亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? draft-ietf-pkix-rsa-pkalgs-00.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 4 頁
字號:
PKIX Working Group                         R. Housley (RSA Laboratories)Internet Draft                             B. Kaliski (RSA Laboratories)expires June 2003                                          December 2002       Additional Algorithms and Identifiers for RSA Cryptography        for use in the Internet X.509 Public Key Infrastructure       Certificate and Certificate Revocation List (CRL) Profile                  <draft-ietf-pkix-rsa-pkalgs-00.txt>Status of this Memo   This document is an Internet-Draft and is in full conformance with   all provisions of Section 10 of RFC 2026.  Internet-Drafts are   working documents of the Internet Engineering Task Force (IETF), its   areas, and its working groups.  Note that other groups may also   distribute working documents as Internet-Drafts.   Internet-Drafts are draft documents valid for a maximum of six months   and may be updated, replaced, or obsoleted by other documents at any   time.  It is inappropriate to use Internet-Drafts as reference   material or to cite them other than as "work in progress."   The list of current Internet-Drafts can be accessed at   http://www.ietf.org/ietf/1id-abstracts.txt.   The list of Internet-Drafts Shadow Directories can be accessed at   http://www.ietf.org/shadow.html.Abstract   This document supplements RFC 3279.  It describes the conventions for   using the RSASSA-PSS signature algorithm, the RSAES-OAEP key   transport algorithm, and additional one-way hash functions with the   PKCS #1 version 1.5 signature algorithm in the Internet X.509 Public   Key Infrastructure (PKI).  Encoding formats, algorithm identifiers,   and parameter formats are specified.Housley & Kaliski                                               [Page 1]INTERNET DRAFT                                             December 2002Table of Contents    1  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   3       1.1  Terminology  . . . . . . . . . . . . . . . . . . . . . .   3       1.2  RSA Public Keys  . . . . . . . . . . . . . . . . . . . .   3    2  Common Functions  . . . . . . . . . . . . . . . . . . . . . .   5       2.1  One-way Hash Functions . . . . . . . . . . . . . . . . .   6       2.2  Mask Generation Functions  . . . . . . . . . . . . . . .   7    3  RSASSA-PSS Signature Algorithm  . . . . . . . . . . . . . . .   7       3.1  RSASSA-PSS Public Keys . . . . . . . . . . . . . . . . .   8       3.2  RSASSA-PSS Signature Values  . . . . . . . . . . . . . .  10    4  RSAES-OAEP Key Transport Algorithm  . . . . . . . . . . . . .  10       4.1  RSAES-OAEP Public Keys . . . . . . . . . . . . . . . . .  11    5  PKCS #1 Version 1.5 Signature Algorithm . . . . . . . . . . .  12    6  ASN.1 Module  . . . . . . . . . . . . . . . . . . . . . . . .  14    7  References  . . . . . . . . . . . . . . . . . . . . . . . . .  18       7.1  Normative References . . . . . . . . . . . . . . . . . .  18       7.2  Informative References . . . . . . . . . . . . . . . . .  19    8  Security Considerations . . . . . . . . . . . . . . . . . . .  19    9  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  21   10  Author Addresses  . . . . . . . . . . . . . . . . . . . . . .  22   11  Full Copyright Statement  . . . . . . . . . . . . . . . . . .  