PKI standards

Chris J. Mitchell

(2000)

Chris J. Mitchell (2000) PKI standards. Information Security Technical Report, 5 (4).

Our Full Text Deposits

Full text access: Open

Full Text - 1.01 MB

Full Text - 365.73 KB

Links to Copies of this Item Held Elsewhere


Abstract

This paper provides a review of the current state of the art in standards for Public Key Infrastructures. The main focus of the paper is the recent work by the Internet Engineering Task Force, ITU-T, and ISO/IEC.

Information about this Version

This is a Published version
This version's date is: 12/2000
This item is peer reviewed

Link to this Version

https://repository.royalholloway.ac.uk/items/187b405c-217d-317c-7338-fef3c8ea443d/1/

Item TypeJournal Article
TitlePKI standards
AuthorsMitchell, Chris
Uncontrolled Keywordspublic key infrastructures, ITU-T, ISO/IEC
DepartmentsFaculty of Science\Mathematics

Identifiers

doi10.1016/S1363-4127(00)04003-6

Deposited by () on 23-Dec-2009 in Royal Holloway Research Online.Last modified on 21-May-2010

Notes

This is the final draft version of the paper that appeared in Information Security Technical Report, 5(4), 2000.

References

1. ABA, Digital signature guidelines: Legal infrastructure for Certification Authorities and electronic commerce. American Bar Association, 1995.

2. EMV ’96, Integrated Circuit Card Specification for Payment Systems. Version 3.1.1, 31 May 1998.

3. V. Hassler, ‘X .500 and LDAP security: A comparative overview’. IEEE Network, Vol. 13 No. 6 (November/December 1999) pp. 54-64.

4. IEEE P1363, Standard Specifications For Public Key Cryptography, 2000.

5. Internet RFC 1422, Privacy enhancement for Internet electronic mail, Part II: certificate-based key management (by S. Kent), February 1993.

6. Internet RFC 1777, Lightweight Directory Access Protocol (by Y. Yeong, T. Howes and S. Kille), March 1995.

7. Internet RFC 1778, The string representation of standard attribute syntaxes (by T. Howes, S. Kille, W. Yeong, and C. Robins), March 1995.

8. Internet RFC 2459, Internet X.509 public key infrastructure – Certificate and CRL profile (by R. Housley, W. Ford, W. Polk and D. Solo), January 1999.

9. Internet RFC 2510, Internet X.509 public key infrastructure – Certificate management protocols (by C. Adams and S. Farrell), March 1999.

10. Internet RFC 2511, Internet X.509 certificate request message format (by M. Myers, C. Adams, D. Solo and D. Kemp), March 1999.

11. Internet RFC 2527, Internet X.509 public key infrastructure – Certificate policy and certification practices framework(by S. Chokhani and W. Ford), March 1999.

12. Internet FFC 2559, Internet X.509 public key infrastructure – Operational protocols – LDAPv2 (by S. Boeyen, T. Howes and P. Richard), April 1999.

13. Internet RFC 2587, Internet X.509 public key infrastructure – LDAPv2 schema (by S. Boeyen, T. Howes and P. Richard), June 1999.

14. Internet RFC 2560, X.509 internet public key infrastructure – Online certificate status protocol (OCSP) (by M. Myers, R. Ankney, A. Malpani, S. Galperin and C. Adams), June 1999.

15. Internet draft, Internet X.509 public key infrastructure – PKIX roadmap (by A. Arsenault and S. Turner), March 2000.

16. Internet draft, Simple Certificate Validation Protocol (SCVP) (by A. Malpani and P. Hoffman), June 2000.

17. Internet draft, Internet X.509 public key infrastructure – Time Stamp Protocol (TSP), (by C. Adams, P. Cain, D. Pinkas, and R. Zuccherato), October 2000.

18. ISO/IEC 9594-8: 1998 (3rd edition), Information technology – Open Systems Interconnection – The Directory: Authentication framework.

19. ISO/IEC 9796-2: 1997, Information technology – Security techniques – Digital signature schemes giving message recovery – Part 2: Mechanisms using a hash-function..

20. ISO/IEC 10118-1: 1994, Information technology – Security techniques – Hash-functions – Part 1: General..

21. ISO/IEC 10118-2: 1994, Information technology – Security techniques – Hash-functions – Part 2: Hash-functions using an n-bit block cipher algorithm..

22. ISO/IEC 10118-3: 1998, Information technology – Security techniques – Hash-functions – Part 3: Dedicated hash-functions..

23. ISO/IEC 10118-4: 1998, Information technology – Security techniques – Hash-functions – Part 4: Hash-functions using modular arithmetic..

24. ISO/IEC 2nd DTR 14516, Information technology – Security techniques – Guidelines on the use and management of Trusted Third Party services, April 2000.

25. ISO/IEC 14888-1: 1998, Information technology – Security techniques – Digital signatures with appendix – Part 1: General..

26. ISO/IEC 14888-2: 1999, Information technology – Security techniques – Digital signatures with appendix – Part 2: Identity-based mechanisms..

27. ISO/IEC 14888-3: 1998, Information technology – Security techniques – Digital signatures with appendix – Part 3: Certificate-based mechanisms..

28. ISO/IEC FDIS 15945, Information technology – Security techniques – Specification of TTP services to support the application of digital signatures, May 2000.

29. ISO/IEC WD 18014-1, Information technology – Security techniques – Time stamping services – Part 1: Framework, May 2000.

30. ISO/IEC WD 18014-2, Information technology – Security techniques – Time stamping services – Part 2: Mechanisms producing independent tokens, May 2000.

31. ISO/IEC WD 18014-3, Information technology – Security techniques – Time stamping services – Part 3: Mechanisms producing linked tokens, May 2000.

32. ITU-T Recommendation X.509 (1988), Information technology – Open Systems Interconnection – The Directory: Authentication framework..

33. ITU-T Recommendation X.509 (11/93), Information technology – Open Systems Interconnection – The Directory: Authentication framework..

34. ITU-T Recommendation X.509 (08/97), Information technology – Open Systems Interconnection – The Directory: Authentication framework..

35. ITU-T Recommendation X.680 (12/97), Information technology – Abstract Syntax Notation One (ASN.1): Specification of basic notation..

36. ITU-T Recommendation X.681 (12/97), Information technology – Abstract Syntax Notation One (ASN.1): Information object specification..

37. ITU-T Recommendation X.682 (12/97), Information technology – Abstract Syntax Notation One (ASN.1): Constraint specification..

38. ITU-T Recommendation X.683 (12/97), Information technology – Abstract Syntax Notation One (ASN.1): Parameterization of ASN.1 specifications..

39. ITU-T Recommendation X.690 (12/97), Information technology – ASN.1 encoding rules - Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)..

40. ITU-T Recommendation X.691 (12/97), Information technology – ASN.1 encoding rules – Specification of Packed Encoding Rules (PER)..

41. NIST FIPS PUB 180-1, Secure hash standard, April 1995.

42. NIST PIPS PUB 186-2, Digital signature standard, January 2000.

43. PKCS #1, RSA cryptography standard, Version 2.1 (draft), September 1999.


Details