diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc4357.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc4357.txt')
-rw-r--r-- | doc/rfc/rfc4357.txt | 2859 |
1 files changed, 2859 insertions, 0 deletions
diff --git a/doc/rfc/rfc4357.txt b/doc/rfc/rfc4357.txt new file mode 100644 index 0000000..9730cfe --- /dev/null +++ b/doc/rfc/rfc4357.txt @@ -0,0 +1,2859 @@ + + + + + + +Network Working Group V. Popov +Request for Comments: 4357 I. Kurepkin +Category: Informational S. Leontiev + CRYPTO-PRO + January 2006 + + + Additional Cryptographic Algorithms for Use with GOST 28147-89, + GOST R 34.10-94, GOST R 34.10-2001, and GOST R 34.11-94 Algorithms + +Status of This Memo + + This memo provides information for the Internet community. It does + not specify an Internet standard of any kind. Distribution of this + memo is unlimited. + +Copyright Notice + + Copyright (C) The Internet Society (2006). + +Abstract + + This document describes the cryptographic algorithms and parameters + supplementary to the original GOST specifications, GOST 28147-89, + GOST R 34.10-94, GOST R 34.10-2001, and GOST R 34.11-94, for use in + Internet applications. + +Table of Contents + + 1. Introduction ....................................................2 + 1.1. Terminology ................................................2 + 2. Cipher Modes and Parameters .....................................3 + 2.1. GOST 28147-89 CBC Mode .....................................4 + 2.2. GOST 28147-89 Padding Modes ................................4 + 2.3. Key Meshing Algorithms .....................................4 + 2.3.1. Null Key Meshing ....................................5 + 2.3.2. CryptoPro Key Meshing ...............................5 + 3. HMAC_GOSTR3411 ..................................................6 + 4. PRF_GOSTR3411 ...................................................6 + 5. Key Derivation Algorithms .......................................6 + 5.1. VKO GOST R 34.10-94 ........................................6 + 5.2. VKO GOST R 34.10-2001 ......................................7 + 6. Key Wrap Algorithms .............................................7 + 6.1. GOST 28147-89 Key Wrap .....................................7 + 6.2. GOST 28147-89 Key Unwrap ...................................8 + 6.3. CryptoPro Key Wrap .........................................8 + 6.4. CryptoPro Key Unwrap .......................................9 + 6.5. CryptoPro KEK Diversification Algorithm ....................9 + + + +Popov, et al. Informational [Page 1] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + 7. Secret Key Diversification .....................................10 + 8. Algorithm Parameters ...........................................10 + 8.1. Encryption Algorithm Parameters ...........................10 + 8.2. Digest Algorithm Parameters ...............................11 + 8.3. GOST R 34.10-94 Public Key Algorithm Parameters ...........12 + 8.4. GOST R 34.10-2001 Public Key Algorithm Parameters .........13 + 9. Security Considerations ........................................14 + 10. Appendix ASN.1 Modules ........................................15 + 10.1. Cryptographic-Gost-Useful-Definitions ....................15 + 10.2. Gost28147-89-EncryptionSyntax ............................17 + 10.3. Gost28147-89-ParamSetSyntax ..............................19 + 10.4. GostR3411-94-DigestSyntax ................................21 + 10.5. GostR3411-94-ParamSetSyntax ..............................22 + 10.6. GostR3410-94-PKISyntax ...................................23 + 10.7. GostR3410-94-ParamSetSyntax ..............................25 + 10.8. GostR3410-2001-PKISyntax .................................27 + 10.9. GostR3410-2001-ParamSetSyntax ............................29 + 11. Appendix Parameters ...........................................30 + 11.1. Encryption Algorithm Parameters ..........................30 + 11.2. Digest Algorithm Parameters ..............................33 + 11.3. GOST R 34.10-94 Public Key Algorithm Parameters ..........34 + 11.4. GOST R 34.10-2001 Public Key Algorithm Parameters ........42 + 12. Acknowledgements ..............................................46 + 13. References ....................................................47 + 13.1. Normative References .....................................47 + 13.2. Informative References ...................................47 + +1. Introduction + + Russian cryptographic standards that define the algorithms GOST + 28147-89 [GOST28147], GOST R 34.10-94 [GOSTR341094], GOST R + 34.10-2001 [GOSTR341001], and GOST R34.11-94 [GOSTR341194] provide + basic information about how the algorithms work, but supplemental + specifications are needed to effectively use the algorithms (a brief + English technical description of these algorithms can be found in + [Schneier95]). + + This document is a proposal put forward by the CRYPTO-PRO Company to + provide supplemental information and specifications needed by the + "Russian Cryptographic Software Compatibility Agreement" community. + +1.1. Terminology + + In this document, the key words MUST, MUST NOT, REQUIRED, SHOULD, + SHOULD NOT, RECOMMENDED, and MAY are to be interpreted as described + in [RFC2119]. + + + + + +Popov, et al. Informational [Page 2] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + The following functions and operators are also used in this document: + + '|' stands for concatenation. + + '~' stands for bitwise NOT operator. + + '^' stands for the power operator. + + encryptECB (K, D) is D, encrypted with key K using GOST 28147-89 in + "prostaya zamena" (ECB) mode. + + decryptECB (K, D) is D, decrypted with key K using GOST 28147-89 in + ECB mode. + + encryptCFB (IV, K, D) is D, encrypted with key K using GOST 28147-89 + in "gammirovanie s obratnoj svyaziyu" (64-bit CFB) mode, and IV is + used as the initialization vector. + + encryptCNT (IV, K, D) is D, encrypted with key K using GOST 28147-89 + in "gammirovanie" (counter) mode, and IV is used as the + initialization vector. + + gostR3411 (D) is the 256-bit result of the GOST R 34.11-94 hash + function, used with zero initialization vector, and S-Box parameter, + defined by id-GostR3411-94-CryptoProParamSet (see Section 11.2). + + gost28147IMIT (IV, K, D) is the 32-bit result of the GOST 28147-89 in + "imitovstavka" (MAC) mode, used with D as plaintext, K as key and IV + as initialization vector. Note that the standard specifies its use + in this mode only with an initialization vector of zero. + + When keys and initialization vectors are converted to/from byte + arrays, little-endian byte order is assumed. + +2. Cipher Modes and Parameters + + This document defines four cipher properties that allow an + implementer to vary cipher operations. The four parameters are the + cipher mode, the key meshing algorithm, the padding mode, and the + S-box. + + [GOST28147] defines only three cipher modes for GOST 28147-89: ECB, + CFB, and counter mode. This document defines an additional cipher + mode, CBC. + + + + + + + +Popov, et al. Informational [Page 3] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + When GOST 28147-89 is used to process large amounts of