DSA and RSA Key and Signature Encoding for the KeyNote Trust Management System

نویسندگان

  • Matt Blaze
  • John Ioannidis
  • Angelos D. Keromytis
چکیده

Many RFCs, but not all, are Proposed Standards, Draft Standards, or Standards. Since the status of these RFCs may change during the standards processing, we note here only that they are on the standards track. Please see the latest edition of "Internet Official Protocol Standards" for the current state and status of these RFCs. In the following, RFCs on the standards track are marked [STANDARDSTRACK].

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

X.509 Key and Signature Encoding for the KeyNote Trust Management System

This memo describes X.509 key identifiers and signature encoding for version 2 of the KeyNote trust-management system (RFC 2704). X.509 certificates (RFC 5280) can be directly used in the Authorizer or Licensees field (or in both fields) in a KeyNote assertion, allowing for easy integration with protocols that already use X.509 certificates for authentication. In addition, the document defines ...

متن کامل

- 1 - Attack on Private Signature Keys of the

The article describes an attack on OpenPGP format, which leads to disclosure of the private signature keys of the DSA and RSA algorithms. The OpenPGP format is used in a number of applications including PGP, GNU Privacy Guard and other programs specified on the list of products compatible with OpenPGP, which is available at http://www.pgpi.org/products. Therefore all these applications must und...

متن کامل

Attack on Private Signature Keys

The article describes an attack on OpenPGP format, which leads to disclosure of the private signature keys of the DSA and RSA algorithms. The OpenPGP format is used in a number of applications including PGP, GNU Privacy Guard and other programs specified on the list of products compatible with OpenPGP, which is available at http://www.pgpi.org/products. Therefore all these applications must und...

متن کامل

Performance and Security of ECDSA

Digital signatures are used world wide to verify the authenticity of messages and confirm that they have not been altered in transmission. The Digital Signature Algorithm (DSA) is a Digital Signature Standard for the Federal Information Processing Standard and uses public key cryptography. The Elliptic Curve Digital Signature Algorithm (ECDSA) is a version of DSA using elliptic curves. In this ...

متن کامل

KeyNote : Trust Management for Public -

This paper discusses the rationale for designing a simple trust-management system for public-key infrastructures, called KeyNote. The motivating principles are expressiveness, simplicity, and extensibil-ity. We believe that none of the existing public-key infrastructure proposals provide as good a combination of these three factors.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • RFC

دوره 2792  شماره 

صفحات  -

تاریخ انتشار 2000