{"draft":"draft-ietf-pkix-sha2-dsa-ecdsa-10","doc_id":"RFC5758","title":"Internet X.509 Public Key Infrastructure: Additional Algorithms and Identifiers for DSA and ECDSA","authors":["Q. Dang","S. Santesson","K. Moriarty","D. Brown","T. Polk"],"format":["ASCII","HTML"],"page_count":"8","pub_status":"PROPOSED STANDARD","status":"PROPOSED STANDARD","source":"Public-Key Infrastructure (X.509)","abstract":"This document updates RFC 3279 to specify algorithm\r\nidentifiers and ASN.1 encoding rules for the Digital Signature\r\nAlgorithm (DSA) and Elliptic Curve Digital Signature Algorithm\r\n(ECDSA) digital signatures when using SHA-224, SHA-256, SHA-384,\r\nor SHA-512 as the hashing algorithm. This specification applies to\r\nthe Internet X.509 Public Key infrastructure (PKI) when digital\r\nsignatures are used to sign certificates and certificate\r\nrevocation lists (CRLs). This document also identifies all four\r\nSHA2 hash algorithms for use in the Internet X.509 PKI. [STANDARDS-TRACK]","pub_date":"January 2010","keywords":["[--------]","digital signature algorithm","elliptic curve digital signature algorithm","pki"],"obsoletes":[],"obsoleted_by":[],"updates":["RFC3279"],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC5758","errata_url":"https:\/\/www.rfc-editor.org\/errata\/rfc5758"}