data, a + symmetric key should be protected by a key meshing algorithm. Key + meshing transforms a symmetric key after some amount of data has been + processed. This document defines the CryptoPro key meshing + algorithm. + + The cipher mode, key meshing algorithm, padding mode, and S-box are + specified by algorithm parameters. + +2.1. GOST 28147-89 CBC Mode + + This section provides the supplemental information for GOST 28147-89 + (a block-to-block primitive) needed to operate in CBC mode. + + Before each plaintext block is encrypted, it is combined with the + cipher text of the previous block via a bitwise XOR operation. This + ensures that even if the plaintext contains many identical blocks, + each block will encrypt to a different cipher text block. The + initialization vector is combined with the first plaintext block by a + bitwise XOR operation before the block is encrypted. + +2.2. GOST 28147-89 Padding Modes + + This section provides the supplemental information for GOST 28147-89, + needed to operate on plaintext where the length is not divisible by + GOST 28147-89 block size (8 bytes). + + Let x (0 < x <= 8) be the number of bytes in the last, possibly + incomplete, block of data. + + There are three padding modes: + * Zero padding: 8-x remaining bytes are filled with zero + * PKCS#5 padding: 8-x remaining bytes are filled with the value of + 8-x. If there's no incomplete block, one extra block filled with + value 8 is added. + * Random padding: 8-x remaining bytes of the last block are set to + random. + +2.3. Key Meshing Algorithms + + Key meshing algorithms transform the key after processing a certain + amount of data. In applications that must be strictly robust to + attacks based on timing and EMI analysis, one symmetric key should + not be used for quantities of plaintext larger than 1024 octets. + + + + + + + +Popov, et al. Informational [Page 4] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + A key meshing algorithm affects internal cipher state; it is not a + protocol level feature. Its role is similar to that of a cipher + mode. The choice of key meshing algorithm is usually dictated by the + encryption algorithm parameters, but some protocols explicitly + specify applicable key meshing algorithms. + + All encryption parameter sets defined in this document specify the + use of the CryptoPro key meshing algorithm, except for id-Gost28147- + 89-TestParamSet, which specifies use of null key meshing algorithm. + +2.3.1. Null Key Meshing + + The null key meshing algorithm never changes a key. + + The identifier for this algorithm is: + + id-Gost28147-89-None-KeyMeshing OBJECT IDENTIFIER ::= + { iso(1) member-body(2) ru(643) rans(2) cryptopro(2) + keyMeshing(14) none(0) } + + There are no meaningful parameters to this algorithm. If present, + AlgorithmIdentifier.parameters MUST contain NULL. + +2.3.2. CryptoPro Key Meshing + + The CryptoPro key meshing algorithm transforms the key and + initialization vector every 1024 octets (8192 bits, or 256 64-bit + blocks) of plaintext data. + + This algorithm has the same drawback as OFB cipher mode: it is + impossible to re-establish crypto synch while decrypting a ciphertext + if parts of encrypted data are corrupted, lost, or processed out of + order. Furthermore, it is impossible to re-synch even if an IV for + each data packet is provided explicitly. Use of this algorithm in + protocols such as IPsec ESP requires special care. + + The identifier for this algorithm is: + + id-Gost28147-89-CryptoPro-KeyMeshing OBJECT IDENTIFIER ::= + { iso(1) member-body(2) ru(643) rans(2) cryptopro(2) + keyMeshing(14) cryptoPro(1) } + + There are no meaningful parameters to this algorithm. If present, + AlgorithmIdentifier.parameters MUST contain NULL. + + GOST 28147-89, in encrypt, decrypt, or MAC mode, starts with key K[0] + = K, IV0[0] = IV, i = 0. Let IVn[0] be the value of the + initialization vector after processing the first 1024 octets of data. + + + +Popov, et al. Informational [Page 5] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + Processing of the next 1024 octets will start with K[1] and IV0[1], + which are calculated using the following formula: + + K[i+1] = decryptECB (K[i], C); + IV0[i+1] = encryptECB (K[i+1],IVn[i]) + + Where C = {0x69, 0x00, 0x72, 0x22, 0x64, 0xC9, 0x04, 0x23, + 0x8D, 0x3A, 0xDB, 0x96, 0x46, 0xE9, 0x2A, 0xC4, + 0x18, 0xFE, 0xAC, 0x94, 0x00, 0xED, 0x07, 0x12, + 0xC0, 0x86, 0xDC, 0xC2, 0xEF, 0x4C, 0xA9, 0x2B}; + + After processing each 1024 octets of data: + * the resulting initialization vector is stored as IVn[i]; + * K[i+1] and IV0[i+1] are calculated; + * i is incremented; + * Encryption or decryption of next 1024 bytes starts, using + the new key and IV; + The process is repeated until all the data has been processed. + +3. HMAC_GOSTR3411 + + HMAC_GOSTR3411 (K,text) function is based on the hash function GOST R + 34.11-94, as defined in [HMAC], with the following parameter values: + B = 32, L = 32. + +4. PRF_GOSTR3411 + + PRF_GOSTR3411 is a pseudorandom function, based on HMAC_GOSTR3411. + It is calculated as P_hash, defined in Section 5 of [TLS]. + PRF_GOSTR3411(secret,label,seed) = P_GOSTR3411 (secret,label|seed). + +5. Key Derivation Algorithms + + Standards [GOSTR341094] and [GOSTR341001] do not define any key + derivation algorithms. + + Section 5.1 specifies algorithm VKO GOST R 34.10-94, which generates + GOST KEK using two GOST R 34.10-94 keypairs. + + Section 5.2 specifies algorithm VKO GOST R 34.10-2001, which + generates GOST KEK using two GOST R 34.10-2001 keypairs and UKM. + + Keypairs MUST have identical parameters. + +5.1. VKO GOST R 34.10-94 + + This algorithm creates a key encryption key (KEK) using the sender's + private key and the recipient's public key (or vice versa). + + + +Popov, et al. Informational [Page 6] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + Exchange key KEK is a 256-bit hash of the 1024-bit shared secret that + is generated using Diffie-Hellman key agreement. + + 1) Let K(x,y) = a^(x*y) (mod p), where + x - sender's private key, a^x - sender's public key + y - recipient's private key, a^y - recipient's public key + a, p - parameters + 2) Calculate a 256-bit hash of K(x,y): + KEK(x,y) = gostR3411 (K(x,y)) + + Keypairs (x,a^x) and (y,a^y) MUST comply with [GOSTR341094]. + + This algorithm MUST NOT be used when a^x = a (mod p) or a^y = a (mod + p). + +5.2. VKO GOST R 34.10-2001 + + This algorithm creates a key encryption key (KEK) using 64 bit UKM, + the sender's private key, and the recipient's public key (or the + reverse of the latter pair). + + 1) Let K(x,y,UKM) = ((UKM*x)(mod q)) . (y.P) (512 bit), where + x - sender's private key (256 bit) + x.P - sender's public key (512 bit) + y - recipient's private key (256 bit) + y.P - recipient's public key (512 bit) + UKM - non-zero integer, produced as in step 2 p. 6.1 [GOSTR341001] + P - base point on the elliptic curve (two 256-bit coordinates) + UKM*x - x multiplied by UKM as integers + x.P - a multiple point + 2) Calculate a 256-bit hash of K(x,y,UKM): + KEK(x,y,UKM) = gostR3411 (K(x,y,UKM)) + + Keypairs (x,x.P) and (y,y.P) MUST comply with [GOSTR341001]. + + This algorithm MUST NOT be