Questions tagged [x.509]
X.509 is a standard for a public key infrastructure used for authentication and access control. X.509 specifies standard formats for certificates, revocation lists, attribute certificates, and path validation.
14 questions
2 votes
1 answer
241 views
Kyber prime modulus p and base generator g
I am trying to learn more about Crystals Kyber. I am playing around with a Java implementation. I am only focussing on Kyber-512 for now, I have locally changed the source code in order to remove the ...
0 votes
0 answers
25 views
Bandwidth-Efficient Non-Repudiation
I'm working on a project that involves broadcast (uni-directional) streaming and requires non-repudiation. Essentially, a device broadcasts a data stream over the air, and any receiving station needs ...
1 vote
1 answer
349 views
X.509 CA bundle content
I recently looked into the subject of public key cryptography (especially with X.509 certificates). I am the administrator of a web server using HTTPS which uses 2 levels of certificates (in addition ...
1 vote
1 answer
1k views
SPKI Public Key to Compressed Public Key
I currently have a DER-encoded X.509 ECC SECP256K1 public key, also known as SubjectPublicKeyInfo (SPKI) from AWS KMS. How do I convert it to a 66 hexadecimal compressed public key string?
1 vote
3 answers
393 views
How do certificates add data to public key and how is this implemented into TLS?
I want to create a self signed PKI for a couple servers I am running. I am finding tutorials with copy paste commands from openssl, and hand waving explanations that describe the general purpose of ...
2 votes
1 answer
244 views
Advanced Electronic Signature: PKCS#7 to PFX Conversion
I am a user requiring a legal signature to be installed on a SAP/R3 application. For the past few years a service provider provided a X.509 advanced signature certificate that could be exported as a <...
0 votes
0 answers
106 views
How is the identitiy of a subject in a Public Key Certificate verified by the Certificate Authority (CA)?
A general digital certificate issued by a CA might contain information about the individual/organization to whom the certificate belongs. As an example, consider this sample scenario: This PKC ...
1 vote
1 answer
780 views
How is PKCS a syntax to digitally sign, digest, authenticate, or encrypt arbitrary message content
I am really confused over PKCS. I saw this question but I do not have enough reputation to leave a comment so I am asking a new question to clarify. I am trying to understand what exactly PKCS and in ...
2 votes
0 answers
79 views
What security is provided by a certificate? [closed]
I've been working on the topic of certificates for a little while, and here is what I understand: A certificate is basically a public key + some data about the owner of the certificate + a signature ...
2 votes
1 answer
387 views
Does the multiplicative property apply to modern, non-text book RSA?
I'm aware of the multiplicative property of the textbook RSA and how it can be used to get a signature from a CA without having the CA directly signing it. My question is - can this apply to the real ...
3 votes
2 answers
2k views
Is it possible to use X.509 for a symmetric-key algorithm?
I read on wikipedia what is X.509: In cryptography, X.509 is a standard defining the format of public key certificates. X.509 certificates are used in many Internet protocols, including TLS/SSL, ...
0 votes
1 answer
473 views
PKCS#10 why keeping the Subject Public Key in the X.509 Certificate
In the pkcs#10 workflow to obtain the x.509 certificate used in digital signature, in the Certificate Request Information, itself in the CSR, we have the Subject Public Key. That Subject Public Key ...
3 votes
1 answer
3k views
How to identify RSASSA-PSS from rsaEncryption OID?
Following the RFC 8446 it states that: RSASSA-PSS RSAE algorithms: Indicates a signature algorithm using RSASSA-PSS [RFC8017] with mask generation function 1. The digest used in the mask generation ...
3 votes
1 answer
2k views
Find hash and signature algorithms used in an X.509 certificate signed with RSASSA-PSS
I'm trying to understand the new PSS scheme, but having trouble figuring out how to parse it properly. When receiving a certificate with OID of RSASSA-PSS, how can I know which hash and signing ...