One document matched: draft-ietf-pkix-sha2-dsa-ecdsa-06.txt

Differences from draft-ietf-pkix-sha2-dsa-ecdsa-05.txt


  PKIX Working Group                    Q. Dang     (NIST) 
  Internet Draft                        S. Santesson  
  Intended Category: Standards Track    K. Moriarty  (RSA) 
                                 D. Brown (Certicom Corp.) 
                                        T. Polk     (NIST)                   
                                            March 6, 2009 
  Expires: September 6, 2009                              
          
          
                                 

             Internet X.509 Public Key Infrastructure:         
        Additional Algorithms and Identifiers for DSA and ECDSA                   
              <draft-ietf-pkix-sha2-dsa-ecdsa-06.txt> 


       Status of this Memo 

       This Internet-Draft is submitted to IETF in full 
       conformance with the provisions of BCP 78 and BCP 
       79. 

       Internet-Drafts are working documents of the 
       Internet Engineering Task Force (IETF), its areas, 
       and its working groups. Note that other groups may 
       also distribute working documents as Internet-
       Drafts. 

       Internet-Drafts are draft documents valid for a 
       maximum of six months and may be updated, 
       replaced, or obsoleted by other documents at any 
       time. It is inappropriate to use Internet-Drafts 
       as reference material or to cite them other than 
       as "work in progress". 

       The list of current Internet-Drafts can be 
       accessed at http://www.ietf.org/ietf/1id-
       abstracts.txt 

       The list of Internet-Draft Shadow Directories can 
       be accessed at http://www.ietf.org/shadow.html. 

       Copyright Notice 

       Copyright (c) 2009 IETF Trust and the persons 
       identified as the document authors. All rights 
       reserved. 
        
       This document is subject to BCP 78 and the IETF 
       Trust's Legal Provisions Relating to IETF 
       Documents
 
  Dang, et al.  Expires September 6, 2009          [Page 1] 
  
  Internet-Draft          DSA/ECDSA              March 2009 
  

       (http://trustee.ietf.org/license-info) in effect 
       on the date of publication of this document. 
       Please review these documents carefully, as they 
       describe your rights and restrictions with respect 
       to this document.                                     
        

       Abstract 

       This document supplements RFC 3279. It specifies 
       algorithm identifiers and ASN.1 encoding rules for 
       the Digital Signature Algorithm (DSA) and Elliptic 
       Curve Digital Signature Algorithm (ECDSA) digital 
       signatures when using SHA-224, SHA-256, SHA-384 or 
       SHA-512 as hashing algorithm. This specification 
       applies to the Internet X.509 Public Key  
       Infrastructure (PKI) when digital signatures are 
       used to sign certificates and certificate 
       revocation lists (CRLs).  
        
       The key words "MUST", "MUST NOT", "REQUIRED", 
       "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", 
       "RECOMMENDED", "MAY", and "OPTIONAL" in this 
       document are to be interpreted as described in 
       [RFC 2119]. 


          Table of Contents 


      1. Introduction.............................................3 
      2. One-way Hash Functions...................................3 
      3. Signature Algorithms.....................................4 
       3.1 DSA Signature Algorithm................................5 
       3.2 ECDSA Signature Algorithm..............................7 
      4. ASN.1 Module.............................................8 
      5. Security Considerations.................................10 
      6. References..............................................12 
       6.1   Normative references:...............................12 
       6.2   Informative references:.............................13 
      7. Authors' Addresses......................................14 
      8. IANA Considerations.....................................15 
       
        

        


          
  Dang, et al.    Expires September 6, 2009           [Page 2] 
  
  Internet-Draft          DSA/ECDSA                 March 2009 
  

  1. Introduction 


       This specification supplements [RFC 3279], 
       "Algorithms and Identifiers for the Internet X.509 
       Public Key Infrastructure Certificate and 
       Certificate Revocation List (CRL) Profile" and 
       extends the list of algorithms defined for use in 
       the Internet PKI. This document specifies 
       algorithm identifiers and ASN.1 [X.690] encoding 
       rules for DSA and ECDSA digital signatures in 
       certificates and CRLs when using one of the SHA2 
       hash algorithms (SHA-224, SHA-256, SHA-384, and 
       SHA-512) as the hash algorithm. 

