{"draft":"draft-ietf-sidr-rpki-algs-05","doc_id":"RFC6485","title":"The Profile for Algorithms and Key Sizes for Use in the Resource Public Key Infrastructure (RPKI)","authors":["G. Huston"],"format":["ASCII","HTML"],"page_count":"6","pub_status":"PROPOSED STANDARD","status":"PROPOSED STANDARD","source":"Secure Inter-Domain Routing","abstract":"This document specifies the algorithms, algorithms' parameters,\r\nasymmetric key formats, asymmetric key size, and signature format for\r\nthe Resource Public Key Infrastructure (RPKI) subscribers that generate\r\ndigital signatures on certificates, Certificate Revocation Lists, and\r\nsigned objects as well as for the relying parties (RPs) that verify\r\nthese digital signatures. [STANDARDS-TRACK]","pub_date":"February 2012","keywords":["[--------]"],"obsoletes":[],"obsoleted_by":["RFC7935"],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC6485","errata_url":"https:\/\/www.rfc-editor.org\/errata\/rfc6485"}