22Housley & Kaliski                                               [Page 2]INTERNET DRAFT                                             December 20021  Introduction   This document supplements RFC 3279 [PKALGS].  This document describes   the conventions for using the RSASSA-PSS signature algorithm and the   RSAES-OAEP key transport algorithm in the Internet X.509 Public Key   Infrastructure (PKI) [PROFILE].  Both of these RSA-based algorithms   are specified in [P1v2.1].  The algorithm identifiers and associated   parameters for subject public keys that employ either of these   algorithms are specified, and the encoding format for RSASSA-PSS   signatures is specified.  Also, the algorithm identifiers for using   the SHA-256, SHA-384, and SHA-512 one-way hash functions with the   PKCS #1 version 1.5 signature algorithm [P1v1.5] are specified.   This specification supplements RFC 3280 [PROFILE], which profile the   X.509 Certificates and Certificate Revocation Lists (CRLs) for use in   the Internet.  This specification extends the list of algorithms   discussed in RFC 3279 [PKALGS].  The X.509 Certificate and CRL   definitions use ASN.1 [X.208-88], the Basic Encoding Rules (BER)   [X.209-88], and the Distinguished Encoding Rules (DER) [X.509-88].   This specification defines the contents of the signatureAlgorithm,   signatureValue, signature, and subjectPublicKeyInfo fields within   Internet X.509 certificates and CRLs.  For each algorithm, the   appropriate alternatives for the keyUsage extension are provided.1.1  Terminology   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this   document are to be interpreted as described in RFC 2119 [STDWORDS].1.2  RSA Public Keys   RFC 3280 [PROFILE] specifies the profile for using X.509 Certificates   in Internet applications.  When a RSA public key will be used for   RSASSA-PSS digital signatures or RSAES-OAEP key transport, the   conventions specified in this section augment RFC 3280.   Traditionally, the rsaEncryption object identifier is used to   identify RSA public keys.  However, to implement all of the   recommendations described in the Security Considerations section of   this document (see section 8), the certificate user needs to be able   to determine the form of digital signature or key transport that the   RSA private key owner associates with the public key.   The rsaEncryption object identifier continues to identify the subject   public key when the RSA private key owner does not wish to limit the   use of the public key exclusively to either RSASSA-PSS or RSAES-OAEP.Housley & Kaliski                                               [Page 3]INTERNET DRAFT                                             December 2002   In this case, the rsaEncryption object identifier MUST be used in the   algorithm field within the subject public key information, and the   parameters field MUST contain NULL.      rsaEncryption  OBJECT IDENTIFIER  ::=  { pkcs-1 1 }   Further discussion of the conventions associated with use of the   rsaEncryption object identifier can be found in RFC 3279 (see   [PKALGS], section 2.3.1).   When the RSA private key owner wishes to limit the use of the public   key exclusively to RSASSA-PSS, then the id-RSASSA-PSS object   identifier MUST be used in the algorithm field within the subject   public key information, and the parameters field MUST contain RSASSA-   PSS-params.  The id-RSASSA-PSS object identifier value and the   RSASSA-PSS-params syntax are fully described in section 3 of this   document.   