亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? draft-ietf-pkix-rsa-pkalgs-00.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 4 頁
字號(hào):
                        { id-RSAES-OAEP,                           { sha384Identifier,                             mgf1SHA384Identifier,                             pSpecifiedEmptyIdentifier  }  }   rSAES-OAEP-SHA512-Identifier  AlgorithmIdentifier  ::=                        { id-RSAES-OAEP,                           { sha512Identifier,                             mgf1SHA512Identifier,                             pSpecifiedEmptyIdentifier  }  }   -- ===================   --   Main structures   -- ===================   -- Used in SubjectPublicKeyInfo of X.509 Certificate.   RSAPublicKey  ::=  SEQUENCE  {      modulus           INTEGER,    -- n      publicExponent    INTEGER  }  -- eHousley & Kaliski                                              [Page 17]INTERNET DRAFT                                             December 2002   -- AlgorithmIdentifier parameters for id-RSASSA-PSS.   -- Note that the tags in this Sequence are explicit.   RSASSA-PSS-params  ::=  SEQUENCE  {      hashAlgorithm     [0] HashAlgorithm DEFAULT                               sha1Identifier,      maskGenAlgorithm  [1] MaskGenAlgorithm DEFAULT                               mgf1SHA1Identifier,      saltLength        [2] INTEGER DEFAULT 20,      trailerField      [3] INTEGER DEFAULT 1  }   HashAlgorithm  ::=  AlgorithmIdentifier   MaskGenAlgorithm  ::=  AlgorithmIdentifier   -- AlgorithmIdentifier parameters for id-RSAES-OAEP.   -- Note that the tags in this Sequence are explicit.   RSAES-OAEP-params  ::=  SEQUENCE  {      hashFunc          [0] AlgorithmIdentifier DEFAULT                               sha1Identifier,      maskGenFunc       [1] AlgorithmIdentifier DEFAULT                               mgf1SHA1Identifier,      pSourceFunc       [2] AlgorithmIdentifier DEFAULT                               pSpecifiedEmptyIdentifier  }   END7  References   This section provides normative and informative references.7.1  Normative References   [P1v1.5]   Kaliski, B., "PKCS #1: RSA Encryption Version 1.5",              RFC 2313, March 1998.   [P1v2.1]   J. Jonsson, J., and B. Kaliski, "PKCS #1: RSA              Cryptography Specifications Version 2.1", Internet-Draft,              August 2002.  <draft-jonsson-pkcs1-v2dot1-00.txt>   [PROFILE]  Housley, R., Polk, W., Ford, W. and D. Solo, "Internet              X.509 Public Key Infrastructure: Certificate and CRL              Profile", RFC 3280, April 2002.Housley & Kaliski                                              [Page 18]INTERNET DRAFT                                             December 2002   [SHA2]     National Institute of Standards and Technology (NIST),              FIPS 180-2: Secure Hash Standard, 1 August 2002.   [STDWORDS] S. Bradner, "Key Words for Use in RFCs to Indicate              Requirement Levels", RFC 2119, March 1997.   [X.208-88] CCITT Recommendation X.208: Specification of Abstract              Syntax Notation One (ASN.1), 1988.   [X.209-88] CCITT Recommendation X.209: Specification of Basic              Encoding Rules for Abstract Syntax Notation One (ASN.1),              1988.   [X.509-88] CCITT Recommendation X.509: The Directory -              Authentication Framework.  1988.7.2  Informative References   [CMS]      Housley, R, "Cryptographic Message Syntax", RFC 3369,              August 2002.   [GUIDE]    National Institute of Standards and Technology,              Second Draft: "Key Management Guideline, Part 1:              General Guidance."  