ietf.org/shadow.html.Abstract   This document supplements RFC 3279.  It describes the conventions for   using the RSASSA-PSS signature algorithm, the RSAES-OAEP key   transport algorithm, and additional one-way hash functions with the   PKCS #1 version 1.5 signature algorithm in the Internet X.509 Public   Key Infrastructure (PKI).  Encoding formats, algorithm identifiers,   and parameter formats are specified.Housley & Kaliski                                               [Page 1]INTERNET DRAFT                                             December 2002Table of Contents    1  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   3       1.1  Terminology  . . . . . . . . . . . . . . . . . . . . . .   3       1.2  RSA Public Keys  . . . . . . . . . . . . . . . . . . . .   3    2  Common Functions  . . . . . . . . . . . . . . . . . . . . . .   5       2.1  One-way Hash Functions . . . . . . . . . . . . . . . . .   6       2.2  Mask Generation Functions  . . . . . . . . . . . . . . .   7    3  RSASSA-PSS Signature Algorithm  . . . . . . . . . . . . . . .   7       3.1  RSASSA-PSS Public Keys . . . . . . . . . . . . . . . . .   8       3.2  RSASSA-PSS Signature Values  . . . . . . . . . . . . . .  10    4  RSAES-OAEP Key Transport Algorithm  . . . . . . . . . . . . .  10       4.1  RSAES-OAEP Public Keys . . . . . . . . . . . . . . . . .  11    5  PKCS #1 Version 1.5 Signature Algorithm . . . . . . . . . . .  12    6  ASN.1 Module  . . . . . . . . . . . . . . . . . . . . . . . .  14    7  References  . . . . . . . . . . . . . . . . . . . . . . . . .  18       7.1  Normative References . . . . . . . . . . . . . . . . . .  18       7.2  Informative References . . . . . . . . . . . . . . . . .  19    8  Security Considerations . . . . . . . . . . . . . . . . . . .  19    9  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  21   10  Author Addresses  . . . . . . . . . . . . . . . . . . . . . .  22   11  Full Copyright Statement  . . . . . . . . . . . . . . . . . .  22Housley & Kaliski                                               [Page 2]INTERNET DRAFT                                             December 20021  Introduction   This document supplements RFC 3279 [PKALGS].  This document describes   the conventions for using the RSASSA-PSS signature algorithm and the   RSAES-OAEP key transport algorithm in the Internet X.509 Public Key   Infrastructure (PKI) [PROFILE].  Both of these RSA-based algorithms   are specified in [P1v2.1].  The algorithm identifiers and associated   parameters for subject public keys that employ either of these   algorithms are specified, and the encoding format for RSASSA-PSS   signatures is specified.  Also, the algorithm identifiers for using   the SHA-256, SHA-384, and SHA-512 one-way hash functions with the   PKCS #1 version 1.5 signature algorithm [P1v1.5] are specified.   This specification supplements RFC 3280 [PROFILE], which profile the   X.509 Certificates and Certificate Revocation Lists (CRLs) for use in   the Internet.  This specification extends the list of algorithms   discussed in RFC 3279 [PKALGS].  