| rfc9215xml2.original.xml | rfc9215.xml | |||
|---|---|---|---|---|
| <?xml version="1.0" encoding="US-ASCII"?> | <?xml version='1.0' encoding='utf-8'?> | |||
| <!DOCTYPE rfc SYSTEM "rfc2629.dtd"> | <!DOCTYPE rfc [ | |||
| <?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?> | <!ENTITY nbsp " "> | |||
| <?rfc comments="yes" ?> | <!ENTITY zwsp "​"> | |||
| <?rfc inline="yes" ?> | <!ENTITY nbhy "‑"> | |||
| <?rfc strict="yes" ?> | <!ENTITY wj "⁠"> | |||
| <?rfc toc="yes"?> | ]> | |||
| <?rfc symrefs="yes"?> | <rfc xmlns:xi="http://www.w3.org/2001/XInclude" category="info" docName="draft-d | |||
| <?rfc sortrefs="yes" ?> | eremin-rfc4491-bis-11" number="9215" ipr="trust200902" obsoletes="" updates="" s | |||
| <?rfc compact="yes" ?> | ubmissionType="independent" xml:lang="en" tocInclude="true" symRefs="true" sortR | |||
| <?rfc subcompact="no" ?> | efs="true" version="3"> | |||
| <rfc category="info" docName="draft-deremin-rfc4491-bis-11" ipr="trust200902"> | <!-- xml2rfc v2v3 conversion 3.12.0 --> | |||
| <front> | <front> | |||
| <title abbrev="PKIX: GOST R 34.10-2012, 34.11-2012">Using GOST R 34.10-2012 | <title abbrev="PKIX: GOST R 34.10-2012, 34.11-2012">Using GOST R 34.10-2012 | |||
| and GOST R 34.11-2012 algorithms with the Internet X.509 Public Key Infrastructu | and GOST R 34.11-2012 Algorithms with the Internet X.509 Public Key Infrastructu | |||
| re</title> | re</title> | |||
| <seriesInfo name="RFC" value="9215"/> | ||||
| <author fullname="Dmitry Baryshkov" initials="D." surname="Baryshkov" role=" | <author fullname="Dmitry Baryshkov" initials="D." surname="Baryshkov" role=" | |||
| editor" > | editor"> | |||
| <organization>Linaro Ltd.</organization> | <organization>Linaro Ltd.</organization> | |||
| <address> | <address> | |||
| <postal> | <postal> | |||
| <street>Harston Mill Royston Rd</street> | <street>Harston Mill Royston Rd</street> | |||
| <city>Harston, Cambridge</city> | <city>Harston, Cambridge</city> | |||
| <code>CB22 7GG</code> | <code>CB22 7GG</code> | |||
| <country>United Kingdom</country> | <country>United Kingdom</country> | |||
| </postal> | </postal> | |||
| <email>dbaryshkov@gmail.com</email> | <email>dbaryshkov@gmail.com</email> | |||
| </address> | </address> | |||
| skipping to change at line 28 ¶ | skipping to change at line 25 ¶ | |||
| <address> | <address> | |||
| <postal> | <postal> | |||
| <street>Harston Mill Royston Rd</street> | <street>Harston Mill Royston Rd</street> | |||
| <city>Harston, Cambridge</city> | <city>Harston, Cambridge</city> | |||
| <code>CB22 7GG</code> | <code>CB22 7GG</code> | |||
| <country>United Kingdom</country> | <country>United Kingdom</country> | |||
| </postal> | </postal> | |||
| <email>dbaryshkov@gmail.com</email> | <email>dbaryshkov@gmail.com</email> | |||
| </address> | </address> | |||
| </author> | </author> | |||
| <author fullname="Vasily Nikolaev" initials="V." surname="Nikolaev"> | <author fullname="Vasily Nikolaev" initials="V." surname="Nikolaev"> | |||
| <organization>CryptoPro</organization> | <organization>CryptoPro</organization> | |||
| <address> | ||||
| <postal> | ||||
| <street>18, Suschevsky val </street> | ||||
| <city>Moscow</city> | ||||
| <code>127018</code> | ||||
| <country>Russian Federation</country> | ||||
| </postal> | ||||
| <phone>+7 (495) 995-48-20</phone> | ||||
| <email>nikolaev@cryptopro.ru</email> | ||||
| </address> | ||||
| </author> | ||||
| <author fullname="Aleksandr Chelpanov" initials="A." surname="Chelpanov"> | ||||
| <organization>InfoTeCS JSC</organization> | ||||
| <address> | <address> | |||
| <postal> | <postal> | |||
| <street>Bldg. 1, 1/23, Stary Petrovsko-Razumovskiy Proezd</street> | <street>18, Suschevsky val</street> | |||
| <city>Moscow</city> | <city>Moscow</city> | |||
| <code>127287</code> | <code>127018</code> | |||
| <country>Russian Federation</country> | <country>Russian Federation</country> | |||
| </postal> | </postal> | |||
| <phone>+7 (495) 737-61-92</phone> | <phone>+7 (495) 995-48-20</phone> | |||
| <email>nikolaev@cryptopro.ru</email> | ||||
| </address> | ||||
| </author> | ||||
| <author fullname="Aleksandr Chelpanov" initials="A." surname="Chelpanov"> | ||||
| <organization>InfoTeCS JSC</organization> | ||||
| <address> | ||||
| <email>Aleksandr.Chelpanov@infotecs.ru</email> | <email>Aleksandr.Chelpanov@infotecs.ru</email> | |||
| </address> | </address> | |||
| </author> | </author> | |||
| <date month="" year="2022"/> | <date month="March" year="2022"/> | |||
| <area>Security</area> | ||||
| <workgroup>Internet Engineering Task Force</workgroup> | ||||
| <keyword>GOST</keyword> | <keyword>GOST</keyword> | |||
| <keyword>PKI</keyword> | <keyword>PKI</keyword> | |||
| <abstract> | <abstract> | |||
| <t>This document describes encoding | <t>This document describes encoding | |||
| formats, identifiers, and parameter formats for the algorithms GOST R | formats, identifiers, and parameter formats for the GOST R | |||
| 34.10-2012 and GOST R 34.11-2012 for use in Internet X.509 Public Key | 34.10-2012 and GOST R 34.11-2012 algorithms for use in the Internet X.50 | |||
| 9 Public Key | ||||
| Infrastructure (PKI).</t> | Infrastructure (PKI).</t> | |||
| <t>This specification is developed to facilitate implementations that | <t>This specification is developed to facilitate implementations that | |||
| wish to support the GOST algorithms. This document does not imply | wish to support the GOST algorithms. This document does not imply | |||
| IETF endorsement of the cryptographic algorithms used in this | IETF endorsement of the cryptographic algorithms used in this | |||
| document.</t> | document.</t> | |||
| </abstract> | </abstract> | |||
| </front> | </front> | |||
| <middle> | <middle> | |||
| <section title="Introduction"> | <section numbered="true" toc="default"> | |||
| <name>Introduction</name> | ||||
| <t>This document describes the | <t>This document describes the | |||
| conventions for using the <xref target="GOSTR3410-2012">GOST R | conventions for using the <xref target="GOSTR3410-2012" format="default" | |||
| 34.10-2012</xref> (see <xref target="RFC7091" />) signature | >GOST R | |||
| algorithm and <xref target="GOSTR3411-2012"> GOST R 34.11-2012</xref> | 34.10-2012 signature algorithm</xref> <xref target="RFC7091" format="d | |||
| (see <xref target="RFC6986" />) hash function in the Internet | efault"/> and the <xref target="GOSTR3411-2012" format="default"> GOST R 34.11-2 | |||
| X.509 Public Key Infrastructure (PKI) <xref target="RFC5280" />.</t> | 012 hash function</xref> | |||
| <xref target="RFC6986" format="default"/> in the Internet | ||||
| X.509 Public Key Infrastructure (PKI) <xref target="RFC5280" format="def | ||||
| ault"/>.</t> | ||||
| <t>This specification defines the contents of the signatureAlgorithm, | <t>This specification defines the contents of the signatureAlgorithm, | |||
| signatureValue, signature, and subjectPublicKeyInfo fields within X.509 | signatureValue, signature, and subjectPublicKeyInfo fields within X.509 | |||
| Certificates and Certificate Revocation Lists (CRLs). For each algorithm , the appropriate | Certificates and Certificate Revocation Lists (CRLs). For each algorithm , the appropriate | |||
| alternatives for the keyUsage certificate extension are provided.</t> | alternatives for the keyUsage certificate extension are provided.</t> | |||
| <t>This specification is developed to facilitate implementations that | <t>This specification is developed to facilitate implementations that | |||
| wish to support the GOST algorithms. This document does not imply | wish to support the GOST algorithms. This document does not imply | |||
| IETF endorsement of the cryptographic algorithms used in this | IETF endorsement of the cryptographic algorithms used in this | |||
| document.</t> | document.</t> | |||
| <section numbered="true" toc="default"> | ||||
| <section title="Requirements Language"> | <name>Requirements Language</name> | |||
| <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", | |||
| "OPTIONAL" in this document are to be interpreted as described in | "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOULD</bcp14>", | |||
| BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> | "<bcp14>SHOULD NOT</bcp14>", | |||
| when, and only when, they appear in all capitals, as shown here.</t> | "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>", | |||
| "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document | ||||
| are to be interpreted as described in BCP 14 | ||||
| <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only | ||||
| when, they appear in all capitals, as shown here.</t> | ||||
| </section> | </section> | |||
| </section> | </section> | |||
| <section numbered="true" toc="default"> | ||||
| <section title="Signature Algorithm Support"> | <name>Signature Algorithm Support</name> | |||
| <t>Conforming Certificate Authorities (CAs) MAY use GOST R 34.10-2012 sign | <t>Conforming Certificate Authorities (CAs) <bcp14>MAY</bcp14> use the GOS | |||
| ature algorithm to sign | T R 34.10-2012 signature algorithm to sign | |||
| certificates and CRLs. This signature algorithm MUST always be used | certificates and CRLs. This signature algorithm <bcp14>MUST</bcp14> alwa | |||
| with GOST R 34.11-2012 hash function. It may use keys length of either | ys be used | |||
| with the GOST R 34.11-2012 hash function. It may use a key length of eit | ||||
| her | ||||
| 256 bits or 512 bits.</t> | 256 bits or 512 bits.</t> | |||
| <t>The ASN.1 object identifier (OID) used to identify the GOST R 34.10-201 | ||||
| 2 | ||||
| signature algorithm with a 256-bit key length and the GOST R 34.11-2012 | ||||
| hash | ||||
| function with a 256-bit hash code is:</t> | ||||
| <t>The ASN.1 object identifier used to identify GOST R 34.10-2012 | <sourcecode name="" type="asn.1"><![CDATA[id-tc26-signwithdigest-gost3410- | |||
| signature algorithm with 256-bit key length and GOST R 34.11-2012 hash | 12-256 OBJECT IDENTIFIER ::= | |||
| function with 256-bit hash code is:</t> | ||||
| <t><figure><artwork><![CDATA[id-tc26-signwithdigest-gost3410-12-256 OBJECT | ||||
| IDENTIFIER ::= | ||||
| { iso(1) member-body(2) ru(643) rosstandart(7) tc26(1) | { iso(1) member-body(2) ru(643) rosstandart(7) tc26(1) | |||
| algorithms(1) signwithdigest(3) gost3410-12-256(2)}]]></artwork></figure | algorithms(1) signwithdigest(3) gost3410-12-256(2)} | |||
| ></t> | ]]></sourcecode> | |||
| <t>The GOST R 34.10-2012 signature algorithm with a 256-bit key length gen | ||||
| <t>GOST R 34.10-2012 signature algorithm with 256-bit key length generates | erates a digital | |||
| a digital | signature in the form of two 256-bit integers: r and s. Its octet | |||
| signature in the form of two 256-bit integers, r and s. Its octet | ||||
| string representation consists of 64 octets, where the first 32 | string representation consists of 64 octets, where the first 32 | |||
| octets contain the big-endian representation of s and the second 32 | octets contain the big-endian representation of s and the second 32 | |||
| octets contain the big-endian representation of r.</t> | octets contain the big-endian representation of r.</t> | |||
| <t>The ASN.1 OID used to identify the GOST R 34.10-2012 | ||||
| <t>The ASN.1 object identifier used to identify GOST R 34.10-2012 | signature algorithm with a 512-bit key length and the GOST R 34.11-2012 | |||
| signature algorithm with 512-bit key length and GOST R 34.11-2012 hash | hash | |||
| function with 512-bit hash code is:</t> | function with a 512-bit hash code is:</t> | |||
| <sourcecode name="" type="asn.1"><![CDATA[id-tc26-signwithdigest-gost3410- | ||||
| <t><figure><artwork><![CDATA[id-tc26-signwithdigest-gost3410-12-512 OBJECT | 12-512 OBJECT IDENTIFIER ::= | |||
| IDENTIFIER ::= | ||||
| { iso(1) member-body(2) ru(643) rosstandart(7) tc26(1) | { iso(1) member-body(2) ru(643) rosstandart(7) tc26(1) | |||
| algorithms(1) signwithdigest(3) gost3410-12-512(3)}]]></artwork></figure | algorithms(1) signwithdigest(3) gost3410-12-512(3)} | |||
| ></t> | ]]></sourcecode> | |||
| <t>The GOST R 34.10-2012 signature algorithm with a 512-bit key length gen | ||||
| <t>GOST R 34.10-2012 signature algorithm with 512-bit key length generates | erates a digital | |||
| a digital | signature in the form of two 512-bit integers: r and s. Its octet | |||
| signature in the form of two 512-bit integers, r and s. Its octet | ||||
| string representation consists of 128 octets, where the first 64 | string representation consists of 128 octets, where the first 64 | |||
| octets contain the big-endian representation of s and the second 64 | octets contain the big-endian representation of s and the second 64 | |||
| octets contain the big-endian representation of r.</t> | octets contain the big-endian representation of r.</t> | |||