June 2002.              [http://csrc.nist.gov/encryption/kms/guideline-1.pdf]   [P1363a]   IEEE P1363 working group, IEEE P1363a D11: Standard              Specifications for Public Key Cryptography: Additional              Techniques, December 16, 2002              Available from http://grouper.ieee.org/groups/1363/.   [PKALGS]   Polk, W., Housley, R., and L. Bassham, "Algorithms and              Identifiers for the Internet X.509 Public Key              Infrastructure Certificate and Certificate Revocation              Lists (CRL) Profile", RFC 3279, April 2002.   [RANDOM]   Eastlake, D., Crocker, S. and J. Schiller, "Randomness              Recommendations for Security, RFC 1750, December 1994.8  Security Considerations   This specification supplements RFC 3280 [PROFILE].  The security   considerations section of that document applies to this specification   as well.   Implementations must protect the RSA private key.  Compromise of the   RSA private key may result in the disclosure of all messagesHousley & Kaliski                                              [Page 19]INTERNET DRAFT                                             December 2002   protected with that key.   The generation of RSA public/private key pairs relies on a random   numbers.  The use of inadequate pseudo-random number generators   (PRNGs) to generate cryptographic keys can result in little or no   security.  An attacker may find it much easier to reproduce the PRNG   environment that produced the keys, searching the resulting small set   of possibilities, rather than brute force searching the whole key   space.  The generation of quality random numbers is difficult.  RFC   1750 [RANDOM] offers important guidance in this area.   Generally, good cryptographic practice employs a given RSA key pair   in only one scheme.  This practice avoids the risk that vulnerability   in one scheme may compromise the security of the other, and may be   essential to maintain provable security.  While PKCS #1 Version 1.5   [P1v1.5] has been employed for both key transport and digital   signature without any known bad interactions, such a combined use of   an RSA key pair is not recommended in the future.  Therefore, an RSA   key pair used for RSASSA-PSS signature generation should not also be   used for other purposes.  For similar reasons, one RSA key pair   should always be used with the same RSASSA-PSS parameters.  Likewise,   an RSA key pair used for RSAES-OAEP key transport should not also be   used for other purposes.  For similar reasons, one RSA key pair   should always be used with the same RSAES-OAEP parameters.   This specification requires implementation to support the SHA-1 one-   way hash function for interoperability, but support for other one-way   hash function is permitted.  At the time of this writing, the best   (known) collision attacks against SHA-1 are generic attacks with   complexity 2^80, where 80 is one-half the bit length of the hash   value.  In general, when a one-way hash function is used with a   digital signature scheme, a collision attack is easily translated   into a signature forgery.  Therefore, the use of SHA-1 in a digital   signature scheme provides a security level of no more than 80 bits.   If a greater level of security is desired, then a secure one-way hash   function with a longer hash value is needed.  SHA-256, SHA-384, and   SHA-512 are reasonable choices [SHA2].   