The X.509 Certificate and CRL   definitions use ASN.1 [X.208-88], the Basic Encoding Rules (BER)   [X.209-88], and the Distinguished Encoding Rules (DER) [X.509-88].   This specification defines the contents of the signatureAlgorithm,   signatureValue, signature, and subjectPublicKeyInfo fields within   Internet X.509 certificates and CRLs.  For each algorithm, the   appropriate alternatives for the keyUsage extension are provided.1.1  Terminology   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this   document are to be interpreted as described in RFC 2119 [STDWORDS].1.2  RSA Public Keys   RFC 3280 [PROFILE] specifies the profile for using X.509 Certificates   in Internet applications.  When a RSA public key will be used for   RSASSA-PSS digital signatures or RSAES-OAEP key transport, the   conventions specified in this section augment RFC 3280.   Traditionally, the rsaEncryption object identifier is used to   identify RSA public keys.  However, to implement all of the   recommendations described in the Security Considerations section of   this document (see section 8), the certificate user needs to be able   to determine the form of digital signature or key transport that the   RSA private key owner associates with the public key.   The rsaEncryption object identifier continues to identify the subject   public key when the RSA private key owner does not wish to limit the   use of the public key exclusively to either RSASSA-PSS or RSAES-OAEP.Housley & Kaliski                                               [Page 3]INTERNET DRAFT                                             December 2002   In this case, the rsaEncryption object identifier MUST be used in the   algorithm field within the subject public key information, and the   parameters field MUST contain NULL.      rsaEncryption  OBJECT IDENTIFIER  ::=  { pkcs-1 1 }   Further discussion of the conventions associated with use of the   rsaEncryption object identifier can be found in RFC 3279 (see   [PKALGS], section 2.3.1).   When the RSA private key owner wishes to limit the use of the public   key exclusively to RSASSA-PSS, then the id-RSASSA-PSS object   identifier MUST be used in the algorithm field within the subject   public key information, and the parameters field MUST contain RSASSA-   PSS-params.  The id-RSASSA-PSS object identifier value and the   RSASSA-PSS-params syntax are fully described in section 3 of this   document.   When the RSA private key owner wishes to limit the use of the public   key exclusively to RSAES-OAEP, then the id-RSAES-OAEP object   identifier MUST be used in the algorithm field within the subject   public key information, and the parameters field MUST contain RSAES-   OAEP-params.  The id-RSAES-OAEP object identifier value and the   RSAES-OAEP-params syntax are fully described in section 4 of this   document.   Regardless of the object identifier used, the RSA public key is   encoded in the same manner in the subject public key information.   