Connected: An Internet Encyclopedia
3.3.3 Signature

Up: Connected: An Internet Encyclopedia
Up: Requests For Comments
Up: RFC 1422
Up: 3. Architecture
Up: 3.3 Certificate Definition
Prev: 3.3.2 Serial Number
Next: 3.3.4 Subject Name

3.3.3 Signature

3.3.3 Signature

This field specifies the algorithm used by the issuer to sign the certificate, and any parameters associated with the algorithm. (The certificate signature is appended to the data structure, as defined by the signature macro in X.509. This algorithm identification information is replicated with the signature.) The signature is validated by the UA processing a certificate, in order to determine that the integrity of its contents have not been modified subsequent to signing by a CA (IPRA, or PCA). In this context, a signature is effected through the use of a Certificate Integrity Check (CIC) algorithm and a public-key encryption algorithm. RFC 1423 contains the definitions and algorithm IDs for signature algorithms employed in this architecture.


Next: 3.3.4 Subject Name

Connected: An Internet Encyclopedia
3.3.3 Signature