Network Working Group R. Housley Request for Comments: 2528 SPYRUS Category: Informational W. Polk NIST March 1999 Internet X.509 Public Key Infrastructure Representation of Key Exchange Algorithm (KEA) Keys in Internet X.509 Public Key Infrastructure Certificates Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (1999). All Rights Reserved. Table of Contents Abstract ........................................................ 2 1. Executive Summary ........................................... 2 2. Requirements and Assumptions ................................ 2 2.1. Communication and Topology ................................ 2 2.2. Acceptability Criteria .................................... 2 2.3. User Expectations ......................................... 3 2.4. Administrator Expectations ................................ 3 3. KEA Algorithm Support ....................................... 3 3.1. Subject Public Key Info ................................... 3 3.1.1. Algorithm Identifier and Parameters ..................... 4 3.1.2. Encoding of KEA Public Keys ............................. 5 3.2. Key Usage Extension in KEA certificates ................... 5 4. ASN.1 Modules ................................................ 5 4.1 1988 Syntax ................................................. 5 4.2 1993 Syntax ................................................. 6 5. References ................................................... 6 6. Security Considerations ...................................... 7 7. Authors' Addresses ........................................... 8 8. Full Copyright Statement ..................................... 9 Housley & Polk Informational