Connected: An Internet Encyclopedia
RFC 1423 - 4.2 Asymmetric Encryption Algorithms
Top: Connected: An Internet Encyclopedia
Up: Requests For Comments
Up: RFC 1423
Up: 4. Asymmetric Key Management Algorithms
Prev: 4.1.1 RSA Keys
Next: 4.2.1 RSAEncryption
4.2 Asymmetric Encryption Algorithms
This section identifies the alternative algorithms that shall be used
when asymmetric key management is employed, to encrypt DEKs and MICs.
Character string identifiers are assigned for incorporation in "MIC-
Info:" and "Key-Info:" header fields to indicate the choice of
algorithm employed.
Only one alternative is presently defined in this category.
Next: 4.2.1 RSAEncryption
Connected: An Internet Encyclopedia
RFC 1423 - 4.2 Asymmetric Encryption Algorithms