The RSA public key MUST be encoded using the type RSAPublicKey type:      RSAPublicKey  ::=  SEQUENCE  {         modulus            INTEGER,    -- n         publicExponent     INTEGER  }  -- e   Here, the modulus is the modulus n, and publicExponent is the public   exponent e.  The DER encoded RSAPublicKey is carried in the   subjectPublicKey BIT STRING within the subject public key   information.   The intended application for the key MAY be indicated in the key   usage certificate extension (see [PROFILE], section 4.2.1.3).   If the keyUsage extension is present in an end entity certificate   that conveys an RSA public key with the id-RSASSA-PSS object   identifier, then the key usage extension MUST contain one or both ofHousley & Kaliski                                               [Page 4]INTERNET DRAFT                                             December 2002   the following values:      nonRepudiation; and      digitalSignature.   If the keyUsage extension is present in a certification authority   certificate that conveys an RSA public key with the id-RSASSA-PSS   object identifier, then the key usage extension MUST contain one or   more of the following values:      nonRepudiation;      digitalSignature;      keyCertSign; and      cRLSign.   When a certificate that conveys an RSA public key with the id-RSASSA-   PSS object identifier, the certificate user MUST only use the   certified RSA public key for RSASSA-PSS operations, and the   certificate user MUST perform those operations using the one-way hash   function, mask generation function, and trailer field identified in   the subject public key algorithm identifier parameters within the   certificate.   If the keyUsage extension is present in a certificate that conveys an   RSA public key with the id-RSAES-OAEP object identifier, then the key   usage extension MUST contain only the following values:      keyEncipherment; and      dataEncipherment.   However, both keyEncipherment and dataEncipherment SHOULD NOT be   present.   When a certificate that conveys an RSA public key with the id-RSAES-   OAEP object identifier, the certificate user MUST only use the   certified RSA public key for RSAES-OAEP operations, and the   certificate user MUST perform those operations using the one-way hash   function and mask generation function identified in the subject   public key algorithm identifier parameters within the certificate.2  Common Functions   The RSASSA-PSS signature algorithm and the RSAES-OAEP key transport   algorithm make use of one-way hash functions and mask generation   functions.Housley & Kaliski                                               [Page 5]INTERNET DRAFT                                             December 20022.1  One-way Hash Functions   PKCS #1 version 2.1 [P1v2.1] supports four one-way hash functions for   use with the RSASSA-PSS signature algorithm and the RSAES-OAEP key   transport algorithm: SHA-1, SHA-256, SHA-384, and SHA-512 [SHA2].   While support for additional one-way hash functions could be added in   the future, no other one-way hash functions are supported by this   specification.   