This section identifies the alternative asymmetric keys and the
alternative asymmetric key management algorithms with which those
keys shall be used, namely the asymmetric encryption algorithms with
which DEKs and MICs are encrypted, and the asymmetric signature
algorithms with which certificates and certificate revocation lists
(CRLs) are signed.