used when x.P = P, y.P = P + +6. Key Wrap Algorithms + + This document defines two key wrap algorithms: GOST 28147-89 Key Wrap + and CryptoPro Key Wrap. These are used to encrypt a Content + Encryption Key (CEK) with a Key Encryption Key (KEK). + +6.1. GOST 28147-89 Key Wrap + + This algorithm encrypts GOST 28147-89 CEK with a GOST 28147-89 KEK. + + + + + +Popov, et al. Informational [Page 7] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + Note: This algorithm MUST NOT be used with a KEK produced by VKO GOST + R 34.10-94, because such a KEK is constant for every sender-recipient + pair. Encrypting many different content encryption keys on the same + constant KEK may reveal that KEK. + + The GOST 28147-89 key wrap algorithm is: + + 1) For a unique symmetric KEK, generate 8 octets at random and call + the result UKM. For a KEK, produced by VKO GOST R 34.10-2001, + use the UKM that was used for key derivation. + 2) Compute a 4-byte checksum value, gost28147IMIT (UKM, KEK, CEK). + Call the result CEK_MAC. + 3) Encrypt the CEK in ECB mode using the KEK. Call the ciphertext + CEK_ENC. + 4) The wrapped content-encryption key is (UKM | CEK_ENC | CEK_MAC). + +6.2. GOST 28147-89 Key Unwrap + + This algorithm decrypts GOST 28147-89 CEK with a GOST 28147-89 KEK. + The GOST 28147-89 key unwrap algorithm is: + + 1) If the wrapped content-encryption key is not 44 octets, then + error. + 2) Decompose the wrapped content-encryption key into UKM, CEK_ENC, + and CEK_MAC. UKM is the most significant (first) 8 octets. + CEK_ENC is next 32 octets, and CEK_MAC is the least significant + (last) 4 octets. + 3) Decrypt CEK_ENC in ECB mode using the KEK. Call the output CEK. + 4) Compute a 4-byte checksum value, gost28147IMIT (UKM, KEK, CEK), + compare the result with CEK_MAC. If they are not equal, then + error. + +6.3. CryptoPro Key Wrap + + This algorithm encrypts GOST 28147-89 CEK with a GOST 28147-89 KEK. + It can be used with any KEK (e.g., produced by VKO GOST R 34.10-94 or + VKO GOST R 34.10-2001) because a unique UKM is used to diversify the + KEK. + + The CryptoPro key wrap algorithm is: + + 1) For a unique symmetric KEK or a KEK produced by VKO GOST R + 34.10-94, generate 8 octets at random. Call the result UKM. For + a KEK, produced by VKO GOST R 34.10-2001, use the UKM that was + used for key derivation. + 2) Diversify KEK, using the CryptoPro KEK Diversification Algorithm, + described in Section 6.5. Call the result KEK(UKM). + + + + +Popov, et al. Informational [Page 8] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + 3) Compute a 4-byte checksum value, gost28147IMIT (UKM, KEK(UKM), + CEK). Call the result CEK_MAC. + 4) Encrypt CEK in ECB mode using KEK(UKM). Call the ciphertext + CEK_ENC. + 5) The wrapped content-encryption key is (UKM | CEK_ENC | CEK_MAC). + +6.4. CryptoPro Key Unwrap + + This algorithm encrypts GOST 28147-89 CEK with a GOST 28147-89 KEK. + The CryptoPro key unwrap algorithm is: + + 1) If the wrapped content-encryption key is not 44 octets, then it + is an error. + 2) Decompose the wrapped content-encryption key into UKM, CEK_ENC, + and CEK_MAC. UKM is the most significant (first) 8 octets. + CEK_ENC is next 32 octets, and CEK_MAC is the least significant + (last) 4 octets. + 3) Diversify KEK using the CryptoPro KEK Diversification Algorithm, + described in section 6.5. Call the result KEK(UKM). + 4) Decrypt CEK_ENC in ECB mode using KEK(UKM). Call the output CEK. + 5) Compute a 4-byte checksum value, gost28147IMIT (UKM, KEK(UKM), + CEK), compare the result with CEK_MAC. If they are not equal, + then it is an error. + +6.5. CryptoPro KEK Diversification Algorithm + + Given a random 64-bit UKM and a GOST 28147-89 key K, this algorithm + creates a new GOST 28147-89 key K(UKM). + + 1) Let K[0] = K; + 2) UKM is split into components a[i,j]: + UKM = a[0]|..|a[7] (a[i] - byte, a[i,0]..a[i,7] - it's bits) + 3) Let i be 0. + 4) K[1]..K[8] are calculated by repeating the following algorithm + eight times: + A) K[i] is split into components k[i,j]: + K[i] = k[i,0]|k[i,1]|..|k[i,7] (k[i,j] - 32-bit integer) + B) Vector S[i] is calculated: + S[i] = ((a[i,0]*k[i,0] + ... + a[i,7]*k[i,7]) mod 2^32) | + (((~a[i,0])*k[i,0] + ... + (~a[i,7])*k[i,7]) mod 2^32); + C) K[i+1] = encryptCFB (S[i], K[i], K[i]) + D) i = i + 1 + 5) Let K(UKM) be K[8]. + + + + + + + + +Popov, et al. Informational [Page 9] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + +7. Secret Key Diversification + + This algorithm creates a GOST 28147-89 key Kd, given GOST R 34.10-94 + or GOST R 34.10-2001 secret key K and diversification data D of size + 4..40 bytes. + + 1) 40-byte blob B is created from D by cloning it enough times to + fill all 40 bytes. For example, if D is 40-bytes long, B = D; If + D is 6-bytes long, B = D|D|D|D|D|D|D[0..3]. + 2) B is split into 8-byte UKM and 32-byte SRCKEY (B = UKM|SRCKEY). + 3) The algorithm from Section 6.5 is used to create K(UKM) from key + K and UKM, with two differences: + * Instead of S[i], vector (0,0,0,UKM[i],ff,ff,ff,ff XOR UKM[i]) + is used. + * During each encryption step, only 8 out of 32 GOST 28147-89 + rounds are done. + 4) Kd is calculated: + Kd = encryptCFB (UKM, K(UKM), SRCKEY). + +8. Algorithm Parameters + + Standards [GOST28147], [GOST341194], [GOSTR341094], and [GOSTR341001] + do not define specific values for algorithm parameters. + + This document introduces the use of ASN.1 object identifiers (OIDs) + to specify algorithm parameters. + + Identifiers for all of the proposed parameter sets can be found in + Appendix ASN.1 modules. Corresponding parameter values for proposed + parameter sets can be found in Section 11. + +8.1. Encryption Algorithm Parameters + + GOST 28147-89 can be used in several modes; additional CBC mode is + defined in Section 2.1. It also has an S-Box parameter. (See the + Algorithm Parameters part in [GOST28147] in Russian; for a + description in English, see [Schneier95], ch. 14.1, p. 331.) + + This table contains the list of proposed parameter sets for GOST + 28147-89: + + Gost28147-89-ParamSetAlgorithms ALGORITHM-IDENTIFIER ::= { + { Gost28147-89-ParamSetParameters IDENTIFIED BY + id-Gost28147-89-TestParamSet } | + { Gost28147-89-ParamSetParameters IDENTIFIED BY + id-Gost28147-89-CryptoPro-A-ParamSet } | + { Gost28147-89-ParamSetParameters IDENTIFIED BY + id-Gost28147-89-CryptoPro-B-ParamSet } | + + + +Popov, et al. Informational [Page 10] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + { Gost28147-89-ParamSetParameters IDENTIFIED BY + id-Gost28147-89-CryptoPro-C-ParamSet } | + { Gost28147-89-ParamSetParameters IDENTIFIED BY + id-Gost28147-89-CryptoPro-D-ParamSet } + } + + Identifier values are in the Appendix ASN.1 modules, and + corresponding parameters are in Section 11.1. + + Parameters for GOST 28147-89 are presented in the following form: + + Gost28147-89-ParamSetParameters ::= SEQUENCE { + eUZ Gost28147-89-UZ, + mode INTEGER { + gost28147-89-CNT(0), + gost28147-89-CFB(1), + cryptoPro-CBC(2) + }, + shiftBits INTEGER { gost28147-89-block(64) }, + keyMeshing AlgorithmIdentifier + } + Gost28147-89-UZ ::= OCTET STRING (SIZE (64)) + Gost28147-89-KeyMeshingAlgorithms ALGORITHM-IDENTIFIER ::= { + { NULL