Connected: An Internet Encyclopedia
4.6.4.2.2 Asymmetric Key Management

Up: Connected: An Internet Encyclopedia
Up: Requests For Comments
Up: RFC 1421
Up: 4. Processing of Messages
Up: 4.6 Summary of Encapsulated Header Fields
Up: 4.6.4 Per-Recipient Encapsulated Header Fields
Up: 4.6.4.2 Key-Info Field
Prev: 4.6.4.2.1 Symmetric Key Management
Next: 5. Key Management

4.6.4.2.2 Asymmetric Key Management

4.6.4.2.2 Asymmetric Key Management

When asymmetric key management is employed for a given recipient, the "Key-Info:" field transfers two quantities, separated by a comma. The first argument is an IK Use Indicator identifying the algorithm and mode in which the DEK is asymmetrically encrypted. The second argument is a DEK, asymmetrically encrypted under the recipient's public component.

Appropriate asymmetric encryption algorithms and identifiers, and encrypted DEK formats are defined in RFC 1423.


Next: 5. Key Management

Connected: An Internet Encyclopedia
4.6.4.2.2 Asymmetric Key Management