       This specification defines the contents of the 
       signatureAlgorithm, signatureValue and signature 
       fields within Internet X.509 certificates and CRLs 
       when these objects are signed using DSA or ECDSA 
       with a SHA2 hash algorithm. These fields are more 
       fully described in [RFC 5280]. 

       This document profiles material presented in the 
       "Secure Hash Standard" [FIPS 180-3], "Public Key 
       Cryptography for the Financial Services Industry: 
       The Elliptic Curve Digital Signature Standard 
       (ECDSA)" [X9.62], and the "Digital Signature 
       Standard" [FIPS 186-3].    
        
       Algorithm identifiers and encoding rules for RSA, 
       DSA and ECDSA when used with SHA-1 are specified 
       in [RFC 3279]. Algorithm identifiers and encoding 
       rules for RSA when used with SHA2 hash algorithms 
       are specified in [RFC 4055].  

  2. One-way Hash Functions 

       This section identifies four additional hash 
       algorithms for use with DSA and ECDSA in the 
       Internet X.509 certificate and CRL profile [RFC 
       5280].  










          
  Dang, et al.    Expires September 6, 2009         [Page 3] 
  
  Internet-Draft          DSA/ECDSA               March 2009 
  

       SHA-224, SHA-256, SHA-384, and SHA-512 produce a 
       224-bit, 256-bit, 384-bit and 512-bit "hash" of 
       the input respectively and are fully described in 
       the Federal Information Processing Standard 180-3 
       [FIPS  180-3]. 

       The listed one-way hash functions are identified 
       by the following object identifiers (OIDs):  

           id-sha224  OBJECT IDENTIFIER  ::=  { joint-
           iso-itu-t(2) country(16) us(840) 
           organization(1) gov(101) csor(3) 
           nistalgorithm(4) hashalgs(2) 4 } 

           id-sha256  OBJECT IDENTIFIER  ::=  { joint-
           iso-itu-t(2) country(16) us(840) 
           organization(1) gov(101) csor(3) 
           nistalgorithm(4) hashalgs(2) 1 } 

           id-sha384  OBJECT IDENTIFIER  ::=  { joint-
           iso-itu-t(2) country(16) us(840) 
           organization(1) gov(101) csor(3) 
           nistalgorithm(4) hashalgs(2) 2 } 

           id-sha512  OBJECT IDENTIFIER  ::=  { joint-
           iso-itu-t(2) country(16) us(840) 
           organization(1) gov(101) csor(3) 
           nistalgorithm(4) hashalgs(2) 3 } 

       When one of these OIDs appears in an 
       AlgorithmIdentifier, all implementations MUST 
       accept both NULL and absent parameters as legal 
       and equivalent encodings. 

  3. Signature Algorithms 

       Certificates and CRLs conforming to [RFC 5280] may 
       be signed with any public key signature algorithm. 
       The certificate or CRL indicates the algorithm 
       through an identifier, which appears in the 
       signatureAlgorithm field within the Certificate or 
       CertificateList. This algorithm identifier is an 
       OID and has optionally associated parameters. This 
       section denotes algorithm identifiers and 
       parameters that MUST be used in the 
       signatureAlgorithm field in a Certificate or 
       CertificateList.  

        

          
  Dang, et al.    Expires September 6, 2009          [Page 4] 
  
  Internet-Draft          DSA/ECDSA                March 2009 
  

        

       Signature algorithms are always used in 
       conjunction with a one-way hash function. This 
       section identifies OIDs for DSA and ECDSA with 
       SHA-224, SHA-256, SHA-384, and SHA-512. The 
       contents of the parameters component for each 
       signature algorithm vary; details are provided for 
       each algorithm. 

       The data to be signed (e.g., the one-way hash 
       function output value) is formatted for the 
       signature algorithm to be used. Then, a private  
       key operation (e.g., DSA encryption) is performed 
       to generate the signature value. This signature 
       value is then ASN.1 encoded as a BIT STRING and 
       included in the Certificate or CertificateList in 
       the signature field. More detail on how digital 
       signatures are generated can be found in [FIPS 
       186-3]. 

