PKCS (Public Key Cryptography Standards)
Yongge Wang, University of North Carolina, Charlotte
Introduction
PKCS 1: RSA Cryptography Standard
RSA Keys
RSA Encryption Schemes
RSA Signature Schemes With Appendix
PKCS 3: Diffie-Hellman Key Agreement Standard (Outdated)
PKCS 5: Password-Based Cryptography Standard
Key Derivation Functions
Encryption Schemes
Message Authentication Schemes
PKCS 6: Extended-Certificate Syntax Standard Historic
PKCS 7 and RFC 3369: Cryptographic Message Syntax (CMS)
PKCS 8: Private Key Information Syntax Standard
PKCS 9: Selected Object Classes and Attribute Types
PKCS 10: Certification Request Syntax Standard
PKCS 11: Cryptographic Token Interface Standard
PKCS 12: Personal Information Exchange Syntax Standard
PKCS 15: Cryptographic Token Information Syntax Standard
An Example
Acknowledgments
Glossary
Cross References
References
Further Reading
INTRODUCTION
Public key cryptography is based on asymmetric cryptographic algorithms that use two related keys, a public key and a private key Given the public key, it is computationally infeasible to derive the private key. Users publish their public keys in a public directory, such as an lightweight directory access protocol (LDAP) directory and keep their private keys to themselves.
According to the purpose of the algorithm, there are public key encryption–decryption algorithms and signature algorithms. An encryption algorithm could be used to encrypt a data (for example, a symmetric key) using the public key ...
Get Handbook of Information Security, Volume 1, Key Concepts, Infrastructure, Standards, and Protocols now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.