These one-way hash functions are identified by the following object   identifiers:      id-sha1  OBJECT IDENTIFIER  ::=  { iso(1)                           identified-organization(3) oiw(14)                           secsig(3) algorithms(2) 26 }      id-sha256  OBJECT IDENTIFIER  ::=  { joint-iso-itu-t(2)                           country(16) us(840) organization(1) gov(101)                           csor(3) nistalgorithm(4) hashalgs(2) 1 }      id-sha384  OBJECT IDENTIFIER  ::=  { joint-iso-itu-t(2)                           country(16) us(840) organization(1) gov(101)                           csor(3) nistalgorithm(4) hashalgs(2) 2 }      id-sha512  OBJECT IDENTIFIER  ::=  { joint-iso-itu-t(2)

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产日韩精品视频一区| 欧美日韩1区2区| 欧美裸体一区二区三区| 国产日韩成人精品| 蜜桃av一区二区在线观看| 99精品国产热久久91蜜凸| 日韩视频一区二区三区在线播放| 国产精品久久影院| 免费观看成人av| 欧美日韩成人激情| 亚洲色图都市小说| 豆国产96在线|亚洲| 欧美va亚洲va香蕉在线| 午夜精品成人在线| 欧美亚一区二区| 中文字幕日韩一区| 成人精品国产免费网站| 国产婷婷一区二区| 国产精品一卡二卡| 久久综合久久鬼色中文字| 青青草91视频| 欧美一区二区三区免费视频| 天天综合网天天综合色| 欧美精品视频www在线观看| 玉足女爽爽91| 一本到三区不卡视频| 综合激情成人伊人| 99精品久久只有精品| 亚洲另类春色校园小说| 色综合久久久久综合体| 亚洲另类中文字| 欧美视频一区二区三区四区| 亚洲图片欧美色图| 欧美日韩精品一区二区天天拍小说| 伊人婷婷欧美激情| 欧美怡红院视频| 亚洲图片自拍偷拍| 欧美一区二区免费观在线| 蜜桃传媒麻豆第一区在线观看| 日韩亚洲欧美在线| 国产米奇在线777精品观看| 久久女同精品一区二区| 国产成人亚洲综合a∨猫咪| 国产日韩亚洲欧美综合| av不卡在线观看| 亚洲国产日日夜夜| 51午夜精品国产| 激情图片小说一区| 国产精品麻豆欧美日韩ww| 99精品视频一区二区三区| 亚洲欧美日韩久久| 欧美精品黑人性xxxx| 久久99精品久久久久久动态图| www久久精品| 一本在线高清不卡dvd| 亚洲成人久久影院| 26uuu精品一区二区| 97国产精品videossex| 婷婷综合久久一区二区三区| 亚洲精品一区二区三区香蕉| 成人avav影音| 日韩在线一区二区三区| 国产午夜精品一区二区三区四区| 91亚洲精品久久久蜜桃| 美女一区二区在线观看| 一区在线播放视频| 欧美一级黄色录像| 97aⅴ精品视频一二三区| 日韩1区2区日韩1区2区| 国产精品久久免费看| 91精品国产品国语在线不卡| 国产v综合v亚洲欧| 日本91福利区| 亚洲视频你懂的| 精品剧情在线观看| 欧美色图在线观看| 9l国产精品久久久久麻豆| 日韩成人一级片| 亚洲免费av高清| 欧美成人一区二区三区| 欧美无乱码久久久免费午夜一区| 久久精工是国产品牌吗| 亚洲影视在线观看| 国产区在线观看成人精品| 91麻豆精品国产综合久久久久久| 成人av网址在线| 狠狠色伊人亚洲综合成人| 香蕉久久夜色精品国产使用方法 | 中文字幕一区二区不卡| 制服丝袜亚洲色图| 色94色欧美sute亚洲线路一久| 国产呦萝稀缺另类资源| 日韩国产欧美三级| 一级精品视频在线观看宜春院| 久久精品日产第一区二区三区高清版| 欧美日韩一级片在线观看| 色综合久久久久久久久久久| 国产精品 欧美精品| 久久99热国产| 美国毛片一区二区三区| 日韩激情中文字幕| 污片在线观看一区二区| 亚洲国产成人高清精品| 夜夜精品浪潮av一区二区三区| 国产精品麻豆久久久| 国产精品污网站| 国产欧美日韩亚州综合| 欧美激情综合五月色丁香| 久久久不卡影院| 亚洲国产高清不卡| 日本一区二区高清| 国产精品家庭影院| 综合中文字幕亚洲| 亚洲裸体xxx| 亚洲一区二区在线视频| 亚洲一区二区三区中文字幕| 一区二区三区日韩欧美精品| 一区二区三区欧美亚洲| 亚洲综合色区另类av| 亚洲一区二区中文在线| 日韩电影在线一区| 国产一区欧美日韩| 国产夫妻精品视频| bt欧美亚洲午夜电影天堂| 91理论电影在线观看| 欧美亚洲综合网| 5858s免费视频成人| 欧美精品一区二区三| 国产日产精品一区| 亚洲在线观看免费视频| 五月激情六月综合| 国内精品伊人久久久久av影院| 国产高清不卡二三区| 播五月开心婷婷综合| 日本高清免费不卡视频| 欧美精品一二三| 久久久一区二区| 一区二区视频在线看| 日韩精品成人一区二区在线| 国产精品一级在线| 91国偷自产一区二区三区成为亚洲经典| 欧美午夜宅男影院| 精品第一国产综合精品aⅴ| 中文字幕免费不卡| 亚洲成人在线免费| 国产精品18久久久久久久网站| 91小宝寻花一区二区三区| 欧美日韩国产另类不卡| 国产亚洲一二三区| 一卡二卡欧美日韩| 国产呦精品一区二区三区网站| 色网综合在线观看| 欧美成人a∨高清免费观看| 国产精品伦一区二区三级视频| 亚洲午夜三级在线| 国产在线精品一区二区夜色| 色噜噜夜夜夜综合网| 精品卡一卡二卡三卡四在线| 一区二区不卡在线视频 午夜欧美不卡在| 偷拍日韩校园综合在线| 顶级嫩模精品视频在线看| 欧美日韩综合一区| 中文字幕精品综合| 日产精品久久久久久久性色| 成人sese在线| 欧美tickling挠脚心丨vk| 亚洲久本草在线中文字幕| 国产永久精品大片wwwapp| 欧美伊人精品成人久久综合97 | 亚洲第一激情av| 丁香啪啪综合成人亚洲小说| 日韩欧美不卡在线观看视频| 一区二区三区丝袜| 不卡的av网站| 国产丝袜欧美中文另类| 奇米影视在线99精品| 色综合视频一区二区三区高清| 国产亚洲一区二区三区四区 | 亚洲国产高清在线| 久久精品国产99| 欧美日韩成人高清| 亚洲综合色区另类av| av激情亚洲男人天堂| 国产日韩精品视频一区| 久久激情五月婷婷| 日韩精品专区在线影院观看| 亚洲国产欧美在线| 91黄色在线观看| 亚洲美女电影在线| 91小宝寻花一区二区三区| 中文字幕中文字幕中文字幕亚洲无线| 国模无码大尺度一区二区三区| 91精品黄色片免费大全| 图片区小说区区亚洲影院| 91福利精品视频| 亚洲高清免费观看| 精品视频资源站| 午夜伦理一区二区| 337p亚洲精品色噜噜| 麻豆久久久久久|