PKCS (Public Key Cryptography Standards)

Yongge Wang, University of North Carolina, Charlotte

Introduction

PKCS 1: RSA Cryptography Standard

RSA Keys

RSA Encryption Schemes

RSA Signature Schemes With Appendix

PKCS 3: Diffie-Hellman Key Agreement Standard (Outdated)

PKCS 5: Password-Based Cryptography Standard

Key Derivation Functions

Encryption Schemes

Message Authentication Schemes

PKCS 6: Extended-Certificate Syntax Standard Historic

PKCS 7 and RFC 3369: Cryptographic Message Syntax (CMS)

PKCS 8: Private Key Information Syntax Standard

PKCS 9: Selected Object Classes and Attribute Types

PKCS 10: Certification Request Syntax Standard

PKCS 11: Cryptographic Token Interface Standard

PKCS 12: Personal Information Exchange Syntax Standard

PKCS 15: Cryptographic Token Information Syntax Standard

An Example

Acknowledgments

Glossary

Cross References

References

Further Reading

INTRODUCTION

Public key cryptography is based on asymmetric cryptographic algorithms that use two related keys, a public key and a private key Given the public key, it is computationally infeasible to derive the private key. Users publish their public keys in a public directory, such as an lightweight directory access protocol (LDAP) directory and keep their private keys to themselves.

According to the purpose of the algorithm, there are public key encryption–decryption algorithms and signature algorithms. An encryption algorithm could be used to encrypt a data (for example, a symmetric key) using the public key ...

Get Handbook of Information Security, Volume 1, Key Concepts, Infrastructure, Standards, and Protocols now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.