       Entities that validate DSA signatures MUST support 
       SHA-224 and SHA-256. Entities that validate ECDSA 
       signatures MUST support SHA-224 and SHA-256 and 
       should support SHA-384 and SHA-512.    

       3.1  DSA Signature Algorithm 

       The DSA is defined in the Digital Signature 
       Standard (DSS) [FIPS 186-3]. DSA was developed by 
       the U.S. Government, and can be used in 
       conjunction with a SHA2 one-way hash function such 
       as SHA-224 or SHA-256. DSA is fully described in 
       [FIPS 186-3]. 

       [FIPS 186-3] specifies four size-choices for a DSA 
       key pair of the form (public key size, private key 
       size) in bits. The four choices are (1024, 160), 
       (2048, 224), (2048, 256), and (3072, 256). More  
       information can be found in [FIPS 186-3]. For the 
       remainder of this specification, each and every 
       key pair of the DSA key pairs is referred to by 
       the size of its public key. 

       DSA key pairs of 1024 and 2048 bits may be used 
       with SHA-224. DSA key pairs of any of the four 
       sizes may use SHA-256. The following are the OIDs 
       of the DSA digital signature algorithm when used 
       with SHA-224 or SHA-256.    

          
  Dang, et al.    Expires September 6, 2009           [Page 5] 
  
  Internet-Draft          DSA/ECDSA                 March 2009 
  

       When SHA-224 is used, the OID is: 

           id-dsa-with-sha224 OBJECT IDENTIFIER  ::=  { 
           joint-iso-ccitt(2) country(16) us(840) 
           organization(1) gov(101) csor(3) algorithms(4) 
           id-dsa-with-sha2(3) 1 }. 

       When SHA-256 is used, the OID is: 

           id-dsa-with-sha256 OBJECT IDENTIFIER  ::=  { 
           joint-iso-ccitt(2) country(16) us(840) 
           organization(1) gov(101) csor(3) algorithms(4) 
           id-dsa-with-sha2(3) 2 }. 

       The DSA key pair of 3072 bits provides 128 bits of 
       security and provides the most security among all 
       the four sizes of DSA key pairs. More information 
       on security strength assessments of DSA and other 
       cryptographic algorithms can be found in [SP 800-
       57]. A digital signature algorithm has the same 
       security strength as its asymmetric key algorithm 
       like DSA or ECDSA only if its hashing algorithm 
       has at least the same security strength as the 
       asymmetric key algorithm. Therefore, a 128-bit 
       security strength hashing algorithm which is SHA-
       256 will be sufficient to build a 128-bit security 
       strength DSA digital signature algorithm when the 
       DSA key pair of 3072 bits is used. Therefore, it 
       is only needed to specify DSA with SHA-224 and 
       SHA-256 because SHA-256 provides sufficient 
       security for using with any DSA key pair of any of 
       the four size choices. More information on 
       security strengths of the hash functions SHAs 
       specified in [FIPS 180-3] and the digital 
       signature algorithms specified in [FIPS 186-3] can 
       be found in [SP 800-107] and [SP 800-57]. 

       When the id-dsa-with-sha224 or id-dsa-with-sha256 
       algorithm identifier appears in the algorithm 
       field as an AlgorithmIdentifier, the encoding 
       SHALL omit the parameters field. That is, the 
       AlgorithmIdentifier SHALL be a SEQUENCE of one 
       component, the OID id-dsa-with-sha224 or id-dsa-
       with-sha256.  

       Encoding rules for DSA signature values are 
       specified in [RFC 3279]. For completeness, this 
       information is repeated below: 


          
  Dang, et al.    Expires September 6, 2009          [Page 6] 
  
  Internet-Draft          DSA/ECDSA                March 2009 
  

       When signing, the DSA algorithm generates two 
       values commonly referred to as r and s. To easily 
       transfer these two values as one signature, they 
       SHALL be ASN.1 encoded using the following ASN.1  
       structure: 

            Dss-Sig-Value  ::=  SEQUENCE  { 
                                            r  INTEGER, 
                                            s  INTEGER   
                                          }. 
        