The metrics for choosing a one-way hash function for use in digital   signatures do not directly apply to the RSAES-OAEP key transport   algorithm, since a collision attack on the one-way hash function does   not directly translate into an attack on the key transport algorithm,   unless the encoding parameters P varies (in which case a collision   the hash value for different encoding parameters might be exploited).   Nevertheless, for consistency with the practice for digital signature   schemes, and in case the encoding parameters P is not the empty   string, it is recommended that the same rule of thumb be applied toHousley & Kaliski                                              [Page 20]INTERNET DRAFT                                             December 2002   selection of a one-way hash function for use with RSAES-OAEP.  That   is, the one-way hash function should be selected so that the bit   length of the hash value is at least twice as long as the desired   security level in bits.   This specification does not constrain the size of public keys or   their parameters for use in the Internet PKI.  However, the key size   selected impacts the strength achieved when implementing   cryptographic services.  Selection of appropriate key sizes is   critical to implementing appropriate security.  However, a 1024-bit   RSA public key and SHA-1 both provide a security level of about 80   bits.  In [GUIDE], the National Institute of Standards and Technology   (NIST) suggests that a security level of 80 bits is adequate for the   protection of sensitive information until 2015.  If a security level   greater than 80 bits is needed, then a longer RSA public key and a   secure one-way hash function with a longer hash value are needed.   Again, SHA-256, SHA-384, and SHA-512 are reasonable choices for such   a one-way hash function.  For this reason, the algorithm identifiers   for these one-way hash functions are included in the ASN.1 module in   section 5.   When using RSASSA-PSS, the same one-way hash function should be   employed for the hashAlgorithm and the maskGenAlgorithm, but it is   not required.  Using the same one-way hash function helps with   security analysis, and it reduces implementation complexity.   When using RSAES-OAEP, the same one-way hash function should be   employed for the hashFunc and the maskGenFunc, but it is not   required.  Using the same one-way hash function helps with security   analysis, and it reduces implementation complexity.9  IANA Considerations   Within the certificates and CRLs, algorithms are identified by object   identifiers.  All of the object identifiers used in this document   were assigned in Public-Key Cryptography Standards (PKCS) documents   or by the National Institute of Standards and Technology (NIST).  No   further action by the IANA is necessary for this document or any   anticipated updates.Housley & Kaliski                                              [Page 21]INTERNET DRAFT                                             December 200210  Author Addresses   Russell Housley   RSA Laboratories   918 Spring Knoll Drive   Herndon, VA 20170   USA   rhousley@rsasecurity.com   Burt Kaliski   RSA Laboratories   174 Middlesex Turnpike   Bedford, MA 01730   USA   bkaliski@rsasecurity.com11  Full Copyright Statement   Copyright (C) The Internet Society (2002). All Rights Reserved.   This document and translations of it may be copied and furnished to   others, and derivative works that comment on or otherwise explain it   or assist in its implementation may be prepared, copied, published   and distributed, in whole or in part, without restriction of any   kind, provided that the above copyright notice and this paragraph are   included on all such copies and derivative works.   