IDENTIFIED BY id-Gost28147-89-CryptoPro-KeyMeshing } | + { NULL IDENTIFIED BY id-Gost28147-89-None-KeyMeshing } + } + + where + eUZ - S-box value; + mode - cipher mode; + shiftBits - cipher parameter; + keyMeshing - key meshing algorithm identifier. + +8.2. Digest Algorithm Parameters + + This table contains the list of proposed parameter sets for + [GOST341194]: + + GostR3411-94-ParamSetAlgorithms ALGORITHM-IDENTIFIER ::= { + { GostR3411-94-ParamSetParameters IDENTIFIED BY + id-GostR3411-94-TestParamSet + } | + { GostR3411-94-ParamSetParameters IDENTIFIED BY + id-GostR3411-94-CryptoProParamSet + } + } + + + + + +Popov, et al. Informational [Page 11] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + Identifier values are in the Appendix ASN.1 modules, and + corresponding parameters are in Section 11.2. + + Parameters for [GOST341194] are presented in the following form: + + GostR3411-94-ParamSetParameters ::= + SEQUENCE { + hUZ Gost28147-89-UZ, -- S-Box for digest + h0 GostR3411-94-Digest -- start digest value + } + GostR3411-94-Digest ::= OCTET STRING (SIZE (32)) + +8.3. GOST R 34.10-94 Public Key Algorithm Parameters + + This table contains the list of proposed parameter sets for GOST R + 34.10-94: + + GostR3410-94-ParamSetAlgorithm ALGORITHM-IDENTIFIER ::= { + { GostR3410-94-ParamSetParameters IDENTIFIED BY + id-GostR3410-94-TestParamSet } | + { GostR3410-94-ParamSetParameters IDENTIFIED BY + id-GostR3410-94-CryptoPro-A-ParamSet } | + { GostR3410-94-ParamSetParameters IDENTIFIED BY + id-GostR3410-94-CryptoPro-B-ParamSet } | + { GostR3410-94-ParamSetParameters IDENTIFIED BY + id-GostR3410-94-CryptoPro-C-ParamSet } | + { GostR3410-94-ParamSetParameters IDENTIFIED BY + id-GostR3410-94-CryptoPro-D-ParamSet } | + { GostR3410-94-ParamSetParameters IDENTIFIED BY + id-GostR3410-94-CryptoPro-XchA-ParamSet } | + { GostR3410-94-ParamSetParameters IDENTIFIED BY + id-GostR3410-94-CryptoPro-XchB-ParamSet } | + { GostR3410-94-ParamSetParameters IDENTIFIED BY + id-GostR3410-94-CryptoPro-XchC-ParamSet } + } + + Identifier values are in the Appendix ASN.1 modules, and + corresponding parameters are in Section 11.3. + + Parameters for GOST R 34.10-94 are presented in the following form: + + GostR3410-94-ParamSetParameters ::= + SEQUENCE { + t INTEGER, + p INTEGER, + q INTEGER, + a INTEGER, + validationAlgorithm AlgorithmIdentifier {{ + + + +Popov, et al. Informational [Page 12] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + GostR3410-94-ValidationAlgorithms + }} OPTIONAL + } + + GostR3410-94-ValidationParameters ::= + SEQUENCE { + x0 INTEGER, + c INTEGER, + d INTEGER OPTIONAL + } + + Where + t - bit length of p (512 or 1024 bits); + p - modulus, prime number, 2^(t-1)<p<2^t; + q - order of cyclic group, prime number, 2^254<q<2^256, q is a + factor of p-1; + a - generator, integer, 1<a<p-1, at that aq (mod p) = 1; + validationAlgorithm - constant p, q and a calculating algorithm. + + x0 - seed; + c - used for p and q generation; + d - used for a generation. + +8.4. GOST R 34.10-2001 Public Key Algorithm Parameters + + This table contains the list of proposed parameter sets for GOST R + 34.10-2001: + + GostR3410-2001-ParamSetAlgorithm ALGORITHM-IDENTIFIER ::= { + { GostR3410-2001-ParamSetParameters IDENTIFIED BY + id-GostR3410-2001-TestParamSet } | + { GostR3410-2001-ParamSetParameters IDENTIFIED BY + id-GostR3410-2001-CryptoPro-A-ParamSet } | + { GostR3410-2001-ParamSetParameters IDENTIFIED BY + id-GostR3410-2001-CryptoPro-B-ParamSet } | + { GostR3410-2001-ParamSetParameters IDENTIFIED BY + id-GostR3410-2001-CryptoPro-C-ParamSet } | + { GostR3410-2001-ParamSetParameters IDENTIFIED BY + id-GostR3410-2001-CryptoPro-XchA-ParamSet } | + { GostR3410-2001-ParamSetParameters IDENTIFIED BY + id-GostR3410-2001-CryptoPro-XchB-ParamSet } + } + + Identifier values are in the Appendix ASN.1 modules, and + corresponding parameters are in Section 11.4. + + Parameters for GOST R 34.10-2001 are presented in the following form: + + + + +Popov, et al. Informational [Page 13] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + GostR3410-2001-ParamSetParameters ::= + SEQUENCE { + a INTEGER, + b INTEGER, + p INTEGER, + q INTEGER, + x INTEGER, + y INTEGER + } + + a, b - coefficients a and b of the elliptic curve E; + p - prime number - elliptic curve modulus; + q - prime number - order of cyclic group; + x, y - base point p coordinates. + +9. Security Considerations + + It is RECOMMENDED that software applications verify signature values + and subject public keys and algorithm parameters to conform to + [GOSTR341001] and [GOSTR341094] standards prior to their use. + + Cryptographic algorithm parameters affect rigidity of algorithms. + The algorithm parameters proposed and described herein, except for + the test parameter sets (id-Gost28147-89-TestParamSet, id-GostR3411- + 94-TestParamSet, id-GostR3410-94-TestParamSet, id-GostR3410-2001- + TestParamSet), have been analyzed by a special certification + laboratory of Scientific and Technical Center, "ATLAS", and by the + Center of Certificational Investigations in appropriate levels of + target_of_evaluation (TOE), according to [RFDSL], [RFLLIC], and + [CRYPTOLIC]. + + Use of the test parameter sets or parameter sets not described herein + is NOT RECOMMENDED. When different parameters are used, it is + RECOMMENDED that they be subjected to examination by an authorized + agency with approved methods of cryptographic analysis. + + + + + + + + + + + + + + + + +Popov, et al. Informational [Page 14] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + +10. Appendix ASN.1 Modules + +10.1. Cryptographic-Gost-Useful-Definitions + + Cryptographic-Gost-Useful-Definitions + { iso(1) member-body(2) ru(643) rans(2) + cryptopro(2) other(1) modules(1) + cryptographic-Gost-Useful-Definitions(0) 1 } + + DEFINITIONS ::= + BEGIN + -- EXPORTS All -- + -- The types and values defined in this module are exported for + -- use in the other ASN.1 modules contained within the Russian + -- Cryptography "GOST" & "GOST R" Specifications, and for the use + -- of other applications that will use them to access Russian + -- Cryptography services. Other applications may use them for + -- their own purposes, but this will not constrain extensions and + -- modifications needed to maintain or improve the Russian + -- Cryptography service. + -- Crypto-Pro OID branch + id-CryptoPro OBJECT IDENTIFIER ::= + { iso(1) member-body(2) ru(643) rans(2) cryptopro(2) } + id-CryptoPro-algorithms OBJECT IDENTIFIER ::= + id-CryptoPro + id-CryptoPro-modules OBJECT IDENTIFIER ::= + { id-CryptoPro other(1) modules(1) } + id-CryptoPro-hashes OBJECT IDENTIFIER ::= + { id-CryptoPro-algorithms hashes(30) } + id-CryptoPro-encrypts OBJECT IDENTIFIER ::= + { id-CryptoPro-algorithms encrypts(31) } + id-CryptoPro-signs OBJECT IDENTIFIER ::= + { id-CryptoPro-algorithms signs(32) } + id-CryptoPro-exchanges OBJECT IDENTIFIER ::= + { id-CryptoPro-algorithms exchanges(33) } + id-CryptoPro-extensions OBJECT IDENTIFIER ::= + { id-CryptoPro extensions(34) } + id-CryptoPro-ecc-signs OBJECT IDENTIFIER ::= + { id-CryptoPro-algorithms ecc-signs(35) } + id-CryptoPro-ecc-exchanges OBJECT IDENTIFIER ::= + { id-CryptoPro-algorithms