| <t>When either of these OIDs is used as the algorithm field in an | ||||
| <t>When either of these OID is used as the algorithm field in an | AlgorithmIdentifier structure, the encoding <bcp14>MUST</bcp14> omit the | |||
| AlgorithmIdentifier structure, the encoding MUST omit the parameters | parameters | |||
| field.</t> | field.</t> | |||
| <t>The described definition of a signature value is directly usable in the | ||||
| <t>The described definition of a signature value is directly usable in CMS | Cryptographic Message Syntax (CMS) <xref target="RFC5652" format="default"/>, | |||
| <xref target="RFC5652"/>, | ||||
| where such values are represented as octet strings. However, | where such values are represented as octet strings. However, | |||
| signature values in certificates and CRLs <xref target="RFC5280"/> are r epresented | signature values in certificates and CRLs <xref target="RFC5280" format= "default"/> are represented | |||
| as bit strings, and thus the octet string representation must be | as bit strings, and thus the octet string representation must be | |||
| converted.</t> | converted.</t> | |||
| <t>To convert an octet string signature value to a bit string, the most | <t>To convert an octet string signature value to a bit string, the most | |||
| significant bit of the first octet of the signature value SHALL | significant bit of the first octet of the signature value <bcp14>SHALL</ bcp14> | |||
| become the first bit of the bit string, and so on through the least | become the first bit of the bit string, and so on through the least | |||
| significant bit of the last octet of the signature value, which SHALL | significant bit of the last octet of the signature value, which <bcp14>S HALL</bcp14> | |||
| become the last bit of the bit string.</t> | become the last bit of the bit string.</t> | |||
| </section> | </section> | |||
| <section anchor="streebog" numbered="true" toc="default"> | ||||
| <section title="Hash Functions Support" anchor="streebog"> | <name>Hash Function Support</name> | |||
| <t>The ASN.1 object identifier used to identify GOST R 34.11-2012 hash | <t>The ASN.1 OID used to identify the GOST R 34.11-2012 hash | |||
| function with 256-bit hash code is:</t> | function with a 256-bit hash code is:</t> | |||
| <t><figure><artwork><![CDATA[id-tc26-gost3411-12-256 OBJECT IDENTIFIER ::= | <sourcecode name="" type="asn.1"><![CDATA[id-tc26-gost3411-12-256 OBJECT I | |||
| DENTIFIER ::= | ||||
| { iso(1) member-body(2) ru(643) rosstandart(7) tc26(1) | { iso(1) member-body(2) ru(643) rosstandart(7) tc26(1) | |||
| algorithms(1) digest(2) gost3411-12-256(2)}]]></artwork></figure></t> | algorithms(1) digest(2) gost3411-12-256(2)} | |||
| ]]></sourcecode> | ||||
| <t>The ASN.1 object identifier used to identify GOST R 34.11-2012 hash | <t>The ASN.1 OID used to identify the GOST R 34.11-2012 hash | |||
| function with 512-bit hash code is:</t> | function with a 512-bit hash code is:</t> | |||
| <sourcecode name="" type="asn.1"><![CDATA[id-tc26-gost3411-12-512 OBJECT I | ||||
| <t><figure><artwork><![CDATA[id-tc26-gost3411-12-512 OBJECT IDENTIFIER ::= | DENTIFIER ::= | |||
| { iso(1) member-body(2) ru(643) rosstandart(7) tc26(1) | { iso(1) member-body(2) ru(643) rosstandart(7) tc26(1) | |||
| algorithms(1) digest(2) gost3411-12-512(3)}]]></artwork></figure></t> | algorithms(1) digest(2) gost3411-12-512(3)} | |||
| ]]></sourcecode> | ||||
| <t>When either of these OID is used as the algorithm field in an | <t>When either of these OIDs is used as the algorithm field in an | |||
| AlgorithmIdentifier structure, the encoding MUST omit the parameters | AlgorithmIdentifier structure, the encoding <bcp14>MUST</bcp14> omit the | |||
| parameters | ||||
| field.</t> | field.</t> | |||
| </section> | </section> | |||
| <section numbered="true" toc="default"> | ||||
| <section title="Subject Public Keys Information Fields"> | <name>Subject Public Keys Information Fields</name> | |||
| <section title="Public Key Identifiers"> | <section numbered="true" toc="default"> | |||
| <t>GOST R 34.10-2012 public keys with 256 bits private key length are | <name>Public Key Identifiers</name> | |||
| <t>GOST R 34.10-2012 public keys with a 256-bit private key length are | ||||
| identified by the following OID:</t> | identified by the following OID:</t> | |||
| <sourcecode name="" type="asn.1"><![CDATA[id-tc26-gost3410-12-256 OBJECT | ||||
| <t><figure><artwork><![CDATA[id-tc26-gost3410-12-256 OBJECT IDENTIFIER : | IDENTIFIER ::= | |||
| := | ||||
| { iso(1) member-body(2) ru(643) rosstandart(7) tc26(1) | { iso(1) member-body(2) ru(643) rosstandart(7) tc26(1) | |||
| algorithms(1) sign(1) gost3410-12-256(1)}]]></artwork></figure></t> | algorithms(1) sign(1) gost3410-12-256(1)} | |||
| ]]></sourcecode> | ||||
| <t>GOST R 34.10-2012 public keys with 512 bits private key length are | <t>GOST R 34.10-2012 public keys with a 512-bit private key length are | |||
| identified by the following OID:</t> | identified by the following OID:</t> | |||
| <sourcecode name="" type="asn.1"><![CDATA[id-tc26-gost3410-12-512 OBJECT | ||||
| <t><figure><artwork><![CDATA[id-tc26-gost3410-12-512 OBJECT IDENTIFIER : | IDENTIFIER ::= | |||
| := | ||||
| { iso(1) member-body(2) ru(643) rosstandart(7) tc26(1) | { iso(1) member-body(2) ru(643) rosstandart(7) tc26(1) | |||
| algorithms(1) sign(1) gost3410-12-512(2)}]]></artwork></figure></t> | algorithms(1) sign(1) gost3410-12-512(2)} | |||
| ]]></sourcecode> | ||||
| </section> | </section> | |||
| <section numbered="true" toc="default"> | ||||
| <section title="Public Key Parameters"> | <name>Public Key Parameters</name> | |||
| <t>When either of these identifiers appears as the algorithm field in th | ||||
| <t>When either of these identifiers appears as algorithm field in | e | |||
| SubjectPublicKeyInfo.algorithm.algorithm field, the parameters field M | SubjectPublicKeyInfo.algorithm.algorithm field, the parameters field < | |||
| UST | bcp14>MUST</bcp14> | |||
| have the following structure: | have the following structure: | |||
| </t> | </t> | |||
| <sourcecode name="" type="asn.1"><![CDATA[GostR3410-2012-PublicKeyParame | ||||
| <t><figure><artwork><![CDATA[GostR3410-2012-PublicKeyParameters ::= SEQU | ters ::= SEQUENCE | |||
| ENCE | ||||
| { | { | |||
| publicKeyParamSet OBJECT IDENTIFIER, | publicKeyParamSet OBJECT IDENTIFIER, | |||
| digestParamSet OBJECT IDENTIFIER OPTIONAL | digestParamSet OBJECT IDENTIFIER OPTIONAL | |||
| }]]></artwork></figure></t> | } | |||
| ]]></sourcecode> | ||||
| <t>where: | <t>where: | |||
| <list style="symbols"> | ||||
| <t><spanx style="verb">publicKeyParamSet</spanx> - public key parame | ||||
| ters identifier for GOST R 34.10-2012 (see Sections 5.1.1 and 5.2.1 of <xref tar | ||||
| get="RFC7836"/> or <xref target="pkparamsBCD" />) or GOST R 34.10-2001 (see Sect | ||||
| ion 8.4 of <xref target="RFC4357"/>) parameters.</t> | ||||
| <t><spanx style="verb">digestParamSet</spanx> - parameter identifier | ||||
| for corresponding GOST R 34.11-2012 (See <xref target="streebog" />).</t> | ||||
| </list> | ||||
| </t> | </t> | |||
| <ul spacing="normal"> | ||||
| <li> | ||||
| <tt>publicKeyParamSet</tt> is the public key parameters identifier | ||||
| for GOST R 34.10-2012 parameters (see Sections <xref target="RFC7836" secti | ||||
| on="5.1.1" sectionFormat="bare"/> and <xref target="RFC7836" section="5.2.1" | ||||
| sectionFormat="bare"/> of <xref target="RFC7836"/> or <xref target="pkparamsBCD | ||||
| " format="default"/>) or GOST R 34.10-2001 parameters (see <xref target="RFC4357 | ||||
| " sectionFormat="of" section="8.4"/>).</li> | ||||
| <li> | ||||
| <tt>digestParamSet</tt> is the parameters identifier for the corresp | ||||
| onding GOST R 34.11-2012 parameters (see <xref target="streebog" format="default | ||||
| "/>).</li> | ||||
| </ul> | ||||
| <t>The following values when used as <spanx style="verb">publicKeyParamS | <t>The following values, when used as <tt>publicKeyParamSet</tt>, define | |||
| et</spanx> define | test public key parameter sets and <bcp14>MUST NOT</bcp14> be used out | |||
| test public key parameter sets and MUST NOT be used outside of testing | side of testing scenarios: | |||
| scenarios: | ||||
| <list style="symbols"> | ||||
| <t><spanx style="verb">id-GostR3410-2001-TestParamSet</spanx>,</t> | ||||
| <t><spanx style="verb">id-tc26-gost-3410-2012-512-paramSetTest</span | ||||
| x></t> | ||||
| </list> | ||||
| </t> | </t> | |||
| <t>The field <spanx style="verb">digestParamSet</spanx>: | <ul spacing="normal"> | |||
| <list style="symbols"> | <li> | |||
| <t>SHOULD be omitted if GOST R 34.10-2012 signature algorithm is use | <tt>id-GostR3410-2001-TestParamSet</tt></li> | |||
| d with 512-bit key length;</t> | <li> | |||
| <t>MUST be present and must be equal to <spanx style="verb">id-tc26- | <tt>id-tc26-gost-3410-2012-512-paramSetTest</tt></li> | |||
| digest-gost3411-12-256</spanx> if one of the following values is used as <spanx | </ul> | |||
| style="verb">publicKeyParamSet</spanx>: | <t>The <tt>digestParamSet</tt> field: | |||
| <list style="symbols"> | </t> | |||
| <t><spanx style="verb">id-GostR3410-2001-TestParamSet</spanx>,</ | <ul spacing="normal"> | |||
| t> | <li><bcp14>SHOULD</bcp14> be omitted if the GOST R 34.10-2012 signatur | |||
| <t><spanx style="verb">id-GostR3410-2001-CryptoPro-A-ParamSet</s | e algorithm is used with a 512-bit key length</li> | |||
| panx>,</t> | <li> | |||
| <t><spanx style="verb">id-GostR3410-2001-CryptoPro-B-ParamSet</s | <t><bcp14>MUST</bcp14> be present and must be equal to <tt>id-tc26-d | |||
| panx>,</t> | igest-gost3411-12-256</tt> if one of the following values is used as <tt>publicK | |||
| <t><spanx style="verb">id-GostR3410-2001-CryptoPro-C-ParamSet</s | eyParamSet</tt>: | |||
| panx>,</t> | </t> | |||
| <t><spanx style="verb">id-GostR3410-2001-CryptoPro-XchA-ParamSet | <ul spacing="normal"> | |||
| </spanx>,</t> | <li> | |||
| <t><spanx style="verb">id-GostR3410-2001-CryptoPro-XchB-ParamSet | <tt>id-GostR3410-2001-TestParamSet</tt></li> | |||
| </spanx>;</t> | <li> | |||
| </list></t> | <tt>id-GostR3410-2001-CryptoPro-A-ParamSet</tt></li> | |||
| <t>SHOULD be omitted if publicKeyParamSet is equal to: | <li> | |||
| <list style="symbols"> | <tt>id-GostR3410-2001-CryptoPro-B-ParamSet</tt></li> | |||
| <t><spanx style="verb">id-tc26-gost-3410-2012-256-paramSetA</spa | <li> | |||
| nx>;</t> | <tt>id-GostR3410-2001-CryptoPro-C-ParamSet</tt></li> | |||
| </list></t> | <li> | |||
| <t>MUST be omitted if one of the following values is used as publicK | <tt>id-GostR3410-2001-CryptoPro-XchA-ParamSet</tt></li> | |||
| eyParamSet: | <li> | |||
| <list style="symbols"> | <tt>id-GostR3410-2001-CryptoPro-XchB-ParamSet</tt></li> | |||
| <t><spanx style="verb">id-tc26-gost-3410-2012-256-paramSetB</spa | </ul> | |||
| nx>,</t> | </li> | |||
| <t><spanx style="verb">id-tc26-gost-3410-2012-256-paramSetC</spa | <li> | |||
| nx>,</t> | <t><bcp14>SHOULD</bcp14> be omitted if publicKeyParamSet is equal to | |||
| <t><spanx style="verb">id-tc26-gost-3410-2012-256-paramSetD</spa | : | |||
| nx>.</t> | </t> | |||
| </list></t> | <ul spacing="normal"> | |||
| </list></t> | <li> | |||
| <tt>id-tc26-gost-3410-2012-256-paramSetA</tt></li> | ||||
| </ul> | ||||
| </li> | ||||
| <li> | ||||
| <t><bcp14>MUST</bcp14> be omitted if one of the following values is | ||||
| used as publicKeyParamSet: | ||||
| </t> | ||||
| <ul spacing="normal"> | ||||
| <li> | ||||
| <tt>id-tc26-gost-3410-2012-256-paramSetB</tt></li> | ||||
| <li> | ||||
| <tt>id-tc26-gost-3410-2012-256-paramSetC</tt></li> | ||||
| <li> | ||||
| <tt>id-tc26-gost-3410-2012-256-paramSetD</tt></li> | ||||
| </ul> | ||||
| </li> | ||||
| </ul> | ||||
| </section> | </section> | |||
| <section title="Public Key Encoding"> | <section numbered="true" toc="default"> | |||
| <t>The GOST R 34.10-2012 public key MUST be ASN.1 DER encoded as an | <name>Public Key Encoding</name> | |||
| OCTET STRING. This encoding SHALL be used as the content (i.e., the | <t>The GOST R 34.10-2012 public key <bcp14>MUST</bcp14> be ASN.1 DER enc | |||
| value) of the subjectPublicKey field (a BIT STRING) of | oded as an | |||
| OCTET STRING. This encoding <bcp14>SHALL</bcp14> be used as the conten | ||||
| t (i.e., the | ||||
| value) of the subjectPublicKey field (a BIT STRING) of the | ||||
| SubjectPublicKeyInfo structure.</t> | SubjectPublicKeyInfo structure.</t> | |||
| <t><figure><artwork>GostR3410-2012-256-PublicKey ::= OCTET STRING (SIZE( | <sourcecode name="" type="asn.1"><![CDATA[GostR3410-2012-256-PublicKey : | |||
| 64)) | := OCTET STRING (SIZE(64)) | |||
| GostR3410-2012-512-PublicKey ::= OCTET STRING (SIZE (128))</artwork></figure></t | GostR3410-2012-512-PublicKey ::= OCTET STRING (SIZE (128)) | |||
| > | ]]></sourcecode> | |||
| <t><spanx style="verb">GostR3410-2012-256-PublicKey</spanx> MUST | <t><tt>GostR3410-2012-256-PublicKey</tt> <bcp14>MUST</bcp14> | |||