       The DSA parameters in the subjectPublicKeyInfo 
       field of the certificate of the issuer SHALL apply 
       to the verification of the signature. 

       3.2  ECDSA Signature Algorithm 

       The Elliptic Curve Digital Signature Algorithm 
       (ECDSA) is defined in, "Public Key Cryptography 
       for the Financial Services Industry: The Elliptic 
       Curve Digital Signature Standard (ECDSA)" [X9.62]. 
       The ASN.1 OIDs used to specify that an ECDSA 
       signature was generated using SHA-224, SHA-256, 
       SHA-384 or SHA-512 are respectively:    
        
           ecdsa-with-SHA224 OBJECT IDENTIFIER ::= { 
           iso(1) member-body(2) us(840) ansi-X9-
           62(10045) signatures(4) ecdsa-with-SHA2(3) 1 
           } 

           ecdsa-with-SHA256 OBJECT IDENTIFIER ::= { 
           iso(1) member-body(2) us(840) ansi-X9-
           62(10045) signatures(4) ecdsa-with-SHA2(3) 2 
           } 

           ecdsa-with-SHA384 OBJECT IDENTIFIER ::= { 
           iso(1) member-body(2) us(840) ansi-X9-
           62(10045) signatures(4) ecdsa-with-SHA2(3) 3 
           } 

           ecdsa-with-SHA512 OBJECT IDENTIFIER ::= { 
           iso(1) member-body(2) us(840) ansi-X9-
           62(10045) signatures(4) ecdsa-with-SHA2(3) 4 
           } 

       When the ecdsa-with-SHA224, ecdsa-with-SHA256, 
       ecdsa-with-SHA384 or ecdsa-with-SHA512 algorithm 
       identifier appears in the algorithm field as an 
       AlgorithmIdentifier, the encoding MUST omit the 
       parameters field. That is, the AlgorithmIdentifier 
          
  Dang, et al.    Expires September 6, 2009          [Page 7] 
  
  Internet-Draft          DSA/ECDSA                March 2009 
  

       SHALL be a SEQUENCE of one component, the OID 
       ecdsa-with-SHA224, ecdsa-with-SHA256, ecdsa-with-
       SHA384 or ecdsa-with-SHA512.   

       Conforming CA implementations MUST specify the 
       hash algorithm explicitly, using the OIDs 
       specified above, when encoding ECDSA/SHA2 
       signatures in certificates and CRLs. 

       Conforming client implementations that process 
       ECDSA signatures with any of the SHA-2 hash 
       algorithms when processing certificates and CRLs 
       MUST recognize the corresponding OIDs specified 
       above.  

       [X9.62] has defined additional OIDs for the ECDSA 
       signature algorithm. 

       Encoding rules for ECDSA signature values are 
       specified in [RFC 3279]. For completeness, this 
       information is repeated below:  

       When signing, the ECDSA algorithm generates two 
       values commonly referred to as r and s. To easily 
       transfer these two values as one signature, they 
       MUST be ASN.1 encoded using the following ASN.1  
       structure: 

            Ecdsa-Sig-Value  ::=  SEQUENCE { 
                                            r  INTEGER, 
                                            s  INTEGER 
                                           }. 
        
       The elliptic curve parameters in the 
       subjectPublicKeyInfo field of the certificate of 
       the issuer MUST be applied to the verification of 
       the signature. The subjectPublicKeyInfo field must 
       be compliant with requirements for Subject Public 
       Key Information field in [Elliptic].   
        
  4. ASN.1 Module  

       DEFINITIONS EXPLICIT TAGS ::= 
        
       BEGIN 
        
       -- EXPORTS ALL -- 
       -- All types and values defined in this module are  
       -- exported for use in other ASN.1 modules. 
        