In addition, the ASN.1 modules presented in Section 5 may be used in   whole or in part without inclusion of the copyright notice.  However,   this document itself may not be modified in any way, such as by   removing the copyright notice or references to the Internet Society   or other Internet organizations, except as needed for the purpose of   developing Internet standards in which case the procedures for   copyrights defined in the Internet Standards process shall be   followed, or as required to translate it into languages other than   English.   The limited permissions granted above are perpetual and will not be   revoked by the Internet Society or its successors or assigns. This   document and the information contained herein is provided on an "AS   IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK   FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT   LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL   NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY   OR FITNESS FOR A PARTICULAR PURPOSE.Housley & Kaliski                                              [Page 22]

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
成人黄色一级视频| 一区二区三区中文免费| 老色鬼精品视频在线观看播放| 欧美日韩免费观看一区二区三区| 亚洲夂夂婷婷色拍ww47 | 亚洲丝袜精品丝袜在线| 成人国产电影网| 亚洲精品成人悠悠色影视| 欧美日高清视频| 久久99久久99小草精品免视看| 久久一区二区三区四区| 国产·精品毛片| 曰韩精品一区二区| 日韩视频123| 成人禁用看黄a在线| 亚洲第一福利一区| 精品日韩欧美在线| 99vv1com这只有精品| 午夜精品久久久久久久久| 26uuu亚洲婷婷狠狠天堂| aaa欧美日韩| 国产午夜精品久久久久久久| 91老司机福利 在线| 日韩**一区毛片| 日本一区二区三区久久久久久久久不 | 亚洲夂夂婷婷色拍ww47| 日本久久一区二区| 日本中文字幕不卡| 国产精品国产三级国产普通话蜜臀| 色婷婷国产精品综合在线观看| 日本视频一区二区| 国产精品伦一区二区三级视频| 欧美日韩精品一区二区在线播放| 久久精品国产久精国产爱| 中文字幕欧美一| 日韩精品一区二区三区老鸭窝| 99这里都是精品| 久久97超碰国产精品超碰| 亚洲精品国产一区二区精华液| 欧美变态tickle挠乳网站| 色哟哟在线观看一区二区三区| 蜜桃av一区二区三区| 一区二区三区日韩精品| 久久精品视频在线看| 欧美二区乱c少妇| 99re视频精品| 国内精品久久久久影院薰衣草| 亚洲精品美腿丝袜| 国产三级精品视频| 91精品婷婷国产综合久久| av一区二区三区| 国产乱码字幕精品高清av| 视频一区国产视频| 亚洲激情网站免费观看| 国产精品免费视频一区| 久久综合九色综合久久久精品综合 | 欧美一区二区福利视频| a级高清视频欧美日韩| 国产一区不卡视频| 麻豆国产精品一区二区三区 | 欧美性大战久久久久久久蜜臀| 从欧美一区二区三区| 国产另类ts人妖一区二区| 日本vs亚洲vs韩国一区三区二区| 一区av在线播放| 亚洲欧美日韩小说| 亚洲视频在线观看三级| 亚洲国产精品国自产拍av| 国产午夜亚洲精品理论片色戒| 精品国产亚洲一区二区三区在线观看| 欧美精品久久一区二区三区| 欧美三级乱人伦电影| 色综合天天综合色综合av | 国产亚洲污的网站| 国产喂奶挤奶一区二区三区| 亚洲精品一区二区三区精华液| 91精品福利在线一区二区三区 | 99re这里都是精品| 99久免费精品视频在线观看| eeuss鲁片一区二区三区| 成人avav影音| 色综合久久66| 欧美日韩国产综合草草| 在线亚洲人成电影网站色www| 一本色道久久综合精品竹菊| 日本精品视频一区二区| 欧美亚洲国产一区二区三区va | 欧美一区二区福利在线| 日韩一区二区三免费高清| 日韩免费成人网| 国产亚洲污的网站| 亚洲人123区| 亚洲影院在线观看| 日韩高清在线不卡| 国产精品99久久久久| 欧美日韩一卡二卡三卡| 欧美精品亚洲一区二区在线播放| 91精品午夜视频| 久久久国产精品不卡| 中文字幕在线一区| 亚洲国产日韩a在线播放性色| 日韩电影免费在线| 国产成人高清视频| 91久久国产综合久久| 欧美一区二区三区四区五区 | 久久新电视剧免费观看| 国产精品美女久久久久久久久久久| 一区二区三区鲁丝不卡| 日韩不卡一二三区| 懂色av噜噜一区二区三区av| 色呦呦日韩精品| 精品奇米国产一区二区三区| 国产精品狼人久久影院观看方式| 亚洲成a人在线观看| 国产剧情av麻豆香蕉精品| 色狠狠av一区二区三区| 日韩欧美你懂的| 亚洲色欲色欲www| 蜜桃久久久久久久| 91免费版在线| 精品国产露脸精彩对白| 亚洲精品免费一二三区| 国产又黄又大久久| 色婷婷国产精品综合在线观看| 精品剧情v国产在线观看在线| 亚洲欧洲综合另类| 国产一区激情在线| 欧美在线一区二区| 久久久国产一区二区三区四区小说 | 一本色道亚洲精品aⅴ| 欧美老人xxxx18| 国产精品久久午夜夜伦鲁鲁| 日韩av成人高清| 欧美性猛交xxxxxx富婆| 国产精品午夜电影| 精品综合久久久久久8888| 色狠狠色噜噜噜综合网| 国产欧美中文在线| 天天色天天操综合| 色94色欧美sute亚洲线路一ni| 久久毛片高清国产| 免费成人结看片| 欧美日韩卡一卡二| 亚洲男人的天堂av| 成人综合在线观看| 久久色.com| 激情深爱一区二区| 日韩一二三区视频| 亚洲午夜电影网| 色婷婷国产精品久久包臀| 国产精品国产三级国产普通话99| 精品一二线国产| 91精品国产综合久久久久| 亚洲国产裸拍裸体视频在线观看乱了| 成人激情免费视频| 国产精品久久久久天堂| 福利一区二区在线| 久久精品人人做| 国产一区二区三区精品欧美日韩一区二区三区| 欧美日韩精品福利| 天天操天天色综合| 欧美剧情电影在线观看完整版免费励志电影| 国产精品久久久久久久久久久免费看 | 亚洲视频 欧洲视频| 成人激情黄色小说| 久久精品日产第一区二区三区高清版 | 亚洲私人黄色宅男| 91视频观看视频| 最新日韩av在线| 91香蕉国产在线观看软件| 亚洲视频在线一区| 欧美在线一二三四区| 亚洲成人动漫精品| 69精品人人人人| 亚洲成人免费视| 欧美精品日韩一本| 九一九一国产精品| 欧美国产丝袜视频| 91欧美激情一区二区三区成人| 一区二区三区不卡视频在线观看| 欧美专区日韩专区| 日韩精品亚洲专区| 精品成人一区二区| 高清不卡一区二区| 亚洲同性gay激情无套| 欧美无乱码久久久免费午夜一区| 日韩电影一区二区三区四区| 欧美成人福利视频| 成人精品免费视频| 一区二区三区欧美在线观看| 777色狠狠一区二区三区| 麻豆成人久久精品二区三区红| 2023国产精品自拍| 91在线porny国产在线看| 午夜av区久久| 国产偷v国产偷v亚洲高清| 色综合天天做天天爱| 蜜桃一区二区三区四区| 国产日韩欧美不卡在线| 色美美综合视频|