| contain 64 octets, where the first 32 octets contain the | contain 64 octets, where the first 32 octets contain the | |||
| little-endian representation of <spanx style="verb">x</spanx> and the | little-endian representation of the <tt>x</tt> coordinate of the publi | |||
| second 32 octets contains the little-endian representation of <spanx | c key and the | |||
| style="verb">y</spanx> coordinates of the public key.</t> | second 32 octets contain the little-endian representation of the <tt>y | |||
| <t><spanx style="verb">GostR3410-2012-512-PublicKey</spanx> MUST | </tt> coordinate of the public key.</t> | |||
| <t><tt>GostR3410-2012-512-PublicKey</tt> <bcp14>MUST</bcp14> | ||||
| contain 128 octets, where the first 64 octets contain the | contain 128 octets, where the first 64 octets contain the | |||
| little-endian representation of <spanx style="verb">x</spanx> and the | little-endian representation of the <tt>x</tt> coordinate of the publi | |||
| second 64 octets contains the little-endian representation of <spanx | c key and the | |||
| style="verb">y</spanx> coordinates of the public key.</t> | second 64 octets contain the little-endian representation of the <tt>y | |||
| </tt> coordinate of the public key.</t> | ||||
| </section> | </section> | |||
| <section title="Key Usage Extension"> | <section numbered="true" toc="default"> | |||
| <t>If the KeyUsage extension is present in a certificate with GOST R 34. | <name>Key Usage Extension</name> | |||
| 10-2012 public key, the following values MAY be present: | <t>If the KeyUsage extension is present in a certificate with the GOST R | |||
| <list style="symbols"> | 34.10-2012 public key, the following values <bcp14>MAY</bcp14> be present: | |||
| <t><spanx style="verb">digitalSignature</spanx> (0),</t> | </t> | |||
| <t><spanx style="verb">contentCommitment</spanx> (1),</t> | <ul spacing="normal"> | |||
| <t><spanx style="verb">keyEncipherment</spanx> (2),</t> | <li> | |||
| <t><spanx style="verb">dataEncipherment</spanx> (3),</t> | <tt>digitalSignature</tt> (0)</li> | |||
| <t><spanx style="verb">keyAgreement</spanx> (4),</t> | <li> | |||
| <t><spanx style="verb">keyCertSign</spanx> (5),</t> | <tt>contentCommitment</tt> (1)</li> | |||
| <t><spanx style="verb">cRLSign</spanx> (6),</t> | <li> | |||
| <t><spanx style="verb">encipherOnly</spanx> (7),</t> | <tt>keyEncipherment</tt> (2)</li> | |||
| <t><spanx style="verb">decipherOnly</spanx> (8).</t> | <li> | |||
| </list></t> | <tt>dataEncipherment</tt> (3)</li> | |||
| <t>Note that <spanx style="verb">contentCommitment</spanx> was named <sp | <li> | |||
| anx style="verb">nonRepudiation</spanx> in previous versions of X.509.</t> | <tt>keyAgreement</tt> (4)</li> | |||
| <t>If the key is going to be used for key agreement, flag <spanx | <li> | |||
| style="verb">keyAgreement</spanx> MUST be present in <spanx | <tt>keyCertSign</tt> (5)</li> | |||
| style="verb">KeyUsage</spanx> extension with <spanx | <li> | |||
| style="verb">encipherOnly</spanx> and <spanx | <tt>cRLSign</tt> (6)</li> | |||
| style="verb">decipherOnly</spanx> flags being optional. However | <li> | |||
| the <spanx style="verb">encipherOnly</spanx> and <spanx | <tt>encipherOnly</tt> (7)</li> | |||
| style="verb">decipherOnly</spanx> flags MUST NOT be present | <li> | |||
| <tt>decipherOnly</tt> (8)</li> | ||||
| </ul> | ||||
| <t>Note that <tt>contentCommitment</tt> was named <tt>nonRepudiation</tt | ||||
| > in previous versions of X.509.</t> | ||||
| <t>If the key is going to be used for key agreement, the <tt>keyAgreemen | ||||
| t</tt> flag <bcp14>MUST</bcp14> be present in the <tt>KeyUsage</tt> extension, w | ||||
| ith the <tt>encipherOnly</tt> and <tt>decipherOnly</tt> flags being optional. H | ||||
| owever, | ||||
| the <tt>encipherOnly</tt> and <tt>decipherOnly</tt> flags <bcp14>MUST | ||||
| NOT</bcp14> be present | ||||
| simultaneously.</t> | simultaneously.</t> | |||
| </section> | </section> | |||
| </section> | </section> | |||
| <section numbered="true" toc="default"> | ||||
| <section title="Qualified Certificates Extensions"> | <name>Qualified Certificate Extensions</name> | |||
| <t>This section defines additional object identifiers (OIDs) for use in | <t>This section defines additional OIDs for use in | |||
| qualified certificates for checking digital signatures.</t> | qualified certificates for checking digital signatures.</t> | |||
| <section title="Distinguished Name Additions"> | <section numbered="true" toc="default"> | |||
| <t><figure> | <name>Distinguished Name Additions</name> | |||
| <preamble>OGRN is the main state registration number of juridical en | <t keepWithNext="true">OGRN is the main state registration number of jur | |||
| tities.</preamble> | idical entities.</t> | |||
| <artwork>OGRN ::= NUMERIC STRING (SIZE(13))</artwork> | <sourcecode name="" type="asn.1"><![CDATA[OGRN ::= NUMERIC STRING (SIZE( | |||
| <postamble>Corresponding OID is <spanx style="verb">1.2.643.100.1</s | 13)) | |||
| panx>.</postamble> | ]]></sourcecode> | |||
| </figure></t> | <t keepWithPrevious="true">The corresponding OID is <tt>1.2.643.100.1</t | |||
| <t><figure> | t>.</t> | |||
| <preamble>SNILS is the individual insurance account number.</preambl | <t keepWithNext="true">SNILS is the individual insurance account number. | |||
| e> | </t> | |||
| <artwork>SNILS ::= NUMERIC STRING (SIZE(11))</artwork> | <sourcecode name="" type="asn.1"><![CDATA[SNILS ::= NUMERIC STRING (SIZE | |||
| <postamble>Corresponding OID is <spanx style="verb">1.2.643.100.3</s | (11)) | |||
| panx>.</postamble> | ]]></sourcecode> | |||
| </figure></t> | <t keepWithPrevious="true">The corresponding OID is <tt>1.2.643.100.3</t | |||
| <t><figure> | t>.</t> | |||
| <preamble>INNLE is the individual taxpayer number (ITN) of the Legal | <t keepWithNext="true">INNLE is the individual taxpayer number (ITN) of | |||
| Entity.</preamble> | the legal entity.</t> | |||
| <artwork>INNLE ::= NUMERIC STRING (SIZE(10))</artwork> | <sourcecode name="" type="asn.1"><![CDATA[INNLE ::= NUMERIC STRING (SIZE | |||
| <postamble>Corresponding OID is <spanx style="verb">1.2.643.100.4</s | (10)) | |||
| panx>.</postamble> | ]]></sourcecode> | |||
| </figure></t> | <t keepWithPrevious="true">The corresponding OID is <tt>1.2.643.100.4</t | |||
| <t><figure> | t>.</t> | |||
| <preamble>OGRNIP is the main state registration number of individual | <t keepWithNext="true">OGRNIP is the main state registration number of i | |||
| enterpreneurs (sole traders).</preamble> | ndividual entrepreneurs (sole traders).</t> | |||
| <artwork>OGRNIP ::= NUMERIC STRING (SIZE(15))</artwork> | <sourcecode name="" type="asn.1"><![CDATA[OGRNIP ::= NUMERIC STRING (SIZ | |||
| <postamble>Corresponding OID is <spanx style="verb">1.2.643.100.5</s | E(15)) | |||
| panx>.</postamble> | ]]></sourcecode> | |||
| </figure></t> | <t keepWithPrevious="true">The corresponding OID is <tt>1.2.643.100.5</t | |||
| <t><figure> | t>.</t> | |||
| <preamble>IdentificationKind represents the way the receiver of the | <t keepWithNext="true">IdentificationKind represents the way the receive | |||
| certificate was identified by the CA.</preamble> | r of the certificate was identified by the CA.</t> | |||
| <artwork>IdentificationKind ::= INTEGER { personal(0), remote-cert(1 | <sourcecode name="" type="asn.1"><![CDATA[IdentificationKind ::= INTEGER | |||
| ), | { personal(0), remote-cert(1), | |||
| remote-passport(2), remote-system(3) }</artwork> | remote-passport(2), remote-system(3) } | |||
| <postamble>Corresponding OID is <spanx style="verb">1.2.643.100.114< | ]]></sourcecode> | |||
| /spanx>.</postamble> | <t keepWithPrevious="true">The corresponding OID is <tt>1.2.643.100.114< | |||
| </figure></t> | /tt>.</t> | |||
| <t><figure> | <t keepWithNext="true">INN is the individual taxpayer number (ITN).</t> | |||
| <preamble>INN is the individual taxpayer number (ITN).</preamble> | <sourcecode name="" type="asn.1"><![CDATA[INN ::= NUMERIC STRING (SIZE(1 | |||
| <artwork>INN ::= NUMERIC STRING (SIZE(12))</artwork> | 2)) | |||
| <postamble>Corresponding OID is <spanx style="verb">1.2.643.3.131.1. | ]]></sourcecode> | |||
| 1</spanx>.</postamble> | <t keepWithPrevious="true">The corresponding OID is <tt>1.2.643.3.131.1. | |||
| </figure></t> | 1</tt>.</t> | |||
| </section> | </section> | |||
| <section title="Certificate Policies"> | <section numbered="true" toc="default"> | |||
| <t>Russian national regulation body for cryptography defines several sec | <name>Certificate Policies</name> | |||
| urity | <t>The Russian national regulation body for cryptography defines several | |||
| security | ||||
| levels of cryptographic tools. Depending on | levels of cryptographic tools. Depending on | |||
| the class of cryptographic token used by certificate owner the | the class of cryptographic token used by the certificate owner, the | |||
| following OIDs must be included into certificate policies. | following OIDs must be included in certificate policies. | |||
| Certificate should include OIDs starting from the lowest one (KC1) up | Certificates should include OIDs, starting from the lowest (KC1) up | |||
| to the strongest applicable. | to the strongest applicable. | |||
| </t> | ||||
| <list style="symbols"> | <ul spacing="normal"> | |||
| <t><spanx style="verb">1.2.643.100.113.1</spanx> - class KC1,</t> | <li> | |||
| <t><spanx style="verb">1.2.643.100.113.2</spanx> - class KC2,</t> | <tt>1.2.643.100.113.1</tt> - class KC1</li> | |||
| <t><spanx style="verb">1.2.643.100.113.3</spanx> - class KC3,</t> | <li> | |||
| <t><spanx style="verb">1.2.643.100.113.4</spanx> - class KB1,</t> | <tt>1.2.643.100.113.2</tt> - class KC2</li> | |||
| <t><spanx style="verb">1.2.643.100.113.5</spanx> - class KB2,</t> | <li> | |||
| <t><spanx style="verb">1.2.643.100.113.6</spanx> - class KA1.</t> | <tt>1.2.643.100.113.3</tt> - class KC3</li> | |||
| </list></t> | <li> | |||
| <tt>1.2.643.100.113.4</tt> - class KB1</li> | ||||
| <li> | ||||
| <tt>1.2.643.100.113.5</tt> - class KB2</li> | ||||
| <li> | ||||
| <tt>1.2.643.100.113.6</tt> - class KA1</li> | ||||
| </ul> | ||||
| </section> | </section> | |||
| <section title="Subject Sign Tool"> | <section numbered="true" toc="default"> | |||
| <t><figure><preamble>To denote the token or software type used by certif | <name>Subject Sign Tool</name> | |||
| icate owner following non-critical <spanx style="verb">SubjectSignTool</spanx> e | <t keepWithNext="true">To denote the token or software type used by the | |||
| xtension with OID <spanx style="verb">1.2.643.100.111</spanx> should be included | certificate owner, the following non-critical <tt>SubjectSignTool</tt> extension | |||
| . It is defined as</preamble> | with OID <tt>1.2.643.100.111</tt> should be included. It is defined as</t> | |||
| <artwork>SubjectSignTool ::= UTF8String(SIZE(1..200)) .</artwork> | <sourcecode name="" type="asn.1"><![CDATA[SubjectSignTool ::= UTF8String | |||
| </figure></t> | (SIZE(1..200)) | |||
| ]]></sourcecode> | ||||
| </section> | </section> | |||
| <section title="Issuer Sign Tool"> | <section numbered="true" toc="default"> | |||
| <t><figure><preamble>To denote the tools used to generate key pair and t | <name>Issuer Sign Tool</name> | |||
| ools used by CA to sign certificate following non-critical <spanx style="verb">I | <t keepWithNext="true">To denote the tools used to generate key pairs an | |||
| ssuerSignTool</spanx> extension with OID <spanx style="verb">1.2.643.100.112</sp | d tools used by the CA to sign certificates, the following non-critical <tt>Issu | |||
| anx> should be included. It is defined as</preamble> | erSignTool</tt> extension with OID <tt>1.2.643.100.112</tt> should be included. | |||
| <artwork>IssuerSignTool ::= SEQUENCE { | It is defined as</t> | |||
| <sourcecode name="" type="asn.1"><![CDATA[IssuerSignTool ::= SEQUENCE { | ||||
| signTool UTF8String(SIZE(1..200)), | signTool UTF8String(SIZE(1..200)), | |||
| cATool UTF8String(SIZE(1..200)), | cATool UTF8String(SIZE(1..200)), | |||
| signToolCert UTF8String(SIZE(1..100)), | signToolCert UTF8String(SIZE(1..100)), | |||
| cAToolCert UTF8String(SIZE(1..100)) }</artwork> | cAToolCert UTF8String(SIZE(1..100)) } | |||
| </figure></t> | ]]></sourcecode> | |||
| <t>where:<list style="symbols"> | <t>where:</t> | |||
| <t><spanx style="verb">signTool</spanx> identifies tools used to | <ul spacing="normal"> | |||
| create key pair,</t> | <li> | |||
| <t><spanx style="verb">cATool</spanx> identifies tools used by | <tt>signTool</tt> identifies tools used to | |||
| certificate authority,</t> | create key pairs.</li> | |||
| <t><spanx style="verb">signToolCert</spanx> and <spanx | <li> | |||
| style="verb">cAToolCert</spanx> contain the notice of | <tt>cATool</tt> identifies tools used by the CA.</li> | |||