When the RSA private key owner wishes to limit the use of the public   key exclusively to RSAES-OAEP, then the id-RSAES-OAEP object   identifier MUST be used in the algorithm field within the subject   public key information, and the parameters field MUST contain RSAES-   OAEP-params.  The id-RSAES-OAEP object identifier value and the   RSAES-OAEP-params syntax are fully described in section 4 of this   document.   Regardless of the object identifier used, the RSA public key is   encoded in the same manner in the subject public key information.   The RSA public key MUST be encoded using the type RSAPublicKey type:      RSAPublicKey  ::=  SEQUENCE  {         modulus            INTEGER,    -- n         publicExponent     INTEGER  }  -- e   Here, the modulus is the modulus n, and publicExponent is the public   exponent e.  The DER encoded RSAPublicKey is carried in the   subjectPublicKey BIT STRING within the subject public key   information.   The intended application for the key MAY be indicated in the key   usage certificate extension (see [PROFILE], section 4.2.1.3).   If the keyUsage extension is present in an end entity certificate   that conveys an RSA public key with the id-RSASSA-PSS object   identifier, then the key usage extension MUST contain one or both ofHousley & Kaliski                                               [Page 4]INTERNET DRAFT                                             December 2002   the following values:      nonRepudiation; and      digitalSignature.   If the keyUsage extension is present in a certification authority   certificate that conveys an RSA public key with the id-RSASSA-PSS   object identifier, then the key usage extension MUST contain one or   more of the following values:      nonRepudiation;      digitalSignature;      keyCertSign; and      cRLSign.   When a certificate that conveys an RSA public key with the id-RSASSA-   PSS object identifier, the certificate user MUST only use the   certified RSA public key for RSASSA-PSS operations, and the   certificate user MUST perform those operations using the one-way hash   function, mask generation function, and trailer field identified in   the subject public key algorithm identifier parameters within the   certificate.   If the keyUsage extension is present in a certificate that conveys an   RSA public key with the id-RSAES-OAEP object identifier, then the key   usage extension MUST contain only the following values:      keyEncipherment; and      dataEncipherment.   However, both keyEncipherment and dataEncipherment SHOULD NOT be   present.   When a certificate that conveys an RSA public key with the id-RSAES-   OAEP object identifier, the certificate user MUST only use the   certified RSA public key for RSAES-OAEP operations, and the   certificate user MUST perform those operations using the one-way hash   function and mask generation function identified in the subject   public key algorithm identifier parameters within the certificate.2  Common Functions   The RSASSA-PSS signature algorithm and the RSAES-OAEP key transport   algorithm make use of one-way hash functions and mask generation   functions.Housley & Kaliski                                               [Page 5]INTERNET DRAFT                                             December 20022.1  One-way Hash Functions   PKCS #1 version 2.1 [P1v2.1] supports four one-way hash functions for   use with the RSASSA-PSS signature algorithm and the RSAES-OAEP key   transport algorithm: SHA-1, SHA-256, SHA-384, and SHA-512 [SHA2].   