Connected: An Internet Encyclopedia
4. Asymmetric Key Management Algorithms

Up: Connected: An Internet Encyclopedia
Up: Requests For Comments
Up: RFC 1423
Prev: 3.2 DES in EDE Mode (DES-EDE)
Next: 4.1 Asymmetric Keys

4. Asymmetric Key Management Algorithms

4. Asymmetric Key Management Algorithms

This section identifies the alternative asymmetric keys and the alternative asymmetric key management algorithms with which those keys shall be used, namely the asymmetric encryption algorithms with which DEKs and MICs are encrypted, and the asymmetric signature algorithms with which certificates and certificate revocation lists (CRLs) are signed.


Next: 4.1 Asymmetric Keys

Connected: An Internet Encyclopedia
4. Asymmetric Key Management Algorithms