| respective tools conformance to Russian federal law on | <li> | |||
| digital signature.</t> | <tt>signToolCert</tt> and <tt>cAToolCert</tt> contain the notice of | |||
| </list></t> | the conformance of respective tools to Russian federal law on | |||
| digital signatures.</li> | ||||
| </ul> | ||||
| </section> | </section> | |||
| </section> | </section> | |||
| <section numbered="true" toc="default"> | ||||
| <section title="Historical Considerations"> | <name>Historical Considerations</name> | |||
| <t>Note that for the significant period of time there were no documents de | <t>Note that, for a significant period of time, there were no documents de | |||
| scribing <spanx style="verb">GostR3410-2012-PublicKeyParameters</spanx>. | scribing <tt>GostR3410-2012-PublicKeyParameters</tt>. | |||
| Several old implementations have used <spanx style="verb">GostR3410-2001 | Several old implementations have used <tt>GostR3410-2001-PublicKeyParame | |||
| -PublicKeyParameters</spanx> instead. | ters</tt> instead. | |||
| These implementations will return an error if <spanx style="verb">digest | These implementations will return an error if the <tt>digestParamSet</tt | |||
| ParamSet</spanx> field is not included into public key parameters. | > field is not included in public key parameters. | |||
| Thus an implementation wishing to collaborate with old implementations m | Thus, an implementation wishing to collaborate with old implementations | |||
| ight want to include <spanx style="verb">digestParamSet</spanx> equal to <spanx | might want to include <tt>digestParamSet</tt> equal to <tt>id-tc26-digest-gost34 | |||
| style="verb">id-tc26-digest-gost3411-12-512</spanx> if one of the following valu | 11-12-512</tt> if one of the following values is used as <tt>publicKeyParamSet</ | |||
| es is used as <spanx style="verb">publicKeyParamSet</spanx>: | tt>: | |||
| <list style="symbols"> | </t> | |||
| <t><spanx style="verb">id-tc26-gost-3410-12-512-paramSetA</spanx>,</t> | <ul spacing="normal"> | |||
| <t><spanx style="verb">id-tc26-gost-3410-12-512-paramSetB</spanx>.</t> | <li> | |||
| </list></t> | <tt>id-tc26-gost-3410-12-512-paramSetA</tt></li> | |||
| <t>Note, that usage of <spanx style="verb">keyEncipherment</spanx> and <sp | <li> | |||
| anx style="verb">dataEncipherment</spanx> values for the | <tt>id-tc26-gost-3410-12-512-paramSetB</tt></li> | |||
| <spanx style="verb">KeyUsage</spanx> extension is not fully defined for | </ul> | |||
| the GOST R 34.10-2012 public | <t>Note that the usage of <tt>keyEncipherment</tt> and <tt>dataEnciphermen | |||
| keys, so they SHOULD be used with additional care.</t> | t</tt> values for the | |||
| <tt>KeyUsage</tt> extension is not fully defined for the GOST R 34.10-20 | ||||
| 12 public | ||||
| keys, so they <bcp14>SHOULD</bcp14> be used with additional care.</t> | ||||
| </section> | </section> | |||
| <section anchor="IANA" numbered="true" toc="default"> | ||||
| <section anchor="IANA" title="IANA Considerations"> | <name>IANA Considerations</name> | |||
| <t>This memo includes no request to IANA.</t> | <t>This document has no IANA actions.</t> | |||
| </section> | </section> | |||
| <section numbered="true" toc="default"> | ||||
| <section title="Security Considerations"> | <name>Security Considerations</name> | |||
| <t>It is RECOMMENDED that applications verify signature values and subject | <t>It is <bcp14>RECOMMENDED</bcp14> that applications verify signature val | |||
| public keys to conform to <xref target="GOSTR3410-2012" /> standard | ues and subject | |||
| (<xref target="RFC7091" />) prior to their use.</t> | public keys to conform to the GOST R 34.10-2012 standard <xref targ | |||
| et="GOSTR3410-2012" format="default"/> <xref target="RFC7091" format="default"/> | ||||
| <t>It is RECOMMENDED that CAs and applications make sure that the private | prior to their use.</t> | |||
| key | <t>It is <bcp14>RECOMMENDED</bcp14> that CAs and applications make sure th | |||
| at the private key | ||||
| for creating signatures is not used for more than its allowed validity p eriod | for creating signatures is not used for more than its allowed validity p eriod | |||
| (typically 15 months for GOST R 34.10-2012 algorithm).</t> | (typically 15 months for the GOST R 34.10-2012 algorithm).</t> | |||
| <t>Test parameter sets (<tt>id-GostR3410-2001-TestParamSet</tt> | ||||
| <t>Test parameter sets (<spanx style="verb">id-GostR3410-2001-TestParamSet | and <tt>id-tc26-gost-3410-2012-512-paramSetTest</tt>) <bcp14>MUST NOT</b | |||
| </spanx> | cp14> | |||
| and <spanx style="verb">id-tc26-gost-3410-2012-512-paramSetTest</spanx>) | ||||
| MUST NOT | ||||
| be used outside of testing scenarios. | be used outside of testing scenarios. | |||
| Use or parameter sets not described herein | The use of parameter sets not described herein | |||
| is NOT RECOMMENDED. When different parameters are used, it is | is <bcp14>NOT RECOMMENDED</bcp14>. When different parameters are used, i | |||
| RECOMMENDED that they be subjected to examination by an authorized | t is | |||
| <bcp14>RECOMMENDED</bcp14> that they be subjected to examination by an a | ||||
| uthorized | ||||
| agency with approved methods of cryptographic analysis.</t> | agency with approved methods of cryptographic analysis.</t> | |||
| <t>For security discussions concerning the use of algorithm parameters, se | ||||
| <t>For security discussion concerning use of algorithm parameters, see <xr | e <xref target="ANS17" format="default"/> | |||
| ef target="ANS17" /> | and the Security Considerations sections in <xref target="RFC4357" form | |||
| and the Security Considerations sections in <xref target="RFC4357" />, < | at="default"/> and <xref target="RFC7836" format="default"/>.</t> | |||
| xref target="RFC7836" />.</t> | ||||
| </section> | </section> | |||
| </middle> | </middle> | |||
| <back> | <back> | |||
| <references title="Normative References"> | <references> | |||
| <?rfc include='reference.RFC.7091.xml'?> | <name>References</name> | |||
| <?rfc include='reference.RFC.6986.xml'?> | <references> | |||
| <?rfc include='reference.RFC.5280.xml'?> | <name>Normative References</name> | |||
| <?rfc include='reference.RFC.5652.xml'?> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.R | |||
| <?rfc include='reference.RFC.2119.xml'?> | FC.7091.xml"/> | |||
| <?rfc include='reference.RFC.4357.xml'?> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.R | |||
| <?rfc include='reference.RFC.7836.xml'?> | FC.6986.xml"/> | |||
| <?rfc include='reference.RFC.8174.xml'?> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.R | |||
| </references> | FC.5280.xml"/> | |||
| <references title="Informative References"> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.R | |||
| <reference anchor="GOSTR3410-2012"> | FC.5652.xml"/> | |||
| <front> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.R | |||
| <title> | FC.2119.xml"/> | |||
| Information technology. Cryptographic data security. Signature and v | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.R | |||
| erification | FC.4357.xml"/> | |||
| <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.R | ||||
| FC.7836.xml"/> | ||||
| <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.R | ||||
| FC.8174.xml"/> | ||||
| </references> | ||||
| <references> | ||||
| <name>Informative References</name> | ||||
| <reference anchor="GOSTR3410-2012"> | ||||
| <front> | ||||
| <title> | ||||
| Information technology. Cryptographic data security. Signature and | ||||
| verification | ||||
| processes of [electronic] digital signature | processes of [electronic] digital signature | |||
| </title> | </title> | |||
| <author> | <author> | |||
| <organization> | <organization> | |||
| Federal Agency on Technical Regulating and Metrology | </organization> | |||
| </organization> | </author> | |||
| </author> | <date year="2012"/> | |||
| <date year="2012"/> | </front> | |||
| </front> | <refcontent>GOST R 34.10-2012, Federal Agency on Technical Regulating | |||
| <seriesInfo name="GOST R" value="34.10-2012"/> | and Metrology</refcontent> | |||
| </reference> | </reference> | |||
| <reference anchor="GOSTR3411-2012"> | ||||
| <reference anchor="GOSTR3411-2012"> | <front> | |||
| <front> | <title> | |||
| <title> | Information technology. Cryptographic Data Security. Hashing funct | |||
| Information technology. Cryptographic Data Security. Hashing functio | ion | |||
| n | </title> | |||
| </title> | <author> | |||
| <author> | <organization> | |||
| <organization> | </organization> | |||
| Federal Agency on Technical Regulating and Metrology | </author> | |||
| </organization> | <date year="2012"/> | |||
| </author> | </front> | |||
| <date year="2012"/> | <refcontent>GOST R 34.11-2012, Federal Agency on Technical Regulating | |||
| </front> | and Metrology</refcontent> | |||
| <seriesInfo name="GOST R" value="34.11-2012"/> | </reference> | |||
| </reference> | <reference anchor="ANS17"> | |||
| <front> | ||||
| <reference anchor="ANS17"> | <title> | |||
| <front> | On the security properties of Russian standardized elliptic curves | |||
| <title> | </title> | |||
| On the security properties of Russian standardized elliptic curves. | <author fullname="E.K. Alekseev" initials="E.K." surname="Alekseev"/ | |||
| </title> | > | |||
| <author fullname="E.K. Alekseev" initials="E.K." surname="Alekseev" /> | <author fullname="V.D. Nikolaev" initials="V.D." surname="Nikolaev"/ | |||
| <author fullname="V.D. Nikolaev" initials="V.D." surname="Nikolaev" /> | > | |||
| <author fullname="S.V. Smyshlyaev" initials="S.V." surname="Smyshlyaev | <author fullname="S.V. Smyshlyaev" initials="S.V." surname="Smyshlya | |||
| " /> | ev"/> | |||
| <date year="2018"/> | <date year="2018"/> | |||
| </front> | </front> | |||
| <seriesInfo name="Mathematical Aspects of Cryptography" value="9:3. P. 5 | <refcontent>Mathematical Aspects of Cryptography, 9:3, P. 5-32</refcon | |||
| -32."/> | tent> | |||
| <seriesInfo name="DOI" value="10.4213/mvk260" /> | <seriesInfo name="DOI" value="10.4213/mvk260"/> | |||
| </reference> | </reference> | |||
| </references> | ||||
| </references> | </references> | |||
| <section numbered="true" toc="default"> | ||||
| <section title="GostR3410-2012-PKISyntax"> | <name>GostR3410-2012-PKISyntax</name> | |||
| <t><figure><artwork><![CDATA[GostR3410-2012-PKISyntax | <sourcecode name="" type="asn.1"><![CDATA[GostR3410-2012-PKISyntax | |||
| { iso(1) member-body(2) ru(643) rosstandart(7) | { iso(1) member-body(2) ru(643) rosstandart(7) | |||
| tc26(1) modules(0) gostR3411-2012-PKISyntax(2) } | tc26(1) modules(0) gostR3410-2012-PKISyntax(2) } | |||
| DEFINITIONS ::= | DEFINITIONS ::= | |||
| BEGIN | BEGIN | |||
| -- EXPORTS All -- | -- EXPORTS All -- | |||
| -- ASN.1 TC 26 root | -- ASN.1 TC 26 root | |||
| id-tc26 OBJECT IDENTIFIER ::= | id-tc26 OBJECT IDENTIFIER ::= | |||
| { iso(1) member-body(2) ru(643) rosstandart(7) tc26(1) } | { iso(1) member-body(2) ru(643) rosstandart(7) tc26(1) } | |||
| -- Signature algorithm | -- Signature algorithm | |||
| skipping to change at line 490 ¶ | skipping to change at line 505 ¶ | |||
| { id-tc26 algorithms(1) sign(1) } | { id-tc26 algorithms(1) sign(1) } | |||
| -- Hash algorithm | -- Hash algorithm | |||
| id-tc26-digest OBJECT IDENTIFIER ::= | id-tc26-digest OBJECT IDENTIFIER ::= | |||
| { id-tc26 algorithms(1) digest(2) } | { id-tc26 algorithms(1) digest(2) } | |||
| -- Public key identifiers | -- Public key identifiers | |||
| id-tc26-sign-constants OBJECT IDENTIFIER ::= | id-tc26-sign-constants OBJECT IDENTIFIER ::= | |||
| { id-tc26 constants(2) sign(1) } | { id-tc26 constants(2) sign(1) } | |||
| -- Public key algorithm GOST R 34.10-2012 / 256 bits identifiers | -- Public key algorithm GOST R 34.10-2012 / 256-bit identifiers | |||
| id-tc26-gost-3410-2012-256-constants OBJECT IDENTIFIER ::= | id-tc26-gost-3410-2012-256-constants OBJECT IDENTIFIER ::= | |||
| { id-tc26-sign-constants gost-3410-2012-256(1) } | { id-tc26-sign-constants gost-3410-2012-256(1) } | |||
| -- Public key algorithm GOST R 34.10-2012 / 512 bits identifiers | -- Public key algorithm GOST R 34.10-2012 / 512-bit identifiers | |||
| id-tc26-gost-3410-2012-512-constants OBJECT IDENTIFIER ::= | id-tc26-gost-3410-2012-512-constants OBJECT IDENTIFIER ::= | |||
| { id-tc26-sign-constants gost-3410-2012-512(2) } | { id-tc26-sign-constants gost-3410-2012-512(2) } | |||
| -- GOST R 34.10-2012 / 256 bits signature algorithm | -- GOST R 34.10-2012 / 256-bit signature algorithm | |||
| id-tc26-gost3410-12-256 OBJECT IDENTIFIER ::= | id-tc26-gost3410-12-256 OBJECT IDENTIFIER ::= | |||
| { id-tc26-sign gost3410-12-256(1) } | { id-tc26-sign gost3410-12-256(1) } | |||
| -- GOST R 34.10-2012 / 512 bits signature algorithm | -- GOST R 34.10-2012 / 512-bit signature algorithm | |||