          
  Dang, et al.    Expires September 6, 2009          [Page 8] 
  
  Internet-Draft          DSA/ECDSA                March 2009 
  

       IMPORTS 

       NONE 

           id-sha224  OBJECT IDENTIFIER  ::=  { joint-
           iso-itu-t(2) country(16) us(840) 
           organization(1) gov(101) csor(3) 
           nistalgorithm(4) hashalgs(2) 4 } 

           id-sha256  OBJECT IDENTIFIER  ::=  { joint-
           iso-itu-t(2) country(16) us(840) 
           organization(1) gov(101) csor(3) 
           nistalgorithm(4) hashalgs(2) 1 } 

           id-sha384  OBJECT IDENTIFIER  ::=  { joint-
           iso-itu-t(2) country(16) us(840) 
           organization(1) gov(101) csor(3) 
           nistalgorithm(4) hashalgs(2) 2 } 

           id-sha512  OBJECT IDENTIFIER  ::=  { joint-
           iso-itu-t(2) country(16) us(840) 
           organization(1) gov(101) csor(3) 
           nistalgorithm(4) hashalgs(2) 3 } 

       -- 
       --DSA with SHA-224 and SHA-256 signature algorithms 
       -- 

        
           id-dsa-with-sha224 OBJECT IDENTIFIER  ::=  { 
           joint-iso-ccitt(2) country(16) us(840) 
           organization(1) gov(101) csor(3) algorithms(4) 
           id-dsa-with-sha2(3) 1 } 
            
           id-dsa-with-sha256 OBJECT IDENTIFIER  ::=  { 
           joint-iso-ccitt(2) country(16) us(840) 
           organization(1) gov(101) csor(3) algorithms(4) 
           id-dsa-with-sha2(3) 2 } 
        
      -- 
       --ECDSA Signatures with SHA-2 Hashes, from X9.62 
       -- 
        
           ecdsa-with-SHA224  ::=  { iso(1) member-
           body(2) us(840) ansi-X9-62(10045) 
           signatures(4) ecdsa-with-SHA2(3) 1 } 
            
           ecdsa-with-SHA256  ::=  { iso(1) member-
           body(2) us(840) ansi-X9-62(10045) 
           signatures(4) ecdsa-with-SHA2(3) 2 }  
          
  Dang, et al.    Expires September 6, 2009          [Page 9] 
  
  Internet-Draft          DSA/ECDSA                March 2009 
  

            
           ecdsa-with-SHA384  ::=  { iso(1) member-
           body(2) us(840) ansi-X9-62(10045) 
           signatures(4) ecdsa-with-SHA2(3) 3 } 
            
           ecdsa-with-SHA512  ::=  { iso(1) member-
           body(2) us(840) ansi-X9-62(10045) 
           signatures(4) ecdsa-with-SHA2(3) 4 } 
        
        
       END -- Definitions 

        

  5. Security Considerations 


       This specification supplements [RFC 3279]. This 
       document covers the DSA and ECDSA algorithms with 
       SHA2 hash functions and the associated 
       considerations.  
        
       The appropriate use of the hash functions in terms 
       of the algorithm strengths and expected time 
       frames for secure use as defined by NIST can be 
       found in Special Publications (SPs) 800-78-1 [SP 
       800-78-1], 800-57 [SP 800-57] and 800-107 [SP 800-
       107].    
          
       FIPS 186-3 fully specifies the DSA digital 
       signature algorithm and defines security 
       requirements for the DSA and ECDSA digital 
       signature algorithms; details can be found in 
       [FIPS 186-3]. ECDSA is fully specified in [X9.62]. 
       [FIPS 186-3] also specifies three types of 
       elliptic curves for use in conjunction with one of 
       the described hash functions: curves over prime 
       fields, curves over binary fields, and Koblitz 
       curves (anomalous binary curves). FIPS 186-3 
       provides a table listing the uses and time periods 
       for each algorithm and key size combinations for 
       various applications. The DSA and ECDSA private 
       keys must be generated from pseudorandom functions 
       whose security strengths meet or exceed the 
       desired security strengths for the digital 
       signature algorithms. Guidelines on building these 
       NIST-approved pseudorandom functions can be found 
       in SP 800-90 [SP 800-90]. The hash functions must 
       meet or exceed the desired security strengths of 
       the digital signature algorithms. More guidelines 
       can be found in SP 800-57 [SP 800-57] and SP 800-
       107 [SP 800-107].   
          
