Connected: An Internet Encyclopedia
4.3 Asymmetric Signature Algorithms

Up: Connected: An Internet Encyclopedia
Up: Requests For Comments
Up: RFC 1423
Up: 4. Asymmetric Key Management Algorithms
Prev: 4.2.1 RSAEncryption
Next: 4.3.1 md2WithRSAEncryption

4.3 Asymmetric Signature Algorithms

4.3 Asymmetric Signature Algorithms

This section identifies the alternative algorithms which shall be used to asymmetrically sign certificates and certificate revocation lists (CRLs) in accordance with the SIGNED macro defined in Annex G of X.509. ASN.1 object identifiers are identified for incorporation in certificates and CRLs to indicate the choice of algorithm employed.

Only one alternative is presently defined in this category.


Next: 4.3.1 md2WithRSAEncryption

Connected: An Internet Encyclopedia
4.3 Asymmetric Signature Algorithms