| id-tc26-gost3410-12-512 OBJECT IDENTIFIER ::= | id-tc26-gost3410-12-512 OBJECT IDENTIFIER ::= | |||
| { id-tc26-sign gost3410-12-512(2) } | { id-tc26-sign gost3410-12-512(2) } | |||
| -- GOST R 34.11-2012 / 256 bits hash algorithm | -- GOST R 34.11-2012 / 256-bit hash algorithm | |||
| id-tc26-gost3411-12-256 OBJECT IDENTIFIER ::= | id-tc26-gost3411-12-256 OBJECT IDENTIFIER ::= | |||
| { id-tc26-digest gost3411-12-256(2)} | { id-tc26-digest gost3411-12-256(2)} | |||
| -- GOST R 34.11-2012 / 512 bits hash algorithm | -- GOST R 34.11-2012 / 512-bit hash algorithm | |||
| id-tc26-gost3411-12-512 OBJECT IDENTIFIER ::= | id-tc26-gost3411-12-512 OBJECT IDENTIFIER ::= | |||
| { id-tc26-digest gost3411-12-512(3)} | { id-tc26-digest gost3411-12-512(3)} | |||
| -- GOST R 34.10-2012 / GOST R 34.11-2012 sign/hash algorithm | -- GOST R 34.10-2012 / GOST R 34.11-2012 sign/hash algorithm | |||
| id-tc26-signwithdigest OBJECT IDENTIFIER ::= | id-tc26-signwithdigest OBJECT IDENTIFIER ::= | |||
| { id-tc26 algorithms(1) signwithdigest(3) } | { id-tc26 algorithms(1) signwithdigest(3) } | |||
| -- Signature & hash algorithm GOST R 34.10-2012 / 256 bits | -- Signature & hash algorithm GOST R 34.10-2012 / 256 bits | |||
| -- with GOST R 34.11-2012 | -- with GOST R 34.11-2012 | |||
| id-tc26-signwithdigest-gost3410-12-256 OBJECT IDENTIFIER ::= | id-tc26-signwithdigest-gost3410-12-256 OBJECT IDENTIFIER ::= | |||
| { id-tc26-signwithdigest gost3410-12-256(2) } | { id-tc26-signwithdigest gost3410-12-256(2) } | |||
| -- Signature & hash algorithm GOST R 34.10-2012 / 512 bits | -- Signature & hash algorithm GOST R 34.10-2012 / 512 bits | |||
| -- with GOST R 34.11-2012 | -- with GOST R 34.11-2012 | |||
| id-tc26-signwithdigest-gost3410-12-512 OBJECT IDENTIFIER ::= | id-tc26-signwithdigest-gost3410-12-512 OBJECT IDENTIFIER ::= | |||
| { id-tc26-signwithdigest gost3410-12-512(3) } | { id-tc26-signwithdigest gost3410-12-512(3) } | |||
| -- GOST R 34.10-2012 / 256 bits Signature algorithm parameters ID: | -- GOST R 34.10-2012 / 256-bit signature algorithm | |||
| -- "Set A" | -- parameters identifier: "Set A" | |||
| id-tc26-gost-3410-2012-256-paramSetA OBJECT IDENTIFIER ::= | id-tc26-gost-3410-2012-256-paramSetA OBJECT IDENTIFIER ::= | |||
| { id-tc26-gost-3410-2012-256-constants paramSetA(1) } | { id-tc26-gost-3410-2012-256-constants paramSetA(1) } | |||
| -- GOST R 34.10-2012 / 256 bits signature algorithm parameters ID: | -- GOST R 34.10-2012 / 256-bit signature algorithm | |||
| -- "Set B" | -- parameters identifier: "Set B" | |||
| id-tc26-gost-3410-2012-256-paramSetB OBJECT IDENTIFIER ::= | id-tc26-gost-3410-2012-256-paramSetB OBJECT IDENTIFIER ::= | |||
| { id-tc26-gost-3410-2012-256-constants paramSetB(2) } | { id-tc26-gost-3410-2012-256-constants paramSetB(2) } | |||
| -- GOST R 34.10-2012 / 256 bits signature algorithm parameters ID: | -- GOST R 34.10-2012 / 256-bit signature algorithm | |||
| -- "Set C" | -- parameters identifier: "Set C" | |||
| id-tc26-gost-3410-2012-256-paramSetC OBJECT IDENTIFIER ::= | id-tc26-gost-3410-2012-256-paramSetC OBJECT IDENTIFIER ::= | |||
| { id-tc26-gost-3410-2012-256-constants paramSetC(3) } | { id-tc26-gost-3410-2012-256-constants paramSetC(3) } | |||
| -- GOST R 34.10-2012 / 256 bits signature algorithm parameters ID: | -- GOST R 34.10-2012 / 256-bit signature algorithm | |||
| -- "Set D" | -- parameters identifier: "Set D" | |||
| id-tc26-gost-3410-2012-256-paramSetD OBJECT IDENTIFIER ::= | id-tc26-gost-3410-2012-256-paramSetD OBJECT IDENTIFIER ::= | |||
| { id-tc26-gost-3410-2012-256-constants paramSetD(4) } | { id-tc26-gost-3410-2012-256-constants paramSetD(4) } | |||
| -- GOST R 34.10-2012 / 512 bits signature algorithm parameters ID: | -- GOST R 34.10-2012 / 512-bit signature algorithm | |||
| -- "Test set" | -- parameters identifier: "Test set" | |||
| id-tc26-gost-3410-2012-512-paramSetTest OBJECT IDENTIFIER ::= | id-tc26-gost-3410-2012-512-paramSetTest OBJECT IDENTIFIER ::= | |||
| { id-tc26-gost-3410-2012-512-constants paramSetTest(0) } | { id-tc26-gost-3410-2012-512-constants paramSetTest(0) } | |||
| -- GOST R 34.10-2012 / 512 bits signature algorithm parameters ID: | -- GOST R 34.10-2012 / 512-bit signature algorithm | |||
| -- "Set A" | -- parameters identifier: "Set A" | |||
| id-tc26-gost-3410-2012-512-paramSetA OBJECT IDENTIFIER ::= | id-tc26-gost-3410-2012-512-paramSetA OBJECT IDENTIFIER ::= | |||
| { id-tc26-gost-3410-2012-512-constants paramSetA(1) } | { id-tc26-gost-3410-2012-512-constants paramSetA(1) } | |||
| -- GOST R 34.10-2012 / 512 bits signature algorithm parameters ID: | -- GOST R 34.10-2012 / 512-bit signature algorithm | |||
| -- "Set B" | -- parameters identifier: "Set B" | |||
| id-tc26-gost-3410-2012-512-paramSetB OBJECT IDENTIFIER ::= | id-tc26-gost-3410-2012-512-paramSetB OBJECT IDENTIFIER ::= | |||
| { id-tc26-gost-3410-2012-512-constants paramSetB(2) } | { id-tc26-gost-3410-2012-512-constants paramSetB(2) } | |||
| -- GOST R 34.10-2012 / 512 bits signature algorithm parameters ID: | -- GOST R 34.10-2012 / 512-bit signature algorithm | |||
| -- "Set C" | -- parameters identifier: "Set C" | |||
| id-tc26-gost-3410-2012-512-paramSetC OBJECT IDENTIFIER ::= | id-tc26-gost-3410-2012-512-paramSetC OBJECT IDENTIFIER ::= | |||
| { id-tc26-gost-3410-2012-512-constants paramSetC(3) } | { id-tc26-gost-3410-2012-512-constants paramSetC(3) } | |||
| -- Public key GOST R 34.10-2012 / 256 bits | -- Public key GOST R 34.10-2012 / 256 bits | |||
| GostR3410-2012-256-PublicKey ::= OCTET STRING (SIZE (64)) | GostR3410-2012-256-PublicKey ::= OCTET STRING (SIZE (64)) | |||
| -- Public key GOST R 34.10-2012 / 512 bits | -- Public key GOST R 34.10-2012 / 512 bits | |||
| GostR3410-2012-512-PublicKey ::= OCTET STRING (SIZE (128)) | GostR3410-2012-512-PublicKey ::= OCTET STRING (SIZE (128)) | |||
| -- Public key GOST R 34.10-2012 | -- Public key GOST R 34.10-2012 | |||
| GostR3410-2012-PublicKey ::= OCTET STRING (SIZE (64 | 128)) | GostR3410-2012-PublicKey ::= OCTET STRING (SIZE (64 | 128)) | |||
| -- Public key parameters GOST R 34.10-2012 | -- Public key parameters GOST R 34.10-2012 | |||
| GostR3410-2012-PublicKeyParameters ::= | GostR3410-2012-PublicKeyParameters ::= | |||
| SEQUENCE { | SEQUENCE { | |||
| publicKeyParamSet OBJECT IDENTIFIER, | publicKeyParamSet OBJECT IDENTIFIER, | |||
| digestParamSet OBJECT IDENTIFIER OPTIONAL | digestParamSet OBJECT IDENTIFIER OPTIONAL | |||
| } | } | |||
| END -- GostR3410-2012-PKISyntax | END -- GostR3410-2012-PKISyntax | |||
| ]]></artwork></figure></t> | ]]></sourcecode> | |||
| </section> | </section> | |||
| <section numbered="true" toc="default"> | ||||
| <name>GostR3410-2012-RuStrongCertsSyntax</name> | ||||
| <section title="GostR3410-2012-RuCertsSyntax"> | <sourcecode name="" type="asn.1"><![CDATA[RuStrongCertsSyntax | |||
| <t><figure><artwork><![CDATA[RuStrongCertsSyntax | ||||
| { iso(1) member-body(2) ru(643) rosstandart(7) | { iso(1) member-body(2) ru(643) rosstandart(7) | |||
| tc26(1) modules(0) ruStrongCertsSyntax(6) } | tc26(1) modules(0) ruStrongCertsSyntax(6) } | |||
| DEFINITIONS ::= | DEFINITIONS ::= | |||
| BEGIN | BEGIN | |||
| -- EXPORTS All -- | -- EXPORTS All -- | |||
| id-ca OBJECT IDENTIFIER ::= | id-ca OBJECT IDENTIFIER ::= | |||
| { iso(1) member-body(2) ru(643) ca(3) } | { iso(1) member-body(2) ru(643) ca(3) } | |||
| skipping to change at line 610 ¶ | skipping to change at line 626 ¶ | |||
| id-fns OBJECT IDENTIFIER ::= | id-fns OBJECT IDENTIFIER ::= | |||
| { id-ca fns(131) } | { id-ca fns(131) } | |||
| -- The main state registration number of juridical entities. | -- The main state registration number of juridical entities. | |||
| OGRN ::= NumericString(SIZE (13)) | OGRN ::= NumericString(SIZE (13)) | |||
| id-OGRN OBJECT IDENTIFIER ::= | id-OGRN OBJECT IDENTIFIER ::= | |||
| { id-fss ogrn(1) } | { id-fss ogrn(1) } | |||
| -- The individual insurance account number | -- The individual insurance account number. | |||
| SNILS ::= NumericString(SIZE (11)) | SNILS ::= NumericString(SIZE (11)) | |||
| id-SNILS OBJECT IDENTIFIER ::= | id-SNILS OBJECT IDENTIFIER ::= | |||
| { id-fss snils(3) } | { id-fss snils(3) } | |||
| -- The main state registration number of | -- The main state registration number of | |||
| -- individual enterpreneurs (sole traders). | -- individual entrepreneurs (sole traders). | |||
| OGRNIP ::= NumericString(SIZE (15)) | OGRNIP ::= NumericString(SIZE (15)) | |||
| id-OGRNIP OBJECT IDENTIFIER ::= | id-OGRNIP OBJECT IDENTIFIER ::= | |||
| { id-fss ogrnip(5) } | { id-fss ogrnip(5) } | |||
| id-class OBJECT IDENTIFIER ::= | id-class OBJECT IDENTIFIER ::= | |||
| { id-fss class(113) } | { id-fss class(113) } | |||
| id-class-kc1 OBJECT IDENTIFIER ::= | id-class-kc1 OBJECT IDENTIFIER ::= | |||
| { id-class kc1(1) } | { id-class kc1(1) } | |||
| skipping to change at line 656 ¶ | skipping to change at line 672 ¶ | |||
| id-INN OBJECT IDENTIFIER ::= | id-INN OBJECT IDENTIFIER ::= | |||
| { id-fns ids(1) inn(1) } | { id-fns ids(1) inn(1) } | |||
| -- The organization taxpayer number (OTN). | -- The organization taxpayer number (OTN). | |||
| INNLE ::= NumericString(SIZE (10)) | INNLE ::= NumericString(SIZE (10)) | |||
| id-INNLE OBJECT IDENTIFIER ::= | id-INNLE OBJECT IDENTIFIER ::= | |||
| { id-fss innle(4) } | { id-fss innle(4) } | |||
| -- The token or software type used by certificate owner | -- The token or software type used by the certificate owner. | |||
| SubjectSignTool ::= UTF8String(SIZE(1..200)) | SubjectSignTool ::= UTF8String(SIZE(1..200)) | |||
| id-SubjectSignTool OBJECT IDENTIFIER ::= | id-SubjectSignTool OBJECT IDENTIFIER ::= | |||
| { id-fss subjectSignTool(111) } | { id-fss subjectSignTool(111) } | |||
| -- the tools used to generate key pair and tools used by CA | -- The tools used to generate key pairs and tools used by | |||
| -- to sign certificate | -- the CA to sign certificates. | |||
| IssuerSignTool ::= SEQUENCE { | IssuerSignTool ::= SEQUENCE { | |||
| signTool UTF8String(SIZE(1..200)), | signTool UTF8String(SIZE(1..200)), | |||
| cATool UTF8String(SIZE(1..200)), | cATool UTF8String(SIZE(1..200)), | |||
| signToolCert UTF8String(SIZE(1..100)), | signToolCert UTF8String(SIZE(1..100)), | |||
| cAToolCert UTF8String(SIZE(1..100)) } | cAToolCert UTF8String(SIZE(1..100)) } | |||
| id-IssuerSignTool OBJECT IDENTIFIER ::= | id-IssuerSignTool OBJECT IDENTIFIER ::= | |||
| { id-fss issuerSignTool(112) } | { id-fss issuerSignTool(112) } | |||
| -- The method of identifying owner, when it applies/receives | -- The method of identifying the owner, when it applies/receives | |||
| -- certificate in the CA | -- the certificate in the CA. | |||
| IdentificationKind ::= INTEGER { personal(0), remote-cert(1), | IdentificationKind ::= INTEGER { personal(0), remote-cert(1), | |||
| remote-passport(2), remote-system(3) } | remote-passport(2), remote-system(3) } | |||
| id-IdentificationKind OBJECT IDENTIFIER ::= | id-IdentificationKind OBJECT IDENTIFIER ::= | |||
| { id-fss identificationKind(114) } | { id-fss identificationKind(114) } | |||
| END -- RuStrongCertsSyntax | END -- RuStrongCertsSyntax | |||
| ]]></artwork></figure></t> | ]]></sourcecode> | |||
| </section> | </section> | |||
| <section anchor="pkparamsBCD" numbered="true" toc="default"> | ||||
| <section title="Public key Parameters" anchor="pkparamsBCD"> | <name>Public Key Parameters</name> | |||
| <t>Here we define three new object identifiers for three existing public k | <t>Here we define three new OIDs for three existing public key parameter s | |||
| ey parameter sets | ets | |||
| defined in <xref target="RFC4357" />. These object identifiers MUST be u | defined in <xref target="RFC4357" format="default"/>. These OIDs <bcp14> | |||
| sed with | MUST</bcp14> be used with | |||
| GOST R 34.10-2012 public keys only.</t> | GOST R 34.10-2012 public keys only.</t> | |||
| <t><figure><artwork><![CDATA[id-tc26-gost-3410-2012-256-paramSetB OBJECT I | ||||
| DENTIFIER ::= | <sourcecode name="" type="asn.1"><![CDATA[id-tc26-gost-3410-2012-256-param | |||
| { iso(1) member-body(2) ru(643) rosstandart(7) tc26(1) constants(2) | SetB OBJECT IDENTIFIER ::= | |||
| sign-constants(1) gost-3410-12-256-constants(1) paramSetB(2)}]]></artwor | { iso(1) member-body(2) ru(643) rosstandart(7) tc26(1) | |||
| k></figure></t> | constants(2) sign-constants(1) gost-3410-12-256-constants(1) | |||
| <t>The elliptic curve of this parameter set is the same as of | paramSetB(2)} | |||
| id-GostR3410-2001-CryptoPro-A-ParamSet (and id-GostR3410-2001-CryptoPro | ]]></sourcecode> | |||
| -XchA-ParamSet) | <t>The elliptic curve of this parameter set is the same as that of | |||
| which can be found in <xref target="RFC4357" />.</t> | <tt>id-GostR3410-2001-CryptoPro-A-ParamSet</tt> (and <tt>id-GostR3410-2 | |||
| <t><figure><artwork><![CDATA[id-tc26-gost-3410-2012-256-paramSetC OBJECT I | 001-CryptoPro-XchA-ParamSet</tt>), | |||