  Dang, et al.   Expires September 6, 2009          [Page 10] 
  
  Internet-Draft          DSA/ECDSA                March 2009 
  

           
       The one-way hash algorithms discussed in this 
       document, SHA-224, SHA-256, SHA-384, and SHA-512 
       each have a recommended lifetime when used in 
       combination with a digital signature algorithm. 
       NIST provides information on the appropriate time 
       periods for which each combination should be used 
       based upon the security needs of the service and 
       information being protected in NIST Special 
       Publication 800-57. A table outlines the year in 
       which NIST deems it is no longer safe to use 
       specific combinations of key lengths and 
       algorithms of various strengths for RSA, DSA, and 
       ECDSA. NIST also provides Recommendation for using 
       NIST-approved hash algorithms in the digital 
       signature applications in [SP 800-107].  
          
       The Special Publication 800-57 also provides 
       guidelines for key management to be used by both 
       developers and system administrators. The document 
       covers the aspects of key management from 
       algorithm selection and key sizes with associated 
       key usage period to key usage (preventing key 
       overlap), the compromise of keys and keying 
       material, and key destruction. Specific guidelines 
       are offered for key usage periods such as the 
       lifetime of a private signature key may be shorter 
       than the lifetime of the public verification key 
       for practical applications. The specification also 
       provides recommendations on the number of years 
       various key types should be used such as public 
       and private signature keys, public and private 
       authentication keys, etc.  
        
       NIST Special Publication 800-78-1 also lists time 
       frames for the use of combined hash algorithms and 
       digital signature algorithms for specific key 
       types, but differentiates some security 
       requirements between digital signature and 
       authentication keys. The recommendation for the 
       size of digital signature keys and key management 
       keys is more restrictive than that of 
       authentication keys, because they are used to 
       protect data for longer periods of time.  
       Therefore, the transition dates to larger key 
       sizes are earlier in general. Guidelines for the 
       protection of domain parameters, initialization 
       vectors (IVs), and per message secret numbers for 
       use with digital signature algorithms, DSA and 
       ECSDA are provided in [FIPS 186-3]. An assurance 
          
  Dang, et al.   Expires September 6, 2009          [Page 11] 
  
  Internet-Draft          DSA/ECDSA                March 2009 
  

       of integrity should be obtained prior to using all 
       keying material for the generation of digital 
       signatures using DSA and ECDSA. Recommendation for 
       Obtaining Assurances for Digital Signature 
       Applications can be found in [SP 800-89]. The 
       purpose of this is to ensure the keying material 
       is in the proper format, the domain parameters are 
       valid, the possession of the private key, the 
       validity of the public key, and that the request 
       is coming from an authorized source.   
          
       Certificate Authorities (CAs) that issue 
       certificates using the DSA and ECDSA algorithms 
       for key generation SHOULD adhere to the 
       recommended security guidelines for key management 
       in the NIST Special Publication 800-57. When 
       signing a digital signature certificate, a CA 
       should use the same or greater size hash function 
       than the hash function in the digital signature 
       algorithm in the certificate.     
        
         
  6. References 

  6.1   Normative References 

             [RFC 2119]   Bradner, S., "Key Words for 
                          Use in RFCs to Indicate 
                          Requirement Levels", RFC 2119, 
                          March 1997. 

             [RFC 3279]   Bassham, L., Polk, W., and R. 
                          Housley, "Algorithms and 
                          Identifiers for the Internet 
                          X.509 Public Key 
                          Infrastructure Certificate and 
                          Certificate Revocation List 
                          (CRL) Profile", RFC 3279, 
                          April 2002.    

             [RFC 5280]   Cooper, D., Santesson, S., 
                          Farrell, S., Boeyen, S.              
                          Housley, R., and W. Polk, 
                          "Internet X.509 Public Key               
                          Infrastructure Certificate and 
                          Certificate Revocation List 
                          (CRL) Profile", RFC 5280, May 
                          2008. 
           

