{"draft":"draft-schaad-pkix-rfc2875-bis-08","doc_id":"RFC6955","title":"Diffie-Hellman Proof-of-Possession Algorithms","authors":["J. Schaad","H. Prafullchandra"],"format":["ASCII","HTML"],"page_count":"43","pub_status":"PROPOSED STANDARD","status":"PROPOSED STANDARD","source":"IETF - NON WORKING GROUP","abstract":"This document describes two methods for producing an integrity check\r\nvalue from a Diffie-Hellman key pair and one method for producing an\r\nintegrity check value from an Elliptic Curve key pair. This behavior\r\nis needed for such operations as creating the signature of a\r\nPublic-Key Cryptography Standards (PKCS) #10 Certification Request. These\r\nalgorithms are designed to provide a Proof-of-Possession of the\r\nprivate key and not to be a general purpose signing algorithm.\r\n\r\nThis document obsoletes RFC 2875.","pub_date":"May 2013","keywords":["POP","ECDH","DH"],"obsoletes":["RFC2875"],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC6955","errata_url":null}