| DENTIFIER ::= | which can be found in <xref target="RFC4357" format="default"/>. | |||
| { iso(1) member-body(2) ru(643) rosstandart(7) tc26(1) constants(2) | </t> | |||
| sign-constants(1) gost-3410-12-256-constants(1) paramSetC(3)}]]></artwor | <sourcecode name="" type="asn.1"><![CDATA[id-tc26-gost-3410-2012-256-param | |||
| k></figure></t> | SetC OBJECT IDENTIFIER ::= | |||
| <t>The elliptic curve of this parameter set is the same as of | { iso(1) member-body(2) ru(643) rosstandart(7) tc26(1) | |||
| id-GostR3410-2001-CryptoPro-B-ParamSet which can be found in <xref targ | constants(2) sign-constants(1) gost-3410-12-256-constants(1) | |||
| et="RFC4357" />.</t> | paramSetC(3)} | |||
| <t><figure><artwork><![CDATA[id-tc26-gost-3410-2012-256-paramSetD OBJECT I | ]]></sourcecode> | |||
| DENTIFIER ::= | <t>The elliptic curve of this parameter set is the same as that of | |||
| { iso(1) member-body(2) ru(643) rosstandart(7) tc26(1) constants(2) | <tt>id-GostR3410-2001-CryptoPro-B-ParamSet</tt>, which can be found in | |||
| sign-constants(1) gost-3410-12-256-constants(1) paramSetD(4)}]]></artwor | <xref target="RFC4357" format="default"/>.</t> | |||
| k></figure></t> | <sourcecode name="" type="asn.1"><![CDATA[id-tc26-gost-3410-2012-256-param | |||
| <t>The elliptic curve of this parameter set is the same as of | SetD OBJECT IDENTIFIER ::= | |||
| id-GostR3410-2001-CryptoPro-C-ParamSet (and id-GostR3410-2001-CryptoPro | { iso(1) member-body(2) ru(643) rosstandart(7) tc26(1) | |||
| -XchB-ParamSet) | constants(2) sign-constants(1) gost-3410-12-256-constants(1) | |||
| which can be found in <xref target="RFC4357" />.</t> | paramSetD(4)} | |||
| ]]></sourcecode> | ||||
| <t>The elliptic curve of this parameter set is the same as that of | ||||
| <tt>id-GostR3410-2001-CryptoPro-C-ParamSet</tt> (and <tt>id-GostR3410-2 | ||||
| 001-CryptoPro-XchB-ParamSet</tt>), | ||||
| which can be found in <xref target="RFC4357" format="default"/>.</t> | ||||
| </section> | </section> | |||
| <section numbered="true" toc="default"> | ||||
| <name>Test Examples</name> | ||||
| <section numbered="true" toc="default"> | ||||
| <name>GOST R 34.10-2001 Test Parameters (256-Bit Private Key Length)</na | ||||
| me> | ||||
| <t>This example uses the curve defined in <xref target="RFC7091" section | ||||
| Format="of" section="7.1"/>.</t> | ||||
| <t keepWithNext="true">The private key is</t> | ||||
| <section title="Test Examples"> | <artwork name="" type="ascii-art" align="left" alt=""><![CDATA[d = 0x7A9 | |||
| <section title="GOST R 34.10-2001 Test Parameters (256 Bit Private Key Len | 29ADE789BB9BE10ED359DD39A72C1\\ | |||
| gth)"> | 1B60961F49397EEE1D19CE9891EC3B28 | |||
| <t>This example uses curve defined in Section 7.1 of <xref target="RFC70 | ]]></artwork> | |||
| 91" />.</t> | <t keepWithNext="true">The public key is</t> | |||
| <t><figure><preamble>Private key is</preamble> | <artwork name="" type="ascii-art" align="left" alt=""><![CDATA[X = 0x7F2 | |||
| <artwork>d = 0x7A929ADE789BB9BE10ED359DD39A72C11B60961F49397EEE1D19C | B49E270DB6D90D8595BEC458B50C5\\ | |||
| E9891EC3B28</artwork> | 8585BA1D4E9B788F6689DBD8E56FD80B | |||
| </figure></t> | ||||
| <t><figure><preamble>Public key is</preamble> | Y = 0x26F1B489D6701DD185C8413A977B3CBB\\ | |||
| <artwork>X = 0x7F2B49E270DB6D90D8595BEC458B50C58585BA1D4E9B788F6689D | AF64D1C593D26627DFFB101A87FF77DA | |||
| BD8E56FD80B | ]]></artwork> | |||
| Y = 0x26F1B489D6701DD185C8413A977B3CBBAF64D1C593D26627DFFB101A87FF77DA</artwork> | <section numbered="true" toc="default"> | |||
| </figure></t> | <name>Certificate Request</name> | |||
| <section title="Certificate Request"> | <sourcecode name="" type="asn.1"><![CDATA[ | |||
| <t><figure><artwork><![CDATA[ | ||||
| -----BEGIN CERTIFICATE REQUEST----- | -----BEGIN CERTIFICATE REQUEST----- | |||
| MIHTMIGBAgEAMBIxEDAOBgNVBAMTB0V4YW1wbGUwZjAfBggqhQMHAQEBATATBgcq | MIHTMIGBAgEAMBIxEDAOBgNVBAMTB0V4YW1wbGUwZjAfBggqhQMHAQEBATATBgcq | |||
| hQMCAiMABggqhQMHAQECAgNDAARAC9hv5djbiWaPeJtOHbqFhcVQi0XsW1nYkG3b | hQMCAiMABggqhQMHAQECAgNDAARAC9hv5djbiWaPeJtOHbqFhcVQi0XsW1nYkG3b | |||
| cOJJK3/ad/+HGhD73ydm0pPF0WSvuzx7lzpByIXRHXDWibTxJqAAMAoGCCqFAwcB | cOJJK3/ad/+HGhD73ydm0pPF0WSvuzx7lzpByIXRHXDWibTxJqAAMAoGCCqFAwcB | |||
| AQMCA0EAaqqzjjXUqqUXlAMBeZEi2FVIT1efTLuW1jzf3zrMQypBqijS8asUgoDN | AQMCA0EAaqqzjjXUqqUXlAMBeZEi2FVIT1efTLuW1jzf3zrMQypBqijS8asUgoDN | |||
| ntVv7aQZdAU1VKQnZ7g60EP9OdwEkw== | ntVv7aQZdAU1VKQnZ7g60EP9OdwEkw== | |||
| -----END CERTIFICATE REQUEST----- | -----END CERTIFICATE REQUEST----- | |||
| 0 211: SEQUENCE { | 0 211: SEQUENCE { | |||
| 3 129: SEQUENCE { | 3 129: SEQUENCE { | |||
| skipping to change at line 743 ¶ | skipping to change at line 774 ¶ | |||
| 13 14: SEQUENCE { | 13 14: SEQUENCE { | |||
| 15 3: OBJECT IDENTIFIER commonName (2 5 4 3) | 15 3: OBJECT IDENTIFIER commonName (2 5 4 3) | |||
| 20 7: PrintableString 'Example' | 20 7: PrintableString 'Example' | |||
| : } | : } | |||
| : } | : } | |||
| : } | : } | |||
| 29 102: SEQUENCE { | 29 102: SEQUENCE { | |||
| 31 31: SEQUENCE { | 31 31: SEQUENCE { | |||
| 33 8: OBJECT IDENTIFIER '1 2 643 7 1 1 1 1' | 33 8: OBJECT IDENTIFIER '1 2 643 7 1 1 1 1' | |||
| 43 19: SEQUENCE { | 43 19: SEQUENCE { | |||
| 45 7: OBJECT IDENTIFIER testSignParams (1 2 643 2 2 35 0) | 45 7: OBJECT IDENTIFIER '1 2 643 2 2 35 0' | |||
| 54 8: OBJECT IDENTIFIER '1 2 643 7 1 1 2 2' | 54 8: OBJECT IDENTIFIER '1 2 643 7 1 1 2 2' | |||
| : } | : } | |||
| : } | : } | |||
| 64 67: BIT STRING, encapsulates { | 64 67: BIT STRING, encapsulates { | |||
| 67 64: OCTET STRING | 67 64: OCTET STRING | |||
| : 0B D8 6F E5 D8 DB 89 66 8F 78 9B 4E 1D BA 85 85 | : 0B D8 6F E5 D8 DB 89 66 8F 78 9B 4E 1D BA 85 85 | |||
| : C5 50 8B 45 EC 5B 59 D8 90 6D DB 70 E2 49 2B 7F | : C5 50 8B 45 EC 5B 59 D8 90 6D DB 70 E2 49 2B 7F | |||
| : DA 77 FF 87 1A 10 FB DF 27 66 D2 93 C5 D1 64 AF | : DA 77 FF 87 1A 10 FB DF 27 66 D2 93 C5 D1 64 AF | |||
| : BB 3C 7B 97 3A 41 C8 85 D1 1D 70 D6 89 B4 F1 26 | : BB 3C 7B 97 3A 41 C8 85 D1 1D 70 D6 89 B4 F1 26 | |||
| : } | : } | |||
| skipping to change at line 765 ¶ | skipping to change at line 796 ¶ | |||
| 133 0: [0] {} | 133 0: [0] {} | |||
| : } | : } | |||
| 135 10: SEQUENCE { | 135 10: SEQUENCE { | |||
| 137 8: OBJECT IDENTIFIER '1 2 643 7 1 1 3 2' | 137 8: OBJECT IDENTIFIER '1 2 643 7 1 1 3 2' | |||
| : } | : } | |||
| 147 65: BIT STRING | 147 65: BIT STRING | |||
| : 6A AA B3 8E 35 D4 AA A5 17 94 03 01 79 91 22 D8 | : 6A AA B3 8E 35 D4 AA A5 17 94 03 01 79 91 22 D8 | |||
| : 55 48 4F 57 9F 4C BB 96 D6 3C DF DF 3A CC 43 2A | : 55 48 4F 57 9F 4C BB 96 D6 3C DF DF 3A CC 43 2A | |||
| : 41 AA 28 D2 F1 AB 14 82 80 CD 9E D5 6F ED A4 19 | : 41 AA 28 D2 F1 AB 14 82 80 CD 9E D5 6F ED A4 19 | |||
| : 74 05 35 54 A4 27 67 B8 3A D0 43 FD 39 DC 04 93 | : 74 05 35 54 A4 27 67 B8 3A D0 43 FD 39 DC 04 93 | |||
| : }]]></artwork></figure></t> | : } | |||
| ]]></sourcecode> | ||||
| </section> | </section> | |||
| <section title="Certificate"> | <section numbered="true" toc="default"> | |||
| <t><figure><artwork><![CDATA[ | <name>Certificate</name> | |||
| <sourcecode name="" type="asn.1"><![CDATA[ | ||||
| -----BEGIN CERTIFICATE----- | -----BEGIN CERTIFICATE----- | |||
| MIIBLTCB26ADAgECAgEKMAoGCCqFAwcBAQMCMBIxEDAOBgNVBAMTB0V4YW1wbGUw | MIIBLTCB26ADAgECAgEKMAoGCCqFAwcBAQMCMBIxEDAOBgNVBAMTB0V4YW1wbGUw | |||
| IBcNMDEwMTAxMDAwMDAwWhgPMjA1MDEyMzEwMDAwMDBaMBIxEDAOBgNVBAMTB0V4 | IBcNMDEwMTAxMDAwMDAwWhgPMjA1MDEyMzEwMDAwMDBaMBIxEDAOBgNVBAMTB0V4 | |||
| YW1wbGUwZjAfBggqhQMHAQEBATATBgcqhQMCAiMABggqhQMHAQECAgNDAARAC9hv | YW1wbGUwZjAfBggqhQMHAQEBATATBgcqhQMCAiMABggqhQMHAQECAgNDAARAC9hv | |||
| 5djbiWaPeJtOHbqFhcVQi0XsW1nYkG3bcOJJK3/ad/+HGhD73ydm0pPF0WSvuzx7 | 5djbiWaPeJtOHbqFhcVQi0XsW1nYkG3bcOJJK3/ad/+HGhD73ydm0pPF0WSvuzx7 | |||
| lzpByIXRHXDWibTxJqMTMBEwDwYDVR0TAQH/BAUwAwEB/zAKBggqhQMHAQEDAgNB | lzpByIXRHXDWibTxJqMTMBEwDwYDVR0TAQH/BAUwAwEB/zAKBggqhQMHAQEDAgNB | |||
| AE1T8BL+CBd2UH1Nm7gfAO/bTu/Uq4O6xLrPc1Fzz6gcQaoo0vGrFIKAzZ7Vb+2k | AE1T8BL+CBd2UH1Nm7gfAO/bTu/Uq4O6xLrPc1Fzz6gcQaoo0vGrFIKAzZ7Vb+2k | |||
| GXQFNVSkJ2e4OtBD/TncBJM= | GXQFNVSkJ2e4OtBD/TncBJM= | |||
| -----END CERTIFICATE----- | -----END CERTIFICATE----- | |||
| skipping to change at line 812 ¶ | skipping to change at line 846 ¶ | |||
| 85 14: SEQUENCE { | 85 14: SEQUENCE { | |||
| 87 3: OBJECT IDENTIFIER commonName (2 5 4 3) | 87 3: OBJECT IDENTIFIER commonName (2 5 4 3) | |||
| 92 7: PrintableString 'Example' | 92 7: PrintableString 'Example' | |||
| : } | : } | |||
| : } | : } | |||
| : } | : } | |||
| 101 102: SEQUENCE { | 101 102: SEQUENCE { | |||
| 103 31: SEQUENCE { | 103 31: SEQUENCE { | |||
| 105 8: OBJECT IDENTIFIER '1 2 643 7 1 1 1 1' | 105 8: OBJECT IDENTIFIER '1 2 643 7 1 1 1 1' | |||
| 115 19: SEQUENCE { | 115 19: SEQUENCE { | |||
| 117 7: OBJECT IDENTIFIER testSignParams (1 2 643 2 2 35 0) | 117 7: OBJECT IDENTIFIER '1 2 643 2 2 35 0' | |||
| 126 8: OBJECT IDENTIFIER '1 2 643 7 1 1 2 2' | 126 8: OBJECT IDENTIFIER '1 2 643 7 1 1 2 2' | |||
| : } | : } | |||
| : } | : } | |||
| 136 67: BIT STRING, encapsulates { | 136 67: BIT STRING, encapsulates { | |||
| 139 64: OCTET STRING | 139 64: OCTET STRING | |||
| : 0B D8 6F E5 D8 DB 89 66 8F 78 9B 4E 1D BA 85 85 | : 0B D8 6F E5 D8 DB 89 66 8F 78 9B 4E 1D BA 85 85 | |||
| : C5 50 8B 45 EC 5B 59 D8 90 6D DB 70 E2 49 2B 7F | : C5 50 8B 45 EC 5B 59 D8 90 6D DB 70 E2 49 2B 7F | |||
| : DA 77 FF 87 1A 10 FB DF 27 66 D2 93 C5 D1 64 AF | : DA 77 FF 87 1A 10 FB DF 27 66 D2 93 C5 D1 64 AF | |||
| : BB 3C 7B 97 3A 41 C8 85 D1 1D 70 D6 89 B4 F1 26 | : BB 3C 7B 97 3A 41 C8 85 D1 1D 70 D6 89 B4 F1 26 | |||
| : } | : } | |||
| skipping to change at line 846 ¶ | skipping to change at line 880 ¶ | |||
| : } | : } | |||
| : } | : } | |||
| 226 10: SEQUENCE { | 226 10: SEQUENCE { | |||
| 228 8: OBJECT IDENTIFIER '1 2 643 7 1 1 3 2' | 228 8: OBJECT IDENTIFIER '1 2 643 7 1 1 3 2' | |||
| : } | : } | |||
| 238 65: BIT STRING | 238 65: BIT STRING | |||
| : 4D 53 F0 12 FE 08 17 76 50 7D 4D 9B B8 1F 00 EF | : 4D 53 F0 12 FE 08 17 76 50 7D 4D 9B B8 1F 00 EF | |||
| : DB 4E EF D4 AB 83 BA C4 BA CF 73 51 73 CF A8 1C | : DB 4E EF D4 AB 83 BA C4 BA CF 73 51 73 CF A8 1C | |||
| : 41 AA 28 D2 F1 AB 14 82 80 CD 9E D5 6F ED A4 19 | : 41 AA 28 D2 F1 AB 14 82 80 CD 9E D5 6F ED A4 19 | |||
| : 74 05 35 54 A4 27 67 B8 3A D0 43 FD 39 DC 04 93 | : 74 05 35 54 A4 27 67 B8 3A D0 43 FD 39 DC 04 93 | |||
| : }]]></artwork></figure></t> | : } | |||
| ]]></sourcecode> | ||||
| </section> | </section> | |||
| <section title="Certificate Revocation List"> | <section numbered="true" toc="default"> | |||
| <t><figure><artwork><![CDATA[ | <name>Certificate Revocation List</name> | |||
| <sourcecode name="" type="asn.1"><![CDATA[ | ||||
| -----BEGIN X509 CRL----- | -----BEGIN X509 CRL----- | |||
| MIGSMEECAQEwCgYIKoUDBwEBAwIwEjEQMA4GA1UEAxMHRXhhbXBsZRcNMTQwMTAx | MIGSMEECAQEwCgYIKoUDBwEBAwIwEjEQMA4GA1UEAxMHRXhhbXBsZRcNMTQwMTAx | |||
| MDAwMDAwWhcNMTQwMTAyMDAwMDAwWjAKBggqhQMHAQEDAgNBAEK/OSoU0+vpV68+ | MDAwMDAwWhcNMTQwMTAyMDAwMDAwWjAKBggqhQMHAQEDAgNBAEK/OSoU0+vpV68+ | |||
| RstQv19CIaADrT0XJ1PJSpw3ox0gQaoo0vGrFIKAzZ7Vb+2kGXQFNVSkJ2e4OtBD | RstQv19CIaADrT0XJ1PJSpw3ox0gQaoo0vGrFIKAzZ7Vb+2kGXQFNVSkJ2e4OtBD | |||
| /TncBJM= | /TncBJM= | |||
| -----END X509 CRL----- | -----END X509 CRL----- | |||
| 0 146: SEQUENCE { | 0 146: SEQUENCE { | |||
| 3 65: SEQUENCE { | 3 65: SEQUENCE { | |||
| 5 1: INTEGER 1 | 5 1: INTEGER 1 | |||
| skipping to change at line 882 ¶ | skipping to change at line 918 ¶ | |||
| 55 13: UTCTime 02/01/2014 00:00:00 GMT | 55 13: UTCTime 02/01/2014 00:00:00 GMT | |||
| : } | : } | |||
| 70 10: SEQUENCE { | 70 10: SEQUENCE { | |||
| 72 8: OBJECT IDENTIFIER '1 2 643 7 1 1 3 2' | 72 8: OBJECT IDENTIFIER '1 2 643 7 1 1 3 2' | |||
| : } | : } | |||
| 82 65: BIT STRING | 82 65: BIT STRING | |||
| : 42 BF 39 2A 14 D3 EB E9 57 AF 3E 46 CB 50 BF 5F | : 42 BF 39 2A 14 D3 EB E9 57 AF 3E 46 CB 50 BF 5F | |||
| : 42 21 A0 03 AD 3D 17 27 53 C9 4A 9C 37 A3 1D 20 | : 42 21 A0 03 AD 3D 17 27 53 C9 4A 9C 37 A3 1D 20 | |||
| : 41 AA 28 D2 F1 AB 14 82 80 CD 9E D5 6F ED A4 19 | : 41 AA 28 D2 F1 AB 14 82 80 CD 9E D5 6F ED A4 19 | |||
| : 74 05 35 54 A4 27 67 B8 3A D0 43 FD 39 DC 04 93 | : 74 05 35 54 A4 27 67 B8 3A D0 43 FD 39 DC 04 93 | |||
| : }]]></artwork></figure></t> | : } | |||
| ]]></sourcecode> | ||||
| </section> | </section> | |||
| </section> | </section> | |||
| <section numbered="true" toc="default"> | ||||
| <name>GOST R 34.10-2012 TC26-256-A Parameters (256-Bit Private Key Lengt | ||||
| h)</name> | ||||
| <t>This example uses the curve defined in <xref target="RFC7836" section | ||||
| Format="of" section="A.2"/>.</t> | ||||
| <t keepWithNext="true">The private key is</t> | ||||
| <artwork name="" type="ascii-art" align="left" alt=""><![CDATA[d = 0x3A9 | ||||
| 29ADE789BB9BE10ED359DD39A72C1\\ | ||||
| 0B87C83F80BE18B85C041F4325B62EC1 | ||||
| ]]></artwork> | ||||