While support for additional one-way hash functions could be added in   the future, no other one-way hash functions are supported by this   specification.   These one-way hash functions are identified by the following object   identifiers:      id-sha1  OBJECT IDENTIFIER  ::=  { iso(1)                           identified-organization(3) oiw(14)                           secsig(3) algorithms(2) 26 }      id-sha256  OBJECT IDENTIFIER  ::=  { joint-iso-itu-t(2)                           country(16) us(840) organization(1) gov(101)                           csor(3) nistalgorithm(4) hashalgs(2) 1 }      id-sha384  OBJECT IDENTIFIER  ::=  { joint-iso-itu-t(2)                           country(16) us(840) organization(1) gov(101)                           csor(3) nistalgorithm(4) hashalgs(2) 2 }      id-sha512  OBJECT IDENTIFIER  ::=  { joint-iso-itu-t(2)

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美午夜精品一区二区三区| 中文字幕在线观看一区| 日韩二区在线观看| 中文字幕不卡一区| 欧美丰满一区二区免费视频 | 91精品国产全国免费观看| 亚洲精品成人a在线观看| 欧美美女网站色| proumb性欧美在线观看| 亚洲欧美日韩电影| 欧美无人高清视频在线观看| 91在线观看地址| 免费成人深夜小野草| 欧美一卡二卡三卡四卡| 欧美精品粉嫩高潮一区二区| 国产不卡视频在线播放| 亚洲亚洲人成综合网络| 一区二区三区欧美在线观看| 555www色欧美视频| 色综合色综合色综合色综合色综合 | 欧美影院一区二区| 国产福利91精品一区二区三区| 国产在线观看免费一区| av在线不卡免费看| 精品亚洲成a人在线观看 | 中文字幕不卡在线观看| 国产亚洲精品超碰| 在线不卡的av| 日韩女优制服丝袜电影| 欧美日韩精品一区视频| 国产欧美日韩另类视频免费观看| 日韩一区二区不卡| 99精品热视频| 在线观看一区不卡| 日韩美女视频一区二区在线观看| 久久亚洲精华国产精华液| 色综合天天综合色综合av | 国产在线视频一区二区| 蜜臀va亚洲va欧美va天堂| 高清不卡在线观看| 日韩三级在线免费观看| 久久综合av免费| 中文字幕一区免费在线观看| 亚洲免费毛片网站| 久久精品72免费观看| 国产91精品久久久久久久网曝门 | 国产精品青草综合久久久久99| 亚洲精品乱码久久久久久日本蜜臀| 亚洲一区视频在线| 婷婷夜色潮精品综合在线| 国产精品性做久久久久久| 欧美色综合天天久久综合精品| 日韩视频中午一区| 亚洲三级久久久| 国产又粗又猛又爽又黄91精品| 日韩不卡在线观看日韩不卡视频| 视频在线观看91| 国产综合色视频| 欧美视频在线一区| 国产精品久久久久影院色老大| 日韩精品免费视频人成| 91精品蜜臀在线一区尤物| 欧美精品色综合| 国产亚洲欧美日韩日本| 精品一区二区免费| 成人理论电影网| 中文字幕一区二区三区在线观看| 亚洲一区二区三区四区的| 成人黄色国产精品网站大全在线免费观看| 欧美亚洲一区二区在线观看| 亚洲一区二区四区蜜桃| 99r国产精品| 蜜桃av一区二区三区电影| 国产女人水真多18毛片18精品视频 | 亚洲人成影院在线观看| 亚洲欧洲三级电影| 日本道在线观看一区二区| 国产亚洲精品超碰| 国产精品一区一区| 国产精品欧美一级免费| 在线中文字幕一区二区| 久久99精品国产.久久久久| 欧美一区二区三区啪啪| 激情综合色播激情啊| 视频在线观看一区| 亚洲精品在线三区| 国产**成人网毛片九色| 视频一区中文字幕国产| 久久精品一区二区| 久久久五月婷婷| 99在线精品观看| 蜜桃免费网站一区二区三区| 亚洲制服丝袜av| 日韩欧美国产成人一区二区| 国产乱码精品一区二区三区忘忧草 | 亚洲精品国产一区二区精华液| 欧美视频在线一区二区三区| 国产黄色成人av| 国产精品国产三级国产普通话蜜臀 | 欧美日韩一区二区电影| 成人一区二区三区| 久久爱www久久做| 国产尤物一区二区在线| 亚洲欧美日韩电影| 亚洲国产欧美在线| 日韩久久一区二区| 国产精品伦理在线| 日韩一级大片在线观看| 欧洲中文字幕精品| 国产在线播放一区| 精品影院一区二区久久久| 久88久久88久久久| 国产麻豆9l精品三级站| 美女一区二区视频| 亚洲精品国产无天堂网2021| 国产免费成人在线视频| 日韩一区欧美一区| 日本不卡高清视频| 免费看欧美女人艹b| 国模一区二区三区白浆| 欧美日本一区二区三区| 欧美欧美欧美欧美首页| 成人黄色片在线观看| 国产69精品久久99不卡| 国产一区亚洲一区| 欧美变态凌虐bdsm| 亚洲男女一区二区三区| 国产综合久久久久影院| 国产精品一二三四| 精品国产自在久精品国产| 国产剧情一区在线| 91麻豆精品国产无毒不卡在线观看 | 免费亚洲电影在线| 国产精品一级黄| 91蜜桃传媒精品久久久一区二区 | 国产福利91精品| 91丝袜美腿高跟国产极品老师| 在线精品观看国产| 亚洲欧美日韩一区二区三区在线观看| 国产精品久久久久一区二区三区| 国模娜娜一区二区三区| 国产午夜精品久久| 国产精品伦理一区二区| 亚洲精品久久久蜜桃| 99久久99久久精品国产片果冻 | 美洲天堂一区二卡三卡四卡视频| 精品一区二区久久| 色妹子一区二区| 国产农村妇女毛片精品久久麻豆| 午夜精品影院在线观看| 欧美三级中文字幕| 久久精品国产**网站演员| 欧美日韩亚洲综合在线 | 成人不卡免费av| 日韩久久久久久| 成人午夜视频免费看| 精品日韩在线观看| 国产成人精品一区二区三区网站观看| 色伊人久久综合中文字幕| 亚洲欧美色图小说| 在线播放中文字幕一区| 婷婷久久综合九色综合伊人色| 欧美精品精品一区| 黄色小说综合网站| 亚洲精品一区二区三区福利| 亚洲午夜私人影院| 久久在线观看免费| 在线成人免费观看| 成人免费视频免费观看| 亚洲资源在线观看| 亚洲黄色小说网站| 国产精品麻豆网站| 色先锋久久av资源部| 麻豆精品在线看| 国产精品福利av| 精品噜噜噜噜久久久久久久久试看| 久久精品国产色蜜蜜麻豆| 久久这里只有精品6| 欧美精品第一页| 欧美亚洲国产一区二区三区| 91丨九色porny丨蝌蚪| 国产一区在线看| 免费在线观看成人| 午夜在线成人av| 久久久久久久久久美女| 精品国产3级a| 欧美一区二区网站| 天天综合日日夜夜精品| 欧洲精品一区二区| 一区二区三区日韩欧美| 午夜欧美2019年伦理| 亚洲一区av在线| 亚洲美女淫视频| 日韩高清欧美激情| 亚洲国产婷婷综合在线精品| 国产精品成人午夜| 国产午夜亚洲精品不卡| 亚洲视频狠狠干| 亚洲男人的天堂一区二区 | 在线观看国产日韩|