          
  Dang, et al.   Expires September 6, 2009          [Page 12] 
  
  Internet-Draft          DSA/ECDSA                March 2009 
  

             [X9.62]      X9.62-2005, "Public Key 
                          Cryptography for the Financial 
                          Services Industry: The 
                          Elliptic Curve Digital 
                          Signature Standard (ECDSA)", 
                          November, 2005. 

             [Elliptic]   Turner S., Brown D., Yiu K., 
                          Housley R., and Polk W., 
                          "Elliptic Curve Cryptography 
                          Subject Public Key 
                          Information" draft-ietf-pkix-
                          ecc-subpubkeyinfo-11.txt (work 
                          in progress), December 2008. 

             [FIPS 180-3] Federal Information Processing 
                          Standards Publication (FIPS 
                          PUB) 180-3, Secure Hash 
                          Standard (SHS), October 2008. 

             [FIPS 186-3] Federal Information Processing 
                          Standards Publication (FIPS 
                          PUB) 186-3, Digital Signature 
                          Standard (DSS), (draft) 
                          November 2008. 

             [X.690]      ITU-T Recommendation X.660 
                          Information Technology - 
                          ASN.1 encoding rules: 
                          Specification of Basic 
                          Encoding Rules (BER), 
                          Canonical Encoding Rules (CER) 
                          and Distinguished Encoding 
                          Rules (DER), 1997. 

        

  6.2   Informative References 

              [SP 800-107] Quynh Dang, NIST, 
                          "Recommendation for 
                          Applications Using Approved 
                          Hash Algorithms", February 
                          2009. 

              [SP 800-78-1] W. Timothy Polk, Donna, F. 
                          Dodson, William E. Burr, NIST, 
                          "Cryptographic Standards and 
                          Key Sizes for Personal 

          
  Dang, et al.   Expires September 6, 2009          [Page 13] 
  
  Internet-Draft          DSA/ECDSA                March 2009 
  

                          Identity Verification", August 
                          2007. 

              [SP 800-57]  Elaine Barker, William Barker, 
                          William E. Burr, NIST, 
                          "Recommendation for Key 
                          Management", August 2005. 

              [SP 800-89]  Elaine Barker, NIST, 
                          "Recommendation for Obtaining 
                          Assurances for Digital 
                          Signature Applications", 
                          November 2006. 

              [SP 800-90]  Elaine Barker, John Kelsey, 
                          NIST, ''Recommendation for 
                          Random Number Generation Using 
                          Deterministic Random Bit 
                          Generators'', March 2007. 

              [RFC 4055]   Schaad, J., Kaliski, B., and 
                          Housley, R., "Additional 
                          Algorithms and Identifiers for 
                          RSA Cryptography for use in 
                          the Internet X. 509 Public Key 
                          Infrastructure Certificate and 
                          Certificate Revocation List 
                          (CRL) Profile", RFC 4055, June 
                          2005. 


           

  7. Authors' Addresses 

  Quynh Dang
        
  NIST 
  100 Bureau Drive, Stop 8930 
  Gaithersburg, MD 20899-8930 
  USA 
        
  Email: quynh.dang@nist.gov 

             
  Kathleen M. Moriarty 
          
  RSA, The Security Division of EMC 
  174 Middlesex Turnpike 
  Bedford, MA 01730 
        
  Email: Moriarty_Kathleen@emc.com 
                     
         
          
  Dang, et al.   Expires September 6, 2009          [Page 14] 
  
  Internet-Draft          DSA/ECDSA                March 2009 
  
  
  Stefan Santesson  
        
  EMail: stefans@exmsft.com  

            
  Daniel R. L. Brown 
        
  Certicom Corp. 
  5520 Explorer Drive 
  Mississaug, ON L4W 5L1 
        
  Email: dbrown@certicom.com 

        
  Tim Polk 
        
  NIST 
  100 Bureau Drive, Stop 8930 
  Gaithersburg, MD 20899-8930 
  USA 
        
  Email: tim.polk@nist.gov 
        

           

  8. IANA Considerations  


     This document has no actions for IANA. 

                                 
















          
  Dang, et al.   Expires September 6, 2009       [Page 15] 
  

PAFTECH AB 2003-20262026-04-24 01:31:28