Connected: An Internet Encyclopedia
4.6.4.2.2 Asymmetric Key Management
Up:
Connected: An Internet Encyclopedia
Up:
Requests For Comments
Up:
RFC 1421
Up:
4. Processing of Messages
Up:
4.6 Summary of Encapsulated Header Fields
Up:
4.6.4 Per-Recipient Encapsulated Header Fields
Up:
4.6.4.2 Key-Info Field
Prev: 4.6.4.2.1 Symmetric Key Management
Next: 5. Key Management
4.6.4.2.2 Asymmetric Key Management
4.6.4.2.2 Asymmetric Key Management
When asymmetric key management is employed for a given recipient, the
"Key-Info:" field transfers two quantities, separated by a comma.
The first argument is an IK Use Indicator identifying the algorithm
and mode in which the DEK is asymmetrically encrypted. The second
argument is a DEK, asymmetrically encrypted under the recipient's
public component.
Appropriate asymmetric encryption algorithms and identifiers, and
encrypted DEK formats are defined in RFC 1423.
Next: 5. Key Management
Connected: An Internet Encyclopedia
4.6.4.2.2 Asymmetric Key Management