RSA-PSS Certificate

Previous Topic Next Topic
 
classic Classic list List threaded Threaded
3 messages Options
Reply | Threaded
Open this post in threaded view
|

RSA-PSS Certificate

OpenSSL - User mailing list

Starting with the definition of the subjectPublicKeyInfo from RFC 5280, Section 4.1 – Basic Certificate fields we see that the entry contains two items:

 

SubjectPublicKeyInfo ::= SEQUENCE {

algorithm AlgorithmIdentifier,

subjectPublicKey BIT STRING }

 

In RFC 4055 - Additional Algorithms and Identifiers for RSA Cryptography for use in the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, Section 3 it states, “CAs that use the RSASSA-PSS algorithm for signing certificates SHOULD include RSASSA-PSS-params in the subjectPublicKeyInfo algorithm parameters in their own certificates.”

 

This all leads to me wondering if anyone is aware if there is a plan afoot to add the option of including the RSA-PSS params as a third item in the Subject Public Key Info entry in a future version of OpenSSL?

 

Thanks,

Steve

 

 

 

Description: Description: cid:977323607@08042008-1EBD

 

Steven Madwin

Software QA Engineer

Adobe Systems Incorporated

345 Park Avenue, MS-W15

San Jose, CA 95110-2704 USA

Phone:   408.536.4343

Fax:         408.536.6024

[hidden email]

 

 


--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

smime.p7s (7K) Download Attachment
Reply | Threaded
Open this post in threaded view
|

Re: RSA-PSS Certificate

Jakob Bohm-7
On 26/10/2017 03:30, Steven Madwin via openssl-users wrote:

>
> Starting with the definition of the subjectPublicKeyInfo from RFC
> 5280, Section 4.1 – Basic Certificate fields we see that the entry
> contains two items:
>
> SubjectPublicKeyInfo ::= SEQUENCE {
>
> algorithm AlgorithmIdentifier,
>
> subjectPublicKey BIT STRING }
>
> In RFC 4055 - Additional Algorithms and Identifiers for RSA
> Cryptography for use in the Internet X.509 Public Key Infrastructure
> Certificate and Certificate Revocation List (CRL) Profile, Section 3
> it states, “CAs that use the RSASSA-PSS algorithm for signing
> certificates SHOULD include RSASSA-PSS-params in the
> subjectPublicKeyInfo algorithm parameters in their own certificates.”
>
> This all leads to me wondering if anyone is aware if there is a plan
> afoot to add the option of including the RSA-PSS params as a third
> item in the Subject Public Key Info entry in a future version of OpenSSL?
>

In the X.509 standard, "AlgorithmIdentifier" is itself a structure (see
for example RFC5280 section 4.1.1.2).  The RSASSA-PSS-params is the
second element of that structure.  See RFC4055 section 6 for some (bad)
examples of AlgorithmIdentifier values, such as

rSASSA-PSS-SHA512-Identifier  AlgorithmIdentifier  ::=  {
                               algorithm id-RSASSA-PSS,
                               parameters rSSASSA-PSS-SHA512-params }

rSSASSA-PSS-SHA512-params RSASSA-PSS-params ::= {
                               hashAlgorithm sha512Identifier,
                               maskGenAlgorithm mgf1SHA512Identifier,
                               saltLength 20,
                               trailerField 1  }


-- Note: The saltLength should be 64, not 20, for
--    rSSASSA-PSS-SHA512-param, see RFC4055 section 3.1


Enjoy

Jakob
--
Jakob Bohm, CIO, Partner, WiseMo A/S.  https://www.wisemo.com
Transformervej 29, 2860 Søborg, Denmark.  Direct +45 31 13 16 10
This public discussion message is non-binding and may contain errors.
WiseMo - Remote Service Management for PCs, Phones and Embedded

--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Reply | Threaded
Open this post in threaded view
|

Re: RSA-PSS Certificate

OpenSSL - User mailing list
Thanks. Now all I need to do is figure out what parameter to pass the req or
ca command to get the get the subject key info to accept the new algorithm.

-----Original Message-----
From: openssl-users [mailto:[hidden email]] On Behalf Of
Jakob Bohm
Sent: Wednesday, October 25, 2017 6:49 PM
To: [hidden email]
Subject: Re: [openssl-users] RSA-PSS Certificate

On 26/10/2017 03:30, Steven Madwin via openssl-users wrote:

>
> Starting with the definition of the subjectPublicKeyInfo from RFC
> 5280, Section 4.1 – Basic Certificate fields we see that the entry
> contains two items:
>
> SubjectPublicKeyInfo ::= SEQUENCE {
>
> algorithm AlgorithmIdentifier,
>
> subjectPublicKey BIT STRING }
>
> In RFC 4055 - Additional Algorithms and Identifiers for RSA
> Cryptography for use in the Internet X.509 Public Key Infrastructure
> Certificate and Certificate Revocation List (CRL) Profile, Section 3
> it states, “CAs that use the RSASSA-PSS algorithm for signing
> certificates SHOULD include RSASSA-PSS-params in the
> subjectPublicKeyInfo algorithm parameters in their own certificates.”
>
> This all leads to me wondering if anyone is aware if there is a plan
> afoot to add the option of including the RSA-PSS params as a third
> item in the Subject Public Key Info entry in a future version of OpenSSL?
>
In the X.509 standard, "AlgorithmIdentifier" is itself a structure (see for
example RFC5280 section 4.1.1.2).  The RSASSA-PSS-params is the second
element of that structure.  See RFC4055 section 6 for some (bad) examples of
AlgorithmIdentifier values, such as

rSASSA-PSS-SHA512-Identifier  AlgorithmIdentifier  ::=  {
                               algorithm id-RSASSA-PSS,
                               parameters rSSASSA-PSS-SHA512-params }

rSSASSA-PSS-SHA512-params RSASSA-PSS-params ::= {
                               hashAlgorithm sha512Identifier,
                               maskGenAlgorithm mgf1SHA512Identifier,
                               saltLength 20,
                               trailerField 1  }


-- Note: The saltLength should be 64, not 20, for
--    rSSASSA-PSS-SHA512-param, see RFC4055 section 3.1


Enjoy

Jakob
--
Jakob Bohm, CIO, Partner, WiseMo A/S.
https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.wisemo.
com&data=02%7C01%7C%7C1c955d8fda014c805e2e08d51c13ca2d%7Cfa7b1b5a7b34438794a
ed2c178decee1%7C0%7C0%7C636445793698999630&sdata=izbl%2F1JP%2BpWj616mFxiNAaO
frEFAXrD6JIXjFw7L%2FdY%3D&reserved=0
Transformervej 29, 2860 Søborg, Denmark.  Direct +45 31 13 16 10 This public
discussion message is non-binding and may contain errors.
WiseMo - Remote Service Management for PCs, Phones and Embedded

--
openssl-users mailing list
To unsubscribe:
https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmta.openssl
.org%2Fmailman%2Flistinfo%2Fopenssl-users&data=02%7C01%7C%7C1c955d8fda014c80
5e2e08d51c13ca2d%7Cfa7b1b5a7b34438794aed2c178decee1%7C0%7C0%7C63644579369899
9630&sdata=rOOgAhtfdLrxpnua8Ncipz4poNQ6O8X%2FFQFID2API5c%3D&reserved=0

--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

smime.p7s (7K) Download Attachment