ecc-exchanges(36) } + id-CryptoPro-private-keys OBJECT IDENTIFIER ::= + { id-CryptoPro-algorithms private-keys(37) } + id-CryptoPro-policyIds OBJECT IDENTIFIER ::= + { id-CryptoPro policyIds(38) } + id-CryptoPro-policyQt OBJECT IDENTIFIER ::= + { id-CryptoPro policyQt(39) } + id-CryptoPro-pkixcmp-infos OBJECT IDENTIFIER ::= + + + +Popov, et al. Informational [Page 15] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + { id-CryptoPro-algorithms pkixcmp-infos(41) } + id-CryptoPro-audit-service-types OBJECT IDENTIFIER ::= + { id-CryptoPro-algorithms audit-service-types(42) } + id-CryptoPro-audit-record-types OBJECT IDENTIFIER ::= + { id-CryptoPro-algorithms audit-record-types(43) } + id-CryptoPro-attributes OBJECT IDENTIFIER ::= + { id-CryptoPro-algorithms attributes(44) } + id-CryptoPro-name-service-types OBJECT IDENTIFIER ::= + { id-CryptoPro-algorithms name-service-types(45) } + + -- ASN.1 modules of Russian Cryptography "GOST" & "GOST R" + -- Specifications + cryptographic-Gost-Useful-Definitions OBJECT IDENTIFIER ::= + { id-CryptoPro-modules + cryptographic-Gost-Useful-Definitions(0) 1 } + -- GOST R 34.11-94 + + gostR3411-94-DigestSyntax OBJECT IDENTIFIER ::= + { id-CryptoPro-modules gostR3411-94-DigestSyntax(1) 1 } + gostR3411-94-ParamSetSyntax OBJECT IDENTIFIER ::= + { id-CryptoPro-modules gostR3411-94-ParamSetSyntax(7) 1 } + -- GOST R 34.10-94 + + gostR3410-94-PKISyntax OBJECT IDENTIFIER ::= + { id-CryptoPro-modules gostR3410-94-PKISyntax(2) 1 } + gostR3410-94-SignatureSyntax OBJECT IDENTIFIER ::= + { id-CryptoPro-modules gostR3410-94-SignatureSyntax(3) 1 } + gostR3410-EncryptionSyntax OBJECT IDENTIFIER ::= + { id-CryptoPro-modules gostR3410-EncryptionSyntax(5) 2 } + gostR3410-94-ParamSetSyntax OBJECT IDENTIFIER ::= + { id-CryptoPro-modules gostR3410-94-ParamSetSyntax(8) 1 } + -- GOST R 34.10-2001 + + gostR3410-2001-PKISyntax OBJECT IDENTIFIER ::= + { id-CryptoPro-modules gostR3410-2001-PKISyntax(9) 1 } + gostR3410-2001-SignatureSyntax OBJECT IDENTIFIER ::= + { id-CryptoPro-modules + gostR3410-2001-SignatureSyntax(10) 1 } + gostR3410-2001-ParamSetSyntax OBJECT IDENTIFIER ::= + { id-CryptoPro-modules + gostR3410-2001-ParamSetSyntax(12) 1 } + -- GOST 28147-89 + + gost28147-89-EncryptionSyntax OBJECT IDENTIFIER ::= + { id-CryptoPro-modules gost28147-89-EncryptionSyntax(4) 1 } + gost28147-89-ParamSetSyntax OBJECT IDENTIFIER ::= + { id-CryptoPro-modules gost28147-89-ParamSetSyntax(6) 1 } + -- Extended Key Usage for Crypto-Pro + + + +Popov, et al. Informational [Page 16] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + gost-CryptoPro-ExtendedKeyUsage OBJECT IDENTIFIER ::= + { id-CryptoPro-modules + gost-CryptoPro-ExtendedKeyUsage(13) 1 } + -- Crypto-Pro Private keys + + gost-CryptoPro-PrivateKey OBJECT IDENTIFIER ::= + { id-CryptoPro-modules gost-CryptoPro-PrivateKey(14) 1 } + -- Crypto-Pro PKIXCMP structures + + gost-CryptoPro-PKIXCMP OBJECT IDENTIFIER ::= + { id-CryptoPro-modules gost-CryptoPro-PKIXCMP(15) 1 } + -- Crypto-Pro Transport Layer Security structures + gost-CryptoPro-TLS OBJECT IDENTIFIER ::= + { id-CryptoPro-modules gost-CryptoPro-TLS(16) 1 } + + -- Crypto-Pro Policy + gost-CryptoPro-Policy OBJECT IDENTIFIER ::= + { id-CryptoPro-modules gost-CryptoPro-Policy(17) 1 } + gost-CryptoPro-Constants OBJECT IDENTIFIER ::= + { id-CryptoPro-modules gost-CryptoPro-Constants(18) 1 } + -- Useful types + ALGORITHM-IDENTIFIER ::= CLASS { + &id OBJECT IDENTIFIER UNIQUE, + &Type OPTIONAL + } + WITH SYNTAX { [&Type] IDENTIFIED BY &id } + END -- Cryptographic-Gost-Useful-Definitions + +10.2. Gost28147-89-EncryptionSyntax + + Gost28147-89-EncryptionSyntax + { iso(1) member-body(2) ru(643) rans(2) cryptopro(2) + other(1) modules(1) gost28147-89-EncryptionSyntax(4) 1 } + DEFINITIONS EXPLICIT TAGS ::= + BEGIN + -- EXPORTS All -- + -- The types and values defined in this module are exported for + -- use in the other ASN.1 modules contained within the Russian + -- Cryptography "GOST" & "GOST R" Specifications, and for the use + -- of other applications that will use them to access Russian + -- Cryptography services. Other applications may use them for + -- their own purposes, but this will not constrain extensions and + -- modifications needed to maintain or improve the Russian + -- Cryptography service. + IMPORTS + id-CryptoPro-algorithms, id-CryptoPro-encrypts, + ALGORITHM-IDENTIFIER, + cryptographic-Gost-Useful-Definitions + + + +Popov, et al. Informational [Page 17] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + FROM Cryptographic-Gost-Useful-Definitions + { iso(1) member-body(2) ru(643) rans(2) + cryptopro(2) other(1) modules(1) + cryptographic-Gost-Useful-Definitions(0) 1 } + ; + -- GOST 28147-89 OID + id-Gost28147-89 OBJECT IDENTIFIER ::= + { id-CryptoPro-algorithms gost28147-89(21) } + id-Gost28147-89-MAC OBJECT IDENTIFIER ::= + { id-CryptoPro-algorithms gost28147-89-MAC(22) } + -- GOST 28147-89 cryptographic parameter sets OIDs + id-Gost28147-89-TestParamSet OBJECT IDENTIFIER ::= + { id-CryptoPro-encrypts test(0) } + id-Gost28147-89-CryptoPro-A-ParamSet OBJECT IDENTIFIER ::= + { id-CryptoPro-encrypts cryptopro-A(1) } + id-Gost28147-89-CryptoPro-B-ParamSet OBJECT IDENTIFIER ::= + { id-CryptoPro-encrypts cryptopro-B(2) } + id-Gost28147-89-CryptoPro-C-ParamSet OBJECT IDENTIFIER ::= + { id-CryptoPro-encrypts cryptopro-C(3) } + id-Gost28147-89-CryptoPro-D-ParamSet OBJECT IDENTIFIER ::= + { id-CryptoPro-encrypts cryptopro-D(4) } + id-Gost28147-89-CryptoPro-Oscar-1-1-ParamSet + OBJECT IDENTIFIER ::= + { id-CryptoPro-encrypts cryptopro-Oscar-1-1(5) } + id-Gost28147-89-CryptoPro-Oscar-1-0-ParamSet + OBJECT IDENTIFIER ::= + { id-CryptoPro-encrypts cryptopro-Oscar-1-0(6) } + id-Gost28147-89-CryptoPro-RIC-1-ParamSet + OBJECT IDENTIFIER ::= + { id-CryptoPro-encrypts cryptopro-RIC-1(7) } + -- GOST 28147-89 Types + Gost28147-89-UZ ::= OCTET STRING (SIZE (64)) + Gost28147-89-IV ::= OCTET STRING (SIZE (8)) + Gost28147-89-Key ::= OCTET STRING (SIZE (32)) + Gost28147-89-MAC ::= OCTET STRING (SIZE (1..4)) + Gost28147-89-EncryptedKey ::= + SEQUENCE { + encryptedKey Gost28147-89-Key, + maskKey [0] IMPLICIT Gost28147-89-Key OPTIONAL, + macKey Gost28147-89-MAC (SIZE (4)) + } + Gost28147-89-ParamSet ::= + OBJECT IDENTIFIER ( + id-Gost28147-89-TestParamSet | + -- Only for testing purposes + id-Gost28147-89-CryptoPro-A-ParamSet | + id-Gost28147-89-CryptoPro-B-ParamSet | + id-Gost28147-89-CryptoPro-C-ParamSet | + + + +Popov, et al. Informational [Page 18] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + id-Gost28147-89-CryptoPro-D-ParamSet | + id-Gost28147-89-CryptoPro-Oscar-1-1-ParamSet | + id-Gost28147-89-CryptoPro-Oscar-1-0-ParamSet | + id-Gost28147-89-CryptoPro-RIC-1-ParamSet + ) + Gost28147-89-BlobParameters ::= + SEQUENCE { + encryptionParamSet Gost28147-89-ParamSet, + ... + } + -- GOST 28147-89 encryption algorithm parameters + Gost28147-89-Parameters ::= + SEQUENCE { + iv Gost28147-89-IV, + encryptionParamSet Gost28147-89-ParamSet + } + Gost28147-89-Algorithms ALGORITHM-IDENTIFIER ::= { + { Gost28147-89-Parameters IDENTIFIED BY + id-Gost28147-89 } + } + END -- Gost28147-89-EncryptionSyntax + +10.3. Gost28147-89-ParamSetSyntax + + Gost28147-89-ParamSetSyntax + { iso(1) member-body(2) ru(643) rans(2) cryptopro(2) + other(1) modules(1) gost28147-89-ParamSetSyntax(6) 1 } + DEFINITIONS EXPLICIT TAGS ::= + BEGIN + -- EXPORTS All -- + -- The types and values defined in this module are exported for + -- use in the other ASN.1 modules contained within the Russian + -- Cryptography "GOST" & "GOST R" Specifications, and for the use + -- of other applications that will use them to access Russian + -- Cryptography services. Other applications may use them for + -- their own purposes, but this will not constrain extensions and + -- modifications needed to maintain or improve the Russian + -- Cryptography service. + IMPORTS + id-CryptoPro-algorithms, id-CryptoPro-encrypts, + gost28147-89-EncryptionSyntax, ALGORITHM-IDENTIFIER, + cryptographic-Gost-Useful-Definitions + FROM Cryptographic-Gost-Useful-Definitions + { iso(1) member-body(2) ru(643) rans(2) + cryptopro(2) other(1) modules(1) + cryptographic-Gost-Useful-Definitions(0) 1 } + Gost28147-89-UZ, + Gost28147-89-ParamSet, + + + +Popov, et al. Informational [Page 19] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + id-Gost28147-89-TestParamSet, + id-Gost28147-89-CryptoPro-A-ParamSet, + id-Gost28147-89-CryptoPro-B-ParamSet, + id-Gost28147-89-CryptoPro-C-ParamSet, + id-Gost28147-89-CryptoPro-D-ParamSet + FROM Gost28147-89-EncryptionSyntax + gost28147-89-EncryptionSyntax + AlgorithmIdentifier + FROM PKIX1Explicit88 {iso(1) identified-organization(3) + dod(6) internet(1) security(5) mechanisms(5) pkix(7) + id-mod(0) id-pkix1-explicit-88(1)} + ; + -- GOST 28147-89 cryptographic parameter sets: + -- OIDs for parameter sets are imported from + -- Gost28147-89-EncryptionSyntax + Gost28147-89-ParamSetParameters ::= + SEQUENCE { + eUZ Gost28147-89-UZ, + mode INTEGER { + gost28147-89-CNT(0), + gost28147-89-CFB(1), + cryptoPro-CBC(2) + }, + shiftBits INTEGER { gost28147-89-block(64) }, + keyMeshing AlgorithmIdentifier + } + Gost28147-89-ParamSetAlgorithms ALGORITHM-IDENTIFIER ::= { + { Gost28147-89-ParamSetParameters IDENTIFIED BY + id-Gost28147-89-TestParamSet } | + { Gost28147-89-ParamSetParameters IDENTIFIED BY + id-Gost28147-89-CryptoPro-A-ParamSet } | + { Gost28147-89-ParamSetParameters IDENTIFIED BY + id-Gost28147-89-CryptoPro-B-ParamSet } | + { Gost28147-89-ParamSetParameters IDENTIFIED BY + id-Gost28147-89-CryptoPro-C-ParamSet } | + { Gost28147-89-ParamSetParameters IDENTIFIED BY + id-Gost28147-89-CryptoPro-D-ParamSet } + } + id-Gost28147-89-CryptoPro-KeyMeshing OBJECT IDENTIFIER ::= + { id-CryptoPro-algorithms keyMeshing(14) cryptoPro(1) } + id-Gost28147-89-None-KeyMeshing OBJECT IDENTIFIER ::= + { id-CryptoPro-algorithms keyMeshing(14) none(0) } + Gost28147-89-KeyMeshingAlgorithms ALGORITHM-IDENTIFIER ::= { + { NULL IDENTIFIED BY id-Gost28147-89-CryptoPro-KeyMeshing } | + { NULL IDENTIFIED BY id-Gost28147-89-None-KeyMeshing } + } + END -- Gost28147-89-ParamSetSyntax + + + + +Popov, et al. Informational [Page 20] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + +10.4. GostR3411-94-DigestSyntax + + GostR3411-94-DigestSyntax + { iso(1) member-body(2) ru(643) rans(2) cryptopro(2) + other(1) modules(1) gostR3411-94-DigestSyntax(1) 1 } + DEFINITIONS ::= + BEGIN + -- EXPORTS All -- + -- The types and values defined in this module are exported for + -- use in the other ASN.1 modules contained within the Russian + -- Cryptography "GOST" & "GOST R" Specifications, and for the use + -- of other applications that will use them to access Russian + -- Cryptography services. Other applications may use them for + -- their own purposes, but this will not constrain extensions and + -- modifications needed to maintain or improve the Russian + -- Cryptography service. + IMPORTS + id-CryptoPro-algorithms, id-CryptoPro-hashes, + ALGORITHM-IDENTIFIER, + cryptographic-Gost-Useful-Definitions + FROM Cryptographic-Gost-Useful-Definitions + { iso(1) member-body(2) ru(643) rans(2) + cryptopro(2) other(1) modules(1) + cryptographic-Gost-Useful-Definitions(0) 1 } + ; + -- GOST R 34.11-94 OID + id-GostR3411-94 OBJECT IDENTIFIER ::= + { id-CryptoPro-algorithms gostR3411-94(9) } + -- GOST R 34.11-94 cryptographic parameter set OIDs + id-GostR3411-94-TestParamSet OBJECT IDENTIFIER ::= + { id-CryptoPro-hashes test(0) } + id-GostR3411-94-CryptoProParamSet OBJECT IDENTIFIER ::= + { id-CryptoPro-hashes cryptopro(1) } + -- GOST R 34.11-94 data types + GostR3411-94-Digest ::= OCTET STRING (SIZE (32)) + -- GOST R 34.11-94 digest algorithm & parameters + GostR3411-94-DigestParameters ::= + OBJECT IDENTIFIER ( + id-GostR3411-94-TestParamSet | + -- Only for testing purposes + id-GostR3411-94-CryptoProParamSet + ) + GostR3411-94-DigestAlgorithms ALGORITHM-IDENTIFIER ::= { + { NULL IDENTIFIED BY id-GostR3411-94 } | + -- Assume id-GostR3411-94-CryptoProParamSet + { GostR3411-94-DigestParameters + IDENTIFIED BY id-GostR3411-94 } + } + + + +Popov, et al. Informational [Page 21] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + END -- GostR3411-94-DigestSyntax + +10.5. GostR3411-94-ParamSetSyntax + + GostR3411-94-ParamSetSyntax + { iso(1) member-body(2) ru(643) rans(2) cryptopro(2) + other(1) modules(1) gostR3411-94-ParamSetSyntax(7) 1 } + DEFINITIONS ::= + BEGIN + -- EXPORTS All -- + -- The types and values defined in this module are exported for + -- use in the other ASN.1 modules contained within the Russian + -- Cryptography "GOST" & "GOST R" Specifications, and for the use + -- of other applications that will use them to access Russian + -- Cryptography services. Other applications may use them for + -- their own purposes, but this will not constrain extensions and + -- modifications needed to maintain or improve the Russian + -- Cryptography service. + IMPORTS + gost28147-89-EncryptionSyntax, + gostR3411-94-DigestSyntax, + ALGORITHM-IDENTIFIER + FROM Cryptographic-Gost-Useful-Definitions + { iso(1) member-body(2) ru(643) rans(2) + cryptopro(2) other(1) modules(1) + cryptographic-Gost-Useful-Definitions(0) 1 } + Gost28147-89-UZ + FROM Gost28147-89-EncryptionSyntax + gost28147-89-EncryptionSyntax + id-GostR3411-94-TestParamSet, + id-GostR3411-94-CryptoProParamSet, + GostR3411-94-Digest + FROM GostR3411-94-DigestSyntax + gostR3411-94-DigestSyntax + ; + -- GOST R 34.11-94 cryptographic parameter sets: + -- OIDs for parameter sets are imported from + -- GostR3411-94-DigestSyntax + GostR3411-94-ParamSetParameters ::= + SEQUENCE { + hUZ Gost28147-89-UZ, -- S-Box for digest + h0 GostR3411-94-Digest -- initial digest value + } + GostR3411-94-ParamSetAlgorithms ALGORITHM-IDENTIFIER ::= { + { GostR3411-94-ParamSetParameters IDENTIFIED BY + id-GostR3411-94-TestParamSet + } | + { GostR3411-94-ParamSetParameters IDENTIFIED BY + + + +Popov, et al. Informational [Page 22] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + id-GostR3411-94-CryptoProParamSet + } + } + END -- GostR3411-94-ParamSetSyntax + +10.6. GostR3410-94-PKISyntax + + GostR3410-94-PKISyntax + { iso(1) member-body(2) ru(643) rans(2) cryptopro(2) + other(1) modules(1) gostR3410-94-PKISyntax(2) 1 } + DEFINITIONS ::= + BEGIN + -- EXPORTS All -- + -- The types and values defined in this module are exported for + -- use in the other ASN.1 modules contained within the Russian + -- Cryptography "GOST" & "GOST R" Specifications, and for the use + -- of other applications that will use them to access Russian + -- Cryptography services. Other applications may use them for + -- their own purposes, but this will not constrain extensions and + -- modifications needed to maintain or improve the Russian + -- Cryptography service. + IMPORTS + id-CryptoPro-algorithms, + id-CryptoPro-signs, id-CryptoPro-exchanges, + gost28147-89-EncryptionSyntax, + gostR3411-94-DigestSyntax, ALGORITHM-IDENTIFIER, + cryptographic-Gost-Useful-Definitions + FROM Cryptographic-Gost-Useful-Definitions + { iso(1) member-body(2) ru(643) rans(2) + cryptopro(2) other(1) modules(1) + cryptographic-Gost-Useful-Definitions(0) 1 } + Gost28147-89-ParamSet + FROM Gost28147-89-EncryptionSyntax + gost28147-89-EncryptionSyntax + id-GostR3411-94-TestParamSet, + id-GostR3411-94-CryptoProParamSet + FROM GostR3411-94-DigestSyntax gostR3411-94-DigestSyntax + ; + -- GOST R 34.10-94 OIDs + id-GostR3410-94 OBJECT IDENTIFIER ::= + { id-CryptoPro-algorithms gostR3410-94(20) } + id-GostR3410-94DH OBJECT IDENTIFIER ::= + { id-CryptoPro-algorithms gostR3410-94DH(99) } + id-GostR3411-94-with-GostR3410-94 OBJECT IDENTIFIER ::= + { id-CryptoPro-algorithms + gostR3411-94-with-gostR3410-94(4) } + -- GOST R 34.10-94 public key parameter set OIDs + id-GostR3410-94-TestParamSet OBJECT IDENTIFIER ::= + + + +Popov, et al. Informational [Page 23] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + { id-CryptoPro-signs test(0) } + id-GostR3410-94-CryptoPro-A-ParamSet OBJECT IDENTIFIER ::= + { id-CryptoPro-signs cryptopro-A(2) } + id-GostR3410-94-CryptoPro-B-ParamSet OBJECT IDENTIFIER ::= + { id-CryptoPro-signs cryptopro-B(3) } + id-GostR3410-94-CryptoPro-C-ParamSet OBJECT IDENTIFIER ::= + { id-CryptoPro-signs cryptopro-C(4) } + id-GostR3410-94-CryptoPro-D-ParamSet OBJECT IDENTIFIER ::= + { id-CryptoPro-signs cryptopro-D(5) } + id-GostR3410-94-CryptoPro-XchA-ParamSet OBJECT IDENTIFIER ::= + { id-CryptoPro-exchanges cryptopro-XchA(1) } + id-GostR3410-94-CryptoPro-XchB-ParamSet OBJECT IDENTIFIER ::= + { id-CryptoPro-exchanges cryptopro-XchB(2) } + id-GostR3410-94-CryptoPro-XchC-ParamSet OBJECT IDENTIFIER ::= + { id-CryptoPro-exchanges cryptopro-XchC(3) } + -- GOST R 34.10-94 data types + GostR3410-94-CertificateSignature ::= + BIT STRING ( SIZE(256..512) ) + GostR3410-94-PublicKey ::= + OCTET STRING ( SIZE( + 64 | -- Only for testing purposes + 128 + ) ) + GostR3410-94-PublicKeyParameters ::= + SEQUENCE { + publicKeyParamSet + OBJECT IDENTIFIER ( + id-GostR3410-94-TestParamSet | + -- Only for testing purposes + id-GostR3410-94-CryptoPro-A-ParamSet | + id-GostR3410-94-CryptoPro-B-ParamSet | + id-GostR3410-94-CryptoPro-C-ParamSet | + id-GostR3410-94-CryptoPro-D-ParamSet | + id-GostR3410-94-CryptoPro-XchA-ParamSet | + id-GostR3410-94-CryptoPro-XchB-ParamSet | + id-GostR3410-94-CryptoPro-XchC-ParamSet + ), + digestParamSet + OBJECT IDENTIFIER ( + id-GostR3411-94-TestParamSet | + -- Only for testing purposes + id-GostR3411-94-CryptoProParamSet + ), + encryptionParamSet Gost28147-89-ParamSet OPTIONAL + } + GostR3410-94-PublicKeyAlgorithms ALGORITHM-IDENTIFIER ::= { + { GostR3410-94-PublicKeyParameters IDENTIFIED BY + id-GostR3410-94 } + + + +Popov, et al. Informational [Page 24] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + } + END -- GostR3410-94-PKISyntax + +10.7. GostR3410-94-ParamSetSyntax + + GostR3410-94-ParamSetSyntax + { iso(1) member-body(2) ru(643) rans(2) cryptopro(2) + other(1) modules(1) gostR3410-94-ParamSetSyntax(8) 1 } + DEFINITIONS ::= + BEGIN + -- EXPORTS All -- + -- The types and values defined in this module are exported for + -- use in the other ASN.1 modules contained within the Russian + -- Cryptography "GOST" & "GOST R" Specifications, and for the use + -- of other applications that will use them to access Russian + -- Cryptography services. Other applications may use them for + -- their own purposes, but this will not constrain extensions and + -- modifications needed to maintain or improve the Russian + -- Cryptography service. + IMPORTS + id-CryptoPro-algorithms, + id-CryptoPro-signs, id-CryptoPro-exchanges, + gostR3410-94-PKISyntax, ALGORITHM-IDENTIFIER, + cryptographic-Gost-Useful-Definitions + FROM Cryptographic-Gost-Useful-Definitions + { iso(1) member-body(2) ru(643) rans(2) + cryptopro(2) other(1) modules(1) + cryptographic-Gost-Useful-Definitions(0) 1 } + id-GostR3410-94, + id-GostR3410-94-TestParamSet, + id-GostR3410-94-CryptoPro-A-ParamSet, + id-GostR3410-94-CryptoPro-B-ParamSet, + id-GostR3410-94-CryptoPro-C-ParamSet, + id-GostR3410-94-CryptoPro-D-ParamSet, + id-GostR3410-94-CryptoPro-XchA-ParamSet, + id-GostR3410-94-CryptoPro-XchB-ParamSet, + id-GostR3410-94-CryptoPro-XchC-ParamSet + FROM GostR3410-94-PKISyntax gostR3410-94-PKISyntax + AlgorithmIdentifier + FROM PKIX1Explicit88 {iso(1) identified-organization(3) + dod(6) internet(1) security(5) mechanisms(5) pkix(7) + id-mod(0) id-pkix1-explicit-88(1)} + ; + -- GOST R 34.10-94 public key parameter sets: + -- OIDs for parameter sets are imported from + -- GostR3410-94-PKISyntax + GostR3410-94-ParamSetParameters-t ::= INTEGER (512 | 1024) + -- 512 - only for testing purposes + + + +Popov, et al. Informational [Page 25] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + GostR3410-94-ParamSetParameters ::= + SEQUENCE { + t GostR3410-94-ParamSetParameters-t, + p INTEGER, -- 2^1020 < p < 2^1024 or 2^509 < p < 2^512 + q INTEGER, -- 2^254 < q < 2^256 + a INTEGER, -- 1 < a < p-1 < 2^1024-1 + validationAlgorithm + AlgorithmIdentifier OPTIONAL + -- {{ GostR3410-94-ValidationAlgorithms }} + } + GostR3410-94-ParamSetAlgorithm ALGORITHM-IDENTIFIER ::= { + { GostR3410-94-ParamSetParameters IDENTIFIED BY + id-GostR3410-94-TestParamSet } | + { GostR3410-94-ParamSetParameters IDENTIFIED BY + id-GostR3410-94-CryptoPro-A-ParamSet } | + { GostR3410-94-ParamSetParameters IDENTIFIED BY + id-GostR3410-94-CryptoPro-B-ParamSet } | + { GostR3410-94-ParamSetParameters IDENTIFIED BY + id-GostR3410-94-CryptoPro-C-ParamSet } | + { GostR3410-94-ParamSetParameters IDENTIFIED BY + id-GostR3410-94-CryptoPro-D-ParamSet } | + { GostR3410-94-ParamSetParameters IDENTIFIED BY + id-GostR3410-94-CryptoPro-XchA-ParamSet } | + { GostR3410-94-ParamSetParameters IDENTIFIED BY + id-GostR3410-94-CryptoPro-XchB-ParamSet } | + { GostR3410-94-ParamSetParameters IDENTIFIED BY + id-GostR3410-94-CryptoPro-XchC-ParamSet } + } + -- GOST R 34.10-94 validation/constructor + id-GostR3410-94-a OBJECT IDENTIFIER ::= + { id-GostR3410-94 a(1) } + id-GostR3410-94-aBis OBJECT IDENTIFIER ::= + { id-GostR3410-94 aBis(2) } + id-GostR3410-94-b OBJECT IDENTIFIER ::= + { id-GostR3410-94 b(3) } + id-GostR3410-94-bBis OBJECT IDENTIFIER ::= + { id-GostR3410-94 bBis(4) } + GostR3410-94-ValidationParameters-c ::= + INTEGER (0 .. 65535) + GostR3410-94-ValidationParameters ::= + SEQUENCE { + x0 GostR3410-94-ValidationParameters-c, + c GostR3410-94-ValidationParameters-c, + d INTEGER OPTIONAL -- 1 < d < p-1 < 2^1024-1 + + } + GostR3410-94-ValidationBisParameters-c ::= + INTEGER (0 .. 