| <t keepWithNext="true">The public key is</t> | ||||
| <artwork name="" type="ascii-art" align="left" alt=""><![CDATA[X = 0x99C | ||||
| 3DF265EA59350640BA69D1DE04418\\ | ||||
| AF3FEA03EC0F85F2DD84E8BED4952774 | ||||
| <section title="GOST R 34.10-2012 TC26-256-A Parameters (256 Bit Private K | Y = 0xE218631A69C47C122E2D516DA1C09E6B\\ | |||
| ey Length)"> | D19344D94389D1F16C0C4D4DCF96F578 | |||
| <t>This example uses curve defined in Section A.2 of <xref target="RFC78 | ]]></artwork> | |||
| 36" />.</t> | <section numbered="true" toc="default"> | |||
| <t><figure><preamble>Private key is</preamble> | <name>Certificate Request</name> | |||
| <artwork>d = 0x3A929ADE789BB9BE10ED359DD39A72C10B87C83F80BE18B85C041 | <sourcecode name="" type="asn.1"><![CDATA[ | |||
| F4325B62EC1</artwork> | ||||
| </figure></t> | ||||
| <t><figure><preamble>Public key is</preamble> | ||||
| <artwork>X = 0x99C3DF265EA59350640BA69D1DE04418AF3FEA03EC0F85F2DD84E | ||||
| 8BED4952774 | ||||
| Y = 0xE218631A69C47C122E2D516DA1C09E6BD19344D94389D1F16C0C4D4DCF96F578</artwork> | ||||
| </figure></t> | ||||
| <section title="Certificate Request"> | ||||
| <t><figure><artwork><![CDATA[ | ||||
| -----BEGIN CERTIFICATE REQUEST----- | -----BEGIN CERTIFICATE REQUEST----- | |||
| MIHKMHkCAQAwEjEQMA4GA1UEAxMHRXhhbXBsZTBeMBcGCCqFAwcBAQEBMAsGCSqF | MIHKMHkCAQAwEjEQMA4GA1UEAxMHRXhhbXBsZTBeMBcGCCqFAwcBAQEBMAsGCSqF | |||
| AwcBAgEBAQNDAARAdCeV1L7ohN3yhQ/sA+o/rxhE4B2dpgtkUJOlXibfw5l49ZbP | AwcBAgEBAQNDAARAdCeV1L7ohN3yhQ/sA+o/rxhE4B2dpgtkUJOlXibfw5l49ZbP | |||
| TU0MbPHRiUPZRJPRa57AoW1RLS4SfMRpGmMY4qAAMAoGCCqFAwcBAQMCA0EAG9wq | TU0MbPHRiUPZRJPRa57AoW1RLS4SfMRpGmMY4qAAMAoGCCqFAwcBAQMCA0EAG9wq | |||
| Exdnm2YjL2PqFv98ZMyqua2FX8bhgJFmHbedSBIdDh2lvjR8bxtSVseurCAK1krH | Exdnm2YjL2PqFv98ZMyqua2FX8bhgJFmHbedSBIdDh2lvjR8bxtSVseurCAK1krH | |||
| em9bOg4Jcxjnrm7naQ== | em9bOg4Jcxjnrm7naQ== | |||
| -----END CERTIFICATE REQUEST----- | -----END CERTIFICATE REQUEST----- | |||
| 0 202: SEQUENCE { | 0 202: SEQUENCE { | |||
| 3 121: SEQUENCE { | 3 121: SEQUENCE { | |||
| skipping to change at line 941 ¶ | skipping to change at line 983 ¶ | |||
| 124 0: [0] {} | 124 0: [0] {} | |||
| : } | : } | |||
| 126 10: SEQUENCE { | 126 10: SEQUENCE { | |||
| 128 8: OBJECT IDENTIFIER '1 2 643 7 1 1 3 2' | 128 8: OBJECT IDENTIFIER '1 2 643 7 1 1 3 2' | |||
| : } | : } | |||
| 138 65: BIT STRING | 138 65: BIT STRING | |||
| : 1B DC 2A 13 17 67 9B 66 23 2F 63 EA 16 FF 7C 64 | : 1B DC 2A 13 17 67 9B 66 23 2F 63 EA 16 FF 7C 64 | |||
| : CC AA B9 AD 85 5F C6 E1 80 91 66 1D B7 9D 48 12 | : CC AA B9 AD 85 5F C6 E1 80 91 66 1D B7 9D 48 12 | |||
| : 1D 0E 1D A5 BE 34 7C 6F 1B 52 56 C7 AE AC 20 0A | : 1D 0E 1D A5 BE 34 7C 6F 1B 52 56 C7 AE AC 20 0A | |||
| : D6 4A C7 7A 6F 5B 3A 0E 09 73 18 E7 AE 6E E7 69 | : D6 4A C7 7A 6F 5B 3A 0E 09 73 18 E7 AE 6E E7 69 | |||
| : }]]></artwork></figure></t> | : } | |||
| ]]></sourcecode> | ||||
| </section> | </section> | |||
| <section title="Certificate"> | <section numbered="true" toc="default"> | |||
| <t><figure><artwork><![CDATA[ | <name>Certificate</name> | |||
| <sourcecode name="" type="asn.1"><![CDATA[ | ||||
| -----BEGIN CERTIFICATE----- | -----BEGIN CERTIFICATE----- | |||
| MIIBJTCB06ADAgECAgEKMAoGCCqFAwcBAQMCMBIxEDAOBgNVBAMTB0V4YW1wbGUw | MIIBJTCB06ADAgECAgEKMAoGCCqFAwcBAQMCMBIxEDAOBgNVBAMTB0V4YW1wbGUw | |||
| IBcNMDEwMTAxMDAwMDAwWhgPMjA1MDEyMzEwMDAwMDBaMBIxEDAOBgNVBAMTB0V4 | IBcNMDEwMTAxMDAwMDAwWhgPMjA1MDEyMzEwMDAwMDBaMBIxEDAOBgNVBAMTB0V4 | |||
| YW1wbGUwXjAXBggqhQMHAQEBATALBgkqhQMHAQIBAQEDQwAEQHQnldS+6ITd8oUP | YW1wbGUwXjAXBggqhQMHAQEBATALBgkqhQMHAQIBAQEDQwAEQHQnldS+6ITd8oUP | |||
| 7APqP68YROAdnaYLZFCTpV4m38OZePWWz01NDGzx0YlD2UST0WuewKFtUS0uEnzE | 7APqP68YROAdnaYLZFCTpV4m38OZePWWz01NDGzx0YlD2UST0WuewKFtUS0uEnzE | |||
| aRpjGOKjEzARMA8GA1UdEwEB/wQFMAMBAf8wCgYIKoUDBwEBAwIDQQAUC02pEksJ | aRpjGOKjEzARMA8GA1UdEwEB/wQFMAMBAf8wCgYIKoUDBwEBAwIDQQAUC02pEksJ | |||
| yw1c6Sjuh0JzoxASlJLsDik2njt5EkhXjB0OHaW+NHxvG1JWx66sIArWSsd6b1s6 | yw1c6Sjuh0JzoxASlJLsDik2njt5EkhXjB0OHaW+NHxvG1JWx66sIArWSsd6b1s6 | |||
| DglzGOeubudp | DglzGOeubudp | |||
| -----END CERTIFICATE----- | -----END CERTIFICATE----- | |||
| skipping to change at line 1021 ¶ | skipping to change at line 1065 ¶ | |||
| : } | : } | |||
| : } | : } | |||
| 218 10: SEQUENCE { | 218 10: SEQUENCE { | |||
| 220 8: OBJECT IDENTIFIER '1 2 643 7 1 1 3 2' | 220 8: OBJECT IDENTIFIER '1 2 643 7 1 1 3 2' | |||
| : } | : } | |||
| 230 65: BIT STRING | 230 65: BIT STRING | |||
| : 14 0B 4D A9 12 4B 09 CB 0D 5C E9 28 EE 87 42 73 | : 14 0B 4D A9 12 4B 09 CB 0D 5C E9 28 EE 87 42 73 | |||
| : A3 10 12 94 92 EC 0E 29 36 9E 3B 79 12 48 57 8C | : A3 10 12 94 92 EC 0E 29 36 9E 3B 79 12 48 57 8C | |||
| : 1D 0E 1D A5 BE 34 7C 6F 1B 52 56 C7 AE AC 20 0A | : 1D 0E 1D A5 BE 34 7C 6F 1B 52 56 C7 AE AC 20 0A | |||
| : D6 4A C7 7A 6F 5B 3A 0E 09 73 18 E7 AE 6E E7 69 | : D6 4A C7 7A 6F 5B 3A 0E 09 73 18 E7 AE 6E E7 69 | |||
| : }]]></artwork></figure></t> | : } | |||
| ]]></sourcecode> | ||||
| </section> | </section> | |||
| <section title="Certificate Revocation List"> | <section numbered="true" toc="default"> | |||
| <t><figure><artwork><![CDATA[ | <name>Certificate Revocation List</name> | |||
| <sourcecode name="" type="asn.1"><![CDATA[ | ||||
| -----BEGIN X509 CRL----- | -----BEGIN X509 CRL----- | |||
| MIGSMEECAQEwCgYIKoUDBwEBAwIwEjEQMA4GA1UEAxMHRXhhbXBsZRcNMTQwMTAx | MIGSMEECAQEwCgYIKoUDBwEBAwIwEjEQMA4GA1UEAxMHRXhhbXBsZRcNMTQwMTAx | |||
| MDAwMDAwWhcNMTQwMTAyMDAwMDAwWjAKBggqhQMHAQEDAgNBABS9aAh8O5A8eqKL | MDAwMDAwWhcNMTQwMTAyMDAwMDAwWjAKBggqhQMHAQEDAgNBABS9aAh8O5A8eqKL | |||
| B/6y571v4JY/VjJnNZ9c2Oq0UFmtHQ4dpb40fG8bUlbHrqwgCtZKx3pvWzoOCXMY | B/6y571v4JY/VjJnNZ9c2Oq0UFmtHQ4dpb40fG8bUlbHrqwgCtZKx3pvWzoOCXMY | |||
| 565u52k= | 565u52k= | |||
| -----END X509 CRL----- | -----END X509 CRL----- | |||
| 0 146: SEQUENCE { | 0 146: SEQUENCE { | |||
| 3 65: SEQUENCE { | 3 65: SEQUENCE { | |||
| 5 1: INTEGER 1 | 5 1: INTEGER 1 | |||
| skipping to change at line 1057 ¶ | skipping to change at line 1103 ¶ | |||
| 55 13: UTCTime 02/01/2014 00:00:00 GMT | 55 13: UTCTime 02/01/2014 00:00:00 GMT | |||
| : } | : } | |||
| 70 10: SEQUENCE { | 70 10: SEQUENCE { | |||
| 72 8: OBJECT IDENTIFIER '1 2 643 7 1 1 3 2' | 72 8: OBJECT IDENTIFIER '1 2 643 7 1 1 3 2' | |||
| : } | : } | |||
| 82 65: BIT STRING | 82 65: BIT STRING | |||
| : 14 BD 68 08 7C 3B 90 3C 7A A2 8B 07 FE B2 E7 BD | : 14 BD 68 08 7C 3B 90 3C 7A A2 8B 07 FE B2 E7 BD | |||
| : 6F E0 96 3F 56 32 67 35 9F 5C D8 EA B4 50 59 AD | : 6F E0 96 3F 56 32 67 35 9F 5C D8 EA B4 50 59 AD | |||
| : 1D 0E 1D A5 BE 34 7C 6F 1B 52 56 C7 AE AC 20 0A | : 1D 0E 1D A5 BE 34 7C 6F 1B 52 56 C7 AE AC 20 0A | |||
| : D6 4A C7 7A 6F 5B 3A 0E 09 73 18 E7 AE 6E E7 69 | : D6 4A C7 7A 6F 5B 3A 0E 09 73 18 E7 AE 6E E7 69 | |||
| : }]]></artwork></figure></t> | : } | |||
| ]]></sourcecode> | ||||
| </section> | </section> | |||
| </section> | </section> | |||
| <section numbered="true" toc="default"> | ||||
| <name>GOST R 34.10-2012 Test Parameters (512-Bit Private Key Length)</na | ||||
| me> | ||||
| <t>This example uses the curve defined in <xref target="curve512test" fo | ||||
| rmat="default"/>.</t> | ||||
| <t keepWithNext="true">The private key is</t> | ||||
| <artwork name="" type="ascii-art" align="left" alt=""><![CDATA[d = 0x0BA | ||||
| 6048AADAE241BA40936D47756D7C9\\ | ||||
| 3091A0E8514669700EE7508E508B1020\\ | ||||
| 72E8123B2200A0563322DAD2827E2714\\ | ||||
| A2636B7BFD18AADFC62967821FA18DD4 | ||||
| ]]></artwork> | ||||
| <t keepWithNext="true">The public key is</t> | ||||
| <artwork name="" type="ascii-art" align="left" alt=""><![CDATA[X = 0x115 | ||||
| DC5BC96760C7B48598D8AB9E740D4\\ | ||||
| C4A85A65BE33C1815B5C320C854621DD\\ | ||||
| 5A515856D13314AF69BC5B924C8B4DDF\\ | ||||
| F75C45415C1D9DD9DD33612CD530EFE1 | ||||
| <section title="GOST R 34.10-2012 Test Parameters (512 Bit Private Key Len | Y = 0x37C7C90CD40B0F5621DC3AC1B751CFA0\\ | |||
| gth)"> | E2634FA0503B3D52639F5D7FB72AFD61\\ | |||
| <t>This example uses curve defined in <xref target="curve512test" />.</t | EA199441D943FFE7F0C70A2759A3CDB8\\ | |||
| > | 4C114E1F9339FDF27F35ECA93677BEEC | |||
| <t><figure><preamble>Private key is</preamble> | ]]></artwork> | |||
| <artwork>d = 0x0BA6048AADAE241BA40936D47756D7C93091A0E8514669700EE75 | <section numbered="true" toc="default"> | |||
| 08E508B1020\\ | <name>Certificate Request</name> | |||
| 72E8123B2200A0563322DAD2827E2714A2636B7BFD18AADFC62967821FA18DD4</artwork> | <sourcecode name="" type="asn.1"><![CDATA[ | |||
| </figure></t> | ||||
| <t><figure><preamble>Public key is</preamble> | ||||
| <artwork>X = 0x115DC5BC96760C7B48598D8AB9E740D4C4A85A65BE33C1815B5C3 | ||||
| 20C854621DD\\ | ||||
| 5A515856D13314AF69BC5B924C8B4DDFF75C45415C1D9DD9DD33612CD530EFE1 | ||||
| Y = 0x37C7C90CD40B0F5621DC3AC1B751CFA0E2634FA0503B3D52639F5D7FB72AFD61\\ | ||||
| EA199441D943FFE7F0C70A2759A3CDB84C114E1F9339FDF27F35ECA93677BEEC</artwork> | ||||
| </figure></t> | ||||
| <section title="Certificate Request"> | ||||
| <t><figure><artwork><![CDATA[ | ||||
| -----BEGIN CERTIFICATE REQUEST----- | -----BEGIN CERTIFICATE REQUEST----- | |||
| MIIBTzCBvAIBADASMRAwDgYDVQQDEwdFeGFtcGxlMIGgMBcGCCqFAwcBAQECMAsG | MIIBTzCBvAIBADASMRAwDgYDVQQDEwdFeGFtcGxlMIGgMBcGCCqFAwcBAQECMAsG | |||
| CSqFAwcBAgECAAOBhAAEgYDh7zDVLGEz3dmdHVxBRVz3302LTJJbvGmvFDPRVlhR | CSqFAwcBAgECAAOBhAAEgYDh7zDVLGEz3dmdHVxBRVz3302LTJJbvGmvFDPRVlhR | |||
| Wt0hRoUMMlxbgcEzvmVaqMTUQOe5io1ZSHsMdpa8xV0R7L53NqnsNX/y/TmTH04R | Wt0hRoUMMlxbgcEzvmVaqMTUQOe5io1ZSHsMdpa8xV0R7L53NqnsNX/y/TmTH04R | |||
| TLjNo1knCsfw5/9D2UGUGeph/Sq3f12fY1I9O1CgT2PioM9Rt8E63CFWDwvUDMnH | TLjNo1knCsfw5/9D2UGUGeph/Sq3f12fY1I9O1CgT2PioM9Rt8E63CFWDwvUDMnH | |||
| N6AAMAoGCCqFAwcBAQMDA4GBAEM7HWzkClHx5XN+sWqixoOCmkBbnZEn4hJg/J1q | N6AAMAoGCCqFAwcBAQMDA4GBAEM7HWzkClHx5XN+sWqixoOCmkBbnZEn4hJg/J1q | |||
| wF2HvyTibEUnilwhkqdbqUmTq9YHTn/xvwP9L1OXr6HZRVgvhvpgoIEJGiPdeV4e | wF2HvyTibEUnilwhkqdbqUmTq9YHTn/xvwP9L1OXr6HZRVgvhvpgoIEJGiPdeV4e | |||
| PGie5RKjyC7g3MJkPHjuqPys01SSVYSGsg8cnsGXyQaZhQJgyTvLzZxcMxfhk0Th | PGie5RKjyC7g3MJkPHjuqPys01SSVYSGsg8cnsGXyQaZhQJgyTvLzZxcMxfhk0Th | |||
| c642 | c642 | |||
| -----END CERTIFICATE REQUEST----- | -----END CERTIFICATE REQUEST----- | |||
| skipping to change at line 1130 ¶ | skipping to change at line 1185 ¶ | |||
| : } | : } | |||
| 207 129: BIT STRING | 207 129: BIT STRING | |||
| : 43 3B 1D 6C E4 0A 51 F1 E5 73 7E B1 6A A2 C6 83 | : 43 3B 1D 6C E4 0A 51 F1 E5 73 7E B1 6A A2 C6 83 | |||
| : 82 9A 40 5B 9D 91 27 E2 12 60 FC 9D 6A C0 5D 87 | : 82 9A 40 5B 9D 91 27 E2 12 60 FC 9D 6A C0 5D 87 | |||
| : BF 24 E2 6C 45 27 8A 5C 21 92 A7 5B A9 49 93 AB | : BF 24 E2 6C 45 27 8A 5C 21 92 A7 5B A9 49 93 AB | |||
| : D6 07 4E 7F F1 BF 03 FD 2F 53 97 AF A1 D9 45 58 | : D6 07 4E 7F F1 BF 03 FD 2F 53 97 AF A1 D9 45 58 | |||
| : 2F 86 FA 60 A0 81 09 1A 23 DD 79 5E 1E 3C 68 9E | : 2F 86 FA 60 A0 81 09 1A 23 DD 79 5E 1E 3C 68 9E | |||
| : E5 12 A3 C8 2E E0 DC C2 64 3C 78 EE A8 FC AC D3 | : E5 12 A3 C8 2E E0 DC C2 64 3C 78 EE A8 FC AC D3 | |||
| : 54 92 55 84 86 B2 0F 1C 9E C1 97 C9 06 99 85 02 | : 54 92 55 84 86 B2 0F 1C 9E C1 97 C9 06 99 85 02 | |||
| : 60 C9 3B CB CD 9C 5C 33 17 E1 93 44 E1 73 AE 36 | : 60 C9 3B CB CD 9C 5C 33 17 E1 93 44 E1 73 AE 36 | |||
| : }]]></artwork></figure></t> | : } | |||
| ]]></sourcecode> | ||||
| </section> | </section> | |||
| <section title="Certificate"> | <section numbered="true" toc="default"> | |||
| <t><figure><artwork><![CDATA[ | <name>Certificate</name> | |||
| <sourcecode name="" type="asn.1"><![CDATA[ | ||||
| -----BEGIN CERTIFICATE----- | -----BEGIN CERTIFICATE----- | |||
| MIIBqjCCARagAwIBAgIBCzAKBggqhQMHAQEDAzASMRAwDgYDVQQDEwdFeGFtcGxl | MIIBqjCCARagAwIBAgIBCzAKBggqhQMHAQEDAzASMRAwDgYDVQQDEwdFeGFtcGxl | |||
| MCAXDTAxMDEwMTAwMDAwMFoYDzIwNTAxMjMxMDAwMDAwWjASMRAwDgYDVQQDEwdF | MCAXDTAxMDEwMTAwMDAwMFoYDzIwNTAxMjMxMDAwMDAwWjASMRAwDgYDVQQDEwdF | |||
| eGFtcGxlMIGgMBcGCCqFAwcBAQECMAsGCSqFAwcBAgECAAOBhAAEgYDh7zDVLGEz | eGFtcGxlMIGgMBcGCCqFAwcBAQECMAsGCSqFAwcBAgECAAOBhAAEgYDh7zDVLGEz | |||
| 3dmdHVxBRVz3302LTJJbvGmvFDPRVlhRWt0hRoUMMlxbgcEzvmVaqMTUQOe5io1Z | 3dmdHVxBRVz3302LTJJbvGmvFDPRVlhRWt0hRoUMMlxbgcEzvmVaqMTUQOe5io1Z | |||
| SHsMdpa8xV0R7L53NqnsNX/y/TmTH04RTLjNo1knCsfw5/9D2UGUGeph/Sq3f12f | SHsMdpa8xV0R7L53NqnsNX/y/TmTH04RTLjNo1knCsfw5/9D2UGUGeph/Sq3f12f | |||
| Y1I9O1CgT2PioM9Rt8E63CFWDwvUDMnHN6MTMBEwDwYDVR0TAQH/BAUwAwEB/zAK | Y1I9O1CgT2PioM9Rt8E63CFWDwvUDMnHN6MTMBEwDwYDVR0TAQH/BAUwAwEB/zAK | |||
| BggqhQMHAQEDAwOBgQBBVwPYkvGl8/aMQ1MYmn7iB7gLVjHvnUlSmk1rVCws+hWq | BggqhQMHAQEDAwOBgQBBVwPYkvGl8/aMQ1MYmn7iB7gLVjHvnUlSmk1rVCws+hWq | |||
| LqzxH0cP3n2VSFaQPDX9j5Ve8wDZXHdTSnJKDu5wL4b6YKCBCRoj3XleHjxonuUS | LqzxH0cP3n2VSFaQPDX9j5Ve8wDZXHdTSnJKDu5wL4b6YKCBCRoj3XleHjxonuUS | |||
| o8gu4NzCZDx47qj8rNNUklWEhrIPHJ7Bl8kGmYUCYMk7y82cXDMX4ZNE4XOuNg== | o8gu4NzCZDx47qj8rNNUklWEhrIPHJ7Bl8kGmYUCYMk7y82cXDMX4ZNE4XOuNg== | |||
| skipping to change at line 1220 ¶ | skipping to change at line 1277 ¶ | |||
| : } | : } | |||
| 298 129: BIT STRING | 298 129: BIT STRING | |||
| : 41 57 03 D8 92 F1 A5 F3 F6 8C 43 53 18 9A 7E E2 | : 41 57 03 D8 92 F1 A5 F3 F6 8C 43 53 18 9A 7E E2 | |||
| : 07 B8 0B 56 31 EF 9D 49 52 9A 4D 6B 54 2C 2C FA | : 07 B8 0B 56 31 EF 9D 49 52 9A 4D 6B 54 2C 2C FA | |||
| : 15 AA 2E AC F1 1F 47 0F DE 7D 95 48 56 90 3C 35 | : 15 AA 2E AC F1 1F 47 0F DE 7D 95 48 56 90 3C 35 | |||
| : FD 8F 95 5E F3 00 D9 5C 77 53 4A 72 4A 0E EE 70 | : FD 8F 95 5E F3 00 D9 5C 77 53 4A 72 4A 0E EE 70 | |||
| : 2F 86 FA 60 A0 81 09 1A 23 DD 79 5E 1E 3C 68 9E | : 2F 86 FA 60 A0 81 09 1A 23 DD 79 5E 1E 3C 68 9E | |||
| : E5 12 A3 C8 2E E0 DC C2 64 3C 78 EE A8 FC AC D3 | : E5 12 A3 C8 2E E0 DC C2 64 3C 78 EE A8 FC AC D3 | |||
| : 54 92 55 84 86 B2 0F 1C 9E C1 97 C9 06 99 85 02 | : 54 92 55 84 86 B2 0F 1C 9E C1 97 C9 06 99 85 02 | |||
| : 60 C9 3B CB CD 9C 5C 33 17 E1 93 44 E1 73 AE 36 | : 60 C9 3B CB CD 9C 5C 33 17 E1 93 44 E1 73 AE 36 | |||
| : }]]></artwork></figure></t> | : } | |||
| ]]></sourcecode> | ||||
| </section> | </section> | |||
| <section title="Certificate Revocation List"> | <section numbered="true" toc="default"> | |||
| <t><figure><artwork><![CDATA[ | <name>Certificate Revocation List</name> | |||
| <sourcecode name="" type="asn.1"><![CDATA[ | ||||
| -----BEGIN X509 CRL----- | -----BEGIN X509 CRL----- | |||
| MIHTMEECAQEwCgYIKoUDBwEBAwMwEjEQMA4GA1UEAxMHRXhhbXBsZRcNMTQwMTAx | MIHTMEECAQEwCgYIKoUDBwEBAwMwEjEQMA4GA1UEAxMHRXhhbXBsZRcNMTQwMTAx | |||
| MDAwMDAwWhcNMTQwMTAyMDAwMDAwWjAKBggqhQMHAQEDAwOBgQA6E/t67NtVYO72 | MDAwMDAwWhcNMTQwMTAyMDAwMDAwWjAKBggqhQMHAQEDAwOBgQA6E/t67NtVYO72 | |||
| E3z8XdZGkXMuv7NpCh/Ax+ik7uoIMH1kjU3AmGxGqHs/vkx69C6jQ1nHlZVMo5/z | E3z8XdZGkXMuv7NpCh/Ax+ik7uoIMH1kjU3AmGxGqHs/vkx69C6jQ1nHlZVMo5/z | |||
| q77ZBR9NL4b6YKCBCRoj3XleHjxonuUSo8gu4NzCZDx47qj8rNNUklWEhrIPHJ7B | q77ZBR9NL4b6YKCBCRoj3XleHjxonuUSo8gu4NzCZDx47qj8rNNUklWEhrIPHJ7B | |||
| l8kGmYUCYMk7y82cXDMX4ZNE4XOuNg== | l8kGmYUCYMk7y82cXDMX4ZNE4XOuNg== | |||
| -----END X509 CRL----- | -----END X509 CRL----- | |||
| 0 211: SEQUENCE { | 0 211: SEQUENCE { | |||
| 3 65: SEQUENCE { | 3 65: SEQUENCE { | |||
| skipping to change at line 1261 ¶ | skipping to change at line 1320 ¶ | |||
| : } | : } | |||
| 82 129: BIT STRING | 82 129: BIT STRING | |||
| : 3A 13 FB 7A EC DB 55 60 EE F6 13 7C FC 5D D6 46 | : 3A 13 FB 7A EC DB 55 60 EE F6 13 7C FC 5D D6 46 | |||
| : 91 73 2E BF B3 69 0A 1F C0 C7 E8 A4 EE EA 08 30 | : 91 73 2E BF B3 69 0A 1F C0 C7 E8 A4 EE EA 08 30 | |||
| : 7D 64 8D 4D C0 98 6C 46 A8 7B 3F BE 4C 7A F4 2E | : 7D 64 8D 4D C0 98 6C 46 A8 7B 3F BE 4C 7A F4 2E | |||
| : A3 43 59 C7 95 95 4C A3 9F F3 AB BE D9 05 1F 4D | : A3 43 59 C7 95 95 4C A3 9F F3 AB BE D9 05 1F 4D | |||
| : 2F 86 FA 60 A0 81 09 1A 23 DD 79 5E 1E 3C 68 9E | : 2F 86 FA 60 A0 81 09 1A 23 DD 79 5E 1E 3C 68 9E | |||
| : E5 12 A3 C8 2E E0 DC C2 64 3C 78 EE A8 FC AC D3 | : E5 12 A3 C8 2E E0 DC C2 64 3C 78 EE A8 FC AC D3 | |||
| : 54 92 55 84 86 B2 0F 1C 9E C1 97 C9 06 99 85 02 | : 54 92 55 84 86 B2 0F 1C 9E C1 97 C9 06 99 85 02 | |||
| : 60 C9 3B CB CD 9C 5C 33 17 E1 93 44 E1 73 AE 36 | : 60 C9 3B CB CD 9C 5C 33 17 E1 93 44 E1 73 AE 36 | |||
| : }]]></artwork></figure></t> | : } | |||
| ]]></sourcecode> | ||||
| </section> | </section> | |||
| </section> | </section> | |||
| </section> | </section> | |||
| <section anchor="curve512test" numbered="true" toc="default"> | ||||
| <section anchor="curve512test" title="GOST R 34.10-2012 Test Parameters (Cur | <name>GOST R 34.10-2012 Test Parameters (Curve Definition)</name> | |||
| ve Definition)"> | ||||
| <t>The following parameters must be used for digital signature generation | <t>The following parameters must be used for digital signature generation | |||
| and verification.</t> | and verification.</t> | |||
| <section numbered="true" toc="default"> | ||||
| <section title="Elliptic Curve Modulus"> | <name>Elliptic Curve Modulus</name> | |||
| <t>The following value is assigned to parameter p in this example:</t> | <t>The following value is assigned to parameter p in this example:</t> | |||
| <t><figure><artwork>p = 362398610222900363590778875368387430602132092553 | ||||
| 46786050\\ | ||||
| 8654615045085616662400248258848202227149685402509082360305\\ | ||||
| 8735163734263822371964987228582907372403,</artwork></figure></t> | ||||
| <t><figure><artwork>p = 0x4531ACD1FE0023C7550D267B6B2FEE80922B14B2FFB90F | ||||
| 04D4EB7C09B5D2D15D\\ | ||||
| F1D852741AF4704A0458047E80E4546D35B8336FAC224DD81664BBF528BE6373.</artwork | ||||
| ></figure> | ||||
| </t> | ||||
| </section> | ||||
| <section title="Elliptic Curve Coefficients"> | <artwork name="" type="ascii-art" align="left" alt=""><![CDATA[p = 36239 | |||
| 861022290036359077887536838743060213209255346786050\\ | ||||
| 86546150450856166624002482588482022271496854025090823603\\ | ||||
| 058735163734263822371964987228582907372403 | ||||
| ]]></artwork> | ||||
| <artwork name="" type="ascii-art" align="left" alt=""><![CDATA[p = 0x453 | ||||
| 1ACD1FE0023C7550D267B6B2FEE80922B14B2FFB90F04D4EB7C\\ | ||||
| 09B5D2D15DF1D852741AF4704A0458047E80E4546D35B8336FAC22\\ | ||||
| 4DD81664BBF528BE6373 | ||||
| ]]></artwork> | ||||
| </section> | ||||
| <section numbered="true" toc="default"> | ||||
| <name>Elliptic Curve Coefficients</name> | ||||
| <t>Parameters a and b take the following values in this example:</t> | <t>Parameters a and b take the following values in this example:</t> | |||
| <artwork name="" type="ascii-art" align="left" alt=""><![CDATA[a = 7 | ||||
| <t><figure><artwork>a = 7,</artwork></figure></t> | ]]></artwork> | |||
| <t><figure><artwork>a = 0x7,</artwork></figure></t> | <artwork name="" type="ascii-art" align="left" alt=""><![CDATA[a = 0x7 | |||
| <t><figure><artwork>b = 151865506921082853450895003471404315492874752774 | ]]></artwork> | |||
| 0206436\\ | <artwork name="" type="ascii-art" align="left" alt=""><![CDATA[b = 15186 | |||
| 1940188233528099824437937328297569147859746748660416053978836775\\ | 550692108285345089500347140431549287475277402064361\\ | |||
| 96626326413990136959047435811826396,</artwork></figure></t> | 94018823352809982443793732829756914785974674866041605397\\ | |||
| <t><figure><artwork>b = 0x1CFF0806A31116DA29D8CFA54E57EB748BC5F377E49400 | 883677596626326413990136959047435811826396 | |||
| FDD788B649ECA1AC4\\ | ]]></artwork> | |||
| 361834013B2AD7322480A89CA58E0CF74BC9E540C2ADD6897FAD0A3084F302ADC.</artwor | <artwork name="" type="ascii-art" align="left" alt=""><![CDATA[b = 0x1CF | |||
| k></figure></t> | F0806A31116DA29D8CFA54E57EB748BC5F377E49400FDD788B6\\ | |||
| 49ECA1AC4361834013B2AD7322480A89CA58E0CF74BC9E540C2ADD\\ | ||||
| 6897FAD0A3084F302ADC | ||||
| ]]></artwork> | ||||
| </section> | </section> | |||
| <section numbered="true" toc="default"> | ||||
| <section title="Elliptic Curve Points Group Order"> | <name>Elliptic Curve Points Group Order</name> | |||
| <t>Parameter m takes the following value in this example:</t> | <t>Parameter m takes the following value in this example:</t> | |||
| <artwork name="" type="ascii-art" align="left" alt=""><![CDATA[m = 36239 | ||||
| <t><figure><artwork>m = 362398610222900363590778875368387430602132092553 | 861022290036359077887536838743060213209255346786050\\ | |||
| 46786050865461\\ | 86546150450856166623969164898305032863068499961404079437\\ | |||
| 504508561666239691648983050328630684999614040794379365854558651922\\ | 936585455865192212970734808812618120619743 | |||
| 12970734808812618120619743,</artwork></figure></t> | ]]></artwork> | |||
| <artwork name="" type="ascii-art" align="left" alt=""><![CDATA[m = 0x453 | ||||
| <t><figure><artwork>m = 0x4531ACD1FE0023C7550D267B6B2FEE80922B14B2FFB90F | 1ACD1FE0023C7550D267B6B2FEE80922B14B2FFB90F04D4EB7C\\ | |||
| 04D4EB7C09B5D2D15D\\ | 09B5D2D15DA82F2D7ECB1DBAC719905C5EECC423F1D86E25EDBE23\\ | |||
| A82F2D7ECB1DBAC719905C5EECC423F1D86E25EDBE23C595D644AAF187E6E6DF.</artwork | C595D644AAF187E6E6DF | |||
| ></figure></t> | ]]></artwork> | |||
| </section> | </section> | |||
| <section numbered="true" toc="default"> | ||||
| <section title="Order of Cyclic Subgroup of Elliptic Curve Points Group"> | <name>Order of Cyclic Subgroup of Elliptic Curve Points Group</name> | |||
| <t>Parameter q takes the following value in this example:</t> | <t>Parameter q takes the following value in this example:</t> | |||
| <artwork name="" type="ascii-art" align="left" alt=""><![CDATA[q = 36239 | ||||
| <t><figure><artwork>q = 362398610222900363590778875368387430602132092553 | 861022290036359077887536838743060213209255346786050\\ | |||
| 46786050865461\\ | 86546150450856166623969164898305032863068499961404079437\\ | |||
| 504508561666239691648983050328630684999614040794379365854558651922\\ | 936585455865192212970734808812618120619743 | |||
| 12970734808812618120619743,</artwork></figure></t> | ]]></artwork> | |||
| <artwork name="" type="ascii-art" align="left" alt=""><![CDATA[q = 0x453 | ||||
| <t><figure><artwork>q = 0x4531ACD1FE0023C7550D267B6B2FEE80922B14B2FFB90F | 1ACD1FE0023C7550D267B6B2FEE80922B14B2FFB90F04D4EB7C\\ | |||
| 04D4EB7C09B5D2D15D\\ | 09B5D2D15DA82F2D7ECB1DBAC719905C5EECC423F1D86E25EDBE23\\ | |||
| A82F2D7ECB1DBAC719905C5EECC423F1D86E25EDBE23C595D644AAF187E6E6DF.</artwork | C595D644AAF187E6E6DF | |||
| ></figure></t> | ]]></artwork> | |||
| </section> | </section> | |||
| <section numbered="true" toc="default"> | ||||
| <section title="Elliptic Curve Point Coordinates"> | <name>Elliptic Curve Point Coordinates</name> | |||
| <t>Point P coordinates take the following values in this example:</t> | <t>Point P coordinates take the following values in this example:</t> | |||
| <artwork name="" type="ascii-art" align="left" alt=""><![CDATA[x = 19283 | ||||
| <t><figure><artwork>x = 192835694406702284939930940124313759899778663545 | 569440670228493993094012431375989977866354595079743\\ | |||
| 9507974357075491\\ | 57075491307766592685835441065557681003184874819658004903\\ | |||
| 307766592685835441065557681003184874819658004903212332884252335830\\ | 212332884252335830250729527632383493573274 | |||
| 250729527632383493573274,</artwork></figure></t> | ]]></artwork> | |||
| <artwork name="" type="ascii-art" align="left" alt=""><![CDATA[x = 0x24D | ||||
| <t><figure><artwork>x = 0x24D19CC64572EE30F396BF6EBBFD7A6C5213B3B3D7057C | 19CC64572EE30F396BF6EBBFD7A6C5213B3B3D7057CC825F910\\ | |||
| C825F91093A68CD762\\ | 93A68CD762FD60611262CD838DC6B60AA7EEE804E28BC849977FAC\\ | |||
| FD60611262CD838DC6B60AA7EEE804E28BC849977FAC33B4B530F1B120248A9A,</artwork | 33B4B530F1B120248A9A | |||
| ></figure></t> | ]]></artwork> | |||
| <artwork name="" type="ascii-art" align="left" alt=""><![CDATA[y = 22887 | ||||
| <t><figure><artwork>y = 228872869337197285997001215552947841635356232732 | 286933719728599700121555294784163535623273295061803\\ | |||
| 95061803\\ | 14497425931102860301572814141997072271708807066593850650\\ | |||
| 144974259311028603015728141419970722717088070665938506503341523818\\ | 334152381857347798885864807605098724013854 | |||
| 57347798885864807605098724013854,</artwork></figure></t> | ]]></artwork> | |||
| <artwork name="" type="ascii-art" align="left" alt=""><![CDATA[y = 0x2BB | ||||
| <t><figure><artwork>y = 0x2BB312A43BD2CE6E0D020613C857ACDDCFBF061E91E5F2 | 312A43BD2CE6E0D020613C857ACDDCFBF061E91E5F2C3F32447\\ | |||
| C3F32447C259F39B2\\ | C259F39B2C83AB156D77F1496BF7EB3351E1EE4E43DC1A18B91B24\\ | |||
| C83AB156D77F1496BF7EB3351E1EE4E43DC1A18B91B24640B6DBB92CB1ADD371E.</artwor | 640B6DBB92CB1ADD371E | |||
| k></figure></t> | ]]></artwork> | |||
| </section> | </section> | |||
| </section> | </section> | |||
| <section anchor="contributors" numbered="false" toc="default"> | ||||
| <name>Contributors</name> | ||||
| <section anchor="contributors" title="Contributors"> | <contact fullname="Semen Pianov"> | |||
| <t> | <organization>InfoTeCS JSC</organization> | |||
| <list style="symbols"> | <address> | |||
| <t>Semen Pianov <vspace/> | <email>Semen.Pianov@infotecs.ru</email> | |||
| InfoTeCS JSC <vspace /> | </address> | |||
| Semen.Pianov@infotecs.ru | </contact> | |||
| </t> | ||||
| <t>Ekaterina Karelina<vspace/> | <contact fullname="Ekaterina Karelina"> | |||
| InfoTeCS JSC <vspace /> | <organization>InfoTeCS JSC</organization> | |||
| Ekaterina.Karelina@infotecs.ru | <address> | |||
| </t> | <email>Ekaterina.Karelina@infotecs.ru</email> | |||
| <t>Dmitry Belyavsky<vspace /> | </address> | |||
| Cryptocom <vspace /> | </contact> | |||
| beldmit@gmail.com | ||||
| </t> | <contact fullname="Dmitry Belyavsky"> | |||
| </list> | <organization>Cryptocom</organization> | |||
| </t> | <address> | |||
| <email>beldmit@gmail.com</email> | ||||
| </address> | ||||
| </contact> | ||||
| </section> | </section> | |||
| </back> | </back> | |||
| </rfc> | </rfc> | |||
| End of changes. 128 change blocks. | ||||
| 659 lines changed or deleted | 760 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||