{"draft":"draft-ietf-sidr-rfc6485bis-05","doc_id":"RFC7935","title":"The Profile for Algorithms and Key Sizes for Use in the Resource Public Key Infrastructure","authors":["G. Huston","G. Michaelson, Ed."],"format":["ASCII","HTML"],"page_count":"9","pub_status":"PROPOSED STANDARD","status":"PROPOSED STANDARD","source":"Secure Inter-Domain Routing","abstract":"This document specifies the algorithms, algorithms' parameters,\r\nasymmetric key formats, asymmetric key size, and signature format for\r\nthe Resource Public Key Infrastructure (RPKI) subscribers that\r\ngenerate digital signatures on certificates, Certificate Revocation\r\nLists (CRLs), Cryptographic Message Syntax (CMS) signed objects and\r\ncertification requests as well as for the relying parties (RPs) that\r\nverify these digital signatures.","pub_date":"August 2016","keywords":[],"obsoletes":["RFC6485"],"obsoleted_by":[],"updates":[],"updated_by":["RFC8208","RFC8608"],"see_also":[],"doi":"10.17487\/RFC7935","errata_url":"https:\/\/www.rfc-editor.org\/errata\/rfc7935"}