4294967295) + + + +Popov, et al. Informational [Page 26] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + GostR3410-94-ValidationBisParameters ::= + SEQUENCE { + x0 GostR3410-94-ValidationBisParameters-c, + c GostR3410-94-ValidationBisParameters-c, + d INTEGER OPTIONAL -- 1 < d < p-1 < 2^1024-1 + + } + GostR3410-94-ValidationAlgorithms ALGORITHM-IDENTIFIER ::= { + { GostR3410-94-ValidationParameters IDENTIFIED BY + id-GostR3410-94-a } | + { GostR3410-94-ValidationBisParameters IDENTIFIED BY + id-GostR3410-94-aBis } | + { GostR3410-94-ValidationParameters IDENTIFIED BY + id-GostR3410-94-b } | + { GostR3410-94-ValidationBisParameters IDENTIFIED BY + id-GostR3410-94-bBis } + } + END -- GostR3410-94-ParamSetSyntax + +10.8. GostR3410-2001-PKISyntax + + GostR3410-2001-PKISyntax + { iso(1) member-body(2) ru(643) rans(2) cryptopro(2) + other(1) modules(1) gostR3410-2001-PKISyntax(9) 1 } + DEFINITIONS ::= + BEGIN + -- EXPORTS All -- + -- The types and values defined in this module are exported for + -- use in the other ASN.1 modules contained within the Russian + -- Cryptography "GOST" & "GOST R" Specifications, and for the use + -- of other applications that will use them to access Russian + -- Cryptography services. Other applications may use them for + -- their own purposes, but this will not constrain extensions and + -- modifications needed to maintain or improve the Russian + -- Cryptography service. + IMPORTS + id-CryptoPro-algorithms, + id-CryptoPro-ecc-signs, id-CryptoPro-ecc-exchanges, + gost28147-89-EncryptionSyntax, + gostR3411-94-DigestSyntax, ALGORITHM-IDENTIFIER, + cryptographic-Gost-Useful-Definitions + FROM Cryptographic-Gost-Useful-Definitions + { iso(1) member-body(2) ru(643) rans(2) + cryptopro(2) other(1) modules(1) + cryptographic-Gost-Useful-Definitions(0) 1 } + Gost28147-89-ParamSet + FROM Gost28147-89-EncryptionSyntax + gost28147-89-EncryptionSyntax + + + +Popov, et al. Informational [Page 27] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + id-GostR3411-94-TestParamSet, + id-GostR3411-94-CryptoProParamSet + FROM GostR3411-94-DigestSyntax gostR3411-94-DigestSyntax + ; + -- GOST R 34.10-2001 OIDs + id-GostR3410-2001 OBJECT IDENTIFIER ::= + { id-CryptoPro-algorithms gostR3410-2001(19) } + id-GostR3410-2001DH OBJECT IDENTIFIER ::= + { id-CryptoPro-algorithms gostR3410-2001DH(98) } + id-GostR3411-94-with-GostR3410-2001 OBJECT IDENTIFIER ::= + { id-CryptoPro-algorithms + gostR3411-94-with-gostR3410-2001(3) } + -- GOST R 34.10-2001 public key parameter set OIDs + id-GostR3410-2001-TestParamSet OBJECT IDENTIFIER ::= + { id-CryptoPro-ecc-signs test(0) } + id-GostR3410-2001-CryptoPro-A-ParamSet OBJECT IDENTIFIER ::= + { id-CryptoPro-ecc-signs cryptopro-A(1) } + id-GostR3410-2001-CryptoPro-B-ParamSet OBJECT IDENTIFIER ::= + { id-CryptoPro-ecc-signs cryptopro-B(2) } + id-GostR3410-2001-CryptoPro-C-ParamSet OBJECT IDENTIFIER ::= + { id-CryptoPro-ecc-signs cryptopro-C(3) } + id-GostR3410-2001-CryptoPro-XchA-ParamSet + OBJECT IDENTIFIER ::= + { id-CryptoPro-ecc-exchanges cryptopro-XchA(0) } + id-GostR3410-2001-CryptoPro-XchB-ParamSet + OBJECT IDENTIFIER ::= + { id-CryptoPro-ecc-exchanges cryptopro-XchB(1) } + -- GOST R 34.10-2001 Data Types + GostR3410-2001-CertificateSignature ::= + BIT STRING ( SIZE(256..512) ) + GostR3410-2001-PublicKey ::= + OCTET STRING ( SIZE(64) ) + GostR3410-2001-PublicKeyParameters ::= + SEQUENCE { + publicKeyParamSet + OBJECT IDENTIFIER ( + id-GostR3410-2001-TestParamSet | + -- Only for testing purposes + id-GostR3410-2001-CryptoPro-A-ParamSet | + id-GostR3410-2001-CryptoPro-B-ParamSet | + id-GostR3410-2001-CryptoPro-C-ParamSet | + id-GostR3410-2001-CryptoPro-XchA-ParamSet | + id-GostR3410-2001-CryptoPro-XchB-ParamSet + ), + digestParamSet + OBJECT IDENTIFIER ( + id-GostR3411-94-TestParamSet | + -- Only for testing purposes + + + +Popov, et al. Informational [Page 28] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + id-GostR3411-94-CryptoProParamSet + ), + encryptionParamSet Gost28147-89-ParamSet OPTIONAL + } + GostR3410-2001-PublicKeyAlgorithms ALGORITHM-IDENTIFIER ::= { + { GostR3410-2001-PublicKeyParameters IDENTIFIED BY + id-GostR3410-2001 } + } + END -- GostR3410-2001-PKISyntax + +10.9. GostR3410-2001-ParamSetSyntax + + GostR3410-2001-ParamSetSyntax + { iso(1) member-body(2) ru(643) rans(2) cryptopro(2) + other(1) modules(1) gostR3410-2001-ParamSetSyntax(12) 1 } + DEFINITIONS ::= + BEGIN + -- EXPORTS All -- + -- The types and values defined in this module are exported for + -- use in the other ASN.1 modules contained within the Russian + -- Cryptography "GOST" & "GOST R" Specifications, and for the use + -- of other applications that will use them to access Russian + -- Cryptography services. Other applications may use them for + -- their own purposes, but this will not constrain extensions and + -- modifications needed to maintain or improve the Russian + -- Cryptography service. + IMPORTS + gostR3410-2001-PKISyntax, ALGORITHM-IDENTIFIER, + cryptographic-Gost-Useful-Definitions + FROM Cryptographic-Gost-Useful-Definitions + { iso(1) member-body(2) ru(643) rans(2) + cryptopro(2) other(1) modules(1) + cryptographic-Gost-Useful-Definitions(0) 1 } + id-GostR3410-2001, + id-GostR3410-2001-TestParamSet, + id-GostR3410-2001-CryptoPro-A-ParamSet, + id-GostR3410-2001-CryptoPro-B-ParamSet, + id-GostR3410-2001-CryptoPro-C-ParamSet, + id-GostR3410-2001-CryptoPro-XchA-ParamSet, + id-GostR3410-2001-CryptoPro-XchB-ParamSet + FROM GostR3410-2001-PKISyntax gostR3410-2001-PKISyntax + ; + GostR3410-2001-ParamSetParameters ::= + SEQUENCE { + a INTEGER, -- 0 < a < p < 2^256 + b INTEGER, -- 0 < b < p < 2^256 + p INTEGER, -- 2^254 < p < 2^256 + q INTEGER, -- 2^254 < q < 2^256 + + + +Popov, et al. Informational [Page 29] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + x INTEGER, -- 0 < x < p < 2^256 + y INTEGER -- 0 < y < p < 2^256 + } + -- GOST R 34.10-2001 public key parameter set: + -- OIDs for parameter sets are imported from + -- GostR3410-2001-PKISyntax + GostR3410-2001-ParamSetAlgorithm ALGORITHM-IDENTIFIER ::= { + { GostR3410-2001-ParamSetParameters IDENTIFIED BY + id-GostR3410-2001-TestParamSet } | + { GostR3410-2001-ParamSetParameters IDENTIFIED BY + id-GostR3410-2001-CryptoPro-A-ParamSet } | + { GostR3410-2001-ParamSetParameters IDENTIFIED BY + id-GostR3410-2001-CryptoPro-B-ParamSet } | + { GostR3410-2001-ParamSetParameters IDENTIFIED BY + id-GostR3410-2001-CryptoPro-C-ParamSet } | + { GostR3410-2001-ParamSetParameters IDENTIFIED BY + id-GostR3410-2001-CryptoPro-XchA-ParamSet } | + { GostR3410-2001-ParamSetParameters IDENTIFIED BY + id-GostR3410-2001-CryptoPro-XchB-ParamSet } + } + END -- GostR3410-2001-ParamSetSyntax + +11. Appendix Parameters + + Parameters here are given as SEQUENCE OF AlgorithmIdentifier in ASN.1 + DER encoding [X.660], stored in the same format as the examples in + [RFC4134], can be extracted using the same program. + + If you want to extract without the program, copy all the lines + between the "|>" and "|<" markers, remove any page breaks, and remove + the "|" in the first column of each line. The result is a valid + Base64 blob that can be processed by any Base64 decoder. + +11.1. Encryption Algorithm Parameters + + For each AlgorithmIdentifier in this sequence, the parameters field + contains Gost28147-89-ParamