ANSI X9-68:2001 pdf free download – Digital Certificates for Mobile/Wireless and High Transaction Volume Financial Systems
The use of a certificate data structure requires that the certificate can be generated, stored, retrieved, transmitted, parsed, and validated. The ease and efficiency of performing these operations frequently imply conflicting requirements that must be reflected in the certificate data structure design. These conflicting requirements are reconciled by appropriate tradeoffs. Efficient storage and transmission are related to minimal size. Retrieval requires an effective identification mechanism. Mechanical parsing, translation and interoperability necessitate effective, formal encoding rules. The goal of efficient storage and transmission often conflicts with that of precise identification and effective parsing. This standard defines a certificate format aimed at minimal storage and transmission bandwidth while preserving unique identification and ease of use. A single, simple owner name replaces the larger and more complex subject, issuer and serial number components used in X.509 certificates. The functionality of common X.509 certificate extensions is preserved, but presented in a new format that is more compact and more easily parsed. The compact certificate format defined in this Standard is appropriate for use in financial service applications that may interact with mobile devices or rely on networks with limited bandwidth. Compact certificates can also be used to improve the throughput of high volume transaction applications, such as those that involve Internet commerce. The reduced size of compact certificates makes them ideal for use in cryptographic modules, such as smart cards, that may have a very limited storage capacity. In all of these environments, smaller certificates reduce transaction bandwidth and consume less memory.
7. Public Key Domain Certificates
This section defines syntax for a public-key domain certificate. This syntax provides the security characteristics available in standard X.509 certificates, but in a more efficient compact format. Domain certificates are suitable for use in account-based systems that may not require general-purpose third party authentication, and whose members share attributes common to their domain. The domain certificates are also designed for use in domains that require interaction with existing X.509 public key infrastructures.
The signature choice alternative provides compressed algorithm identification. The compressed values of SignatureAlgorithm specified in this standard shall be composed of two sub-identifiers. The first sub-identifier shall indicate the type of signature and supporting hash algorithm: dsaWithSHA-1 , ecdsaWithSHA-1 or rsaWithSHA-1 . The second sub-identifier shall indicate some particular characteristic of the signature, such as any parameters required by the algorithm, a size restriction, or an indication that predefined domain default characteristics should be assumed. With respect to the first sub-identifier, a value of dsaWithSHA-1 shall be used to indicate that a signature is computed using the Digital Signature Algorithm (DSA), as defined in ANSI X9.30-1997, Part 1 [12]. The value ecdsaWithSHA-1 shall indicate that a signature is computed using the Elliptic Curve Digital Signature Algorithm, as defined in ANSI X9.62-2000 [15]. And the value rsaWithSHA-1 shall indicate that a signature is computed in accordance with ANSI X9.31-1998 [14]. For all three of these values, the signatures shall be computed in conjunction with the Secure Hash Algorithm (SHA-1) as defined in ANSI X9.30-1997, Part 2 [13].