Connected: An Internet Encyclopedia
RFC 1421 - 4.6.4.2.2 Asymmetric Key Management
Top: Connected: An Internet Encyclopedia
Up: Requests For Comments
Up: RFC 1421
Up: 4. Processing of Messages
Up: 4.6 Summary of Encapsulated Header Fields
Up: 4.6.4 Per-Recipient Encapsulated Header Fields
Up: 4.6.4.2 Key-Info Field
Prev: 4.6.4.2.1 Symmetric Key Management
Next: 5. Key Management
4.6.4.2.2 Asymmetric Key Management
When asymmetric key management is employed for a given recipient, the
"Key-Info:" field transfers two quantities, separated by a comma.
The first argument is an IK Use Indicator identifying the algorithm
and mode in which the DEK is asymmetrically encrypted. The second
argument is a DEK, asymmetrically encrypted under the recipient's
public component.
Appropriate asymmetric encryption algorithms and identifiers, and
encrypted DEK formats are defined in RFC 1423.
Next: 5. Key Management
Connected: An Internet Encyclopedia
RFC 1421 - 4.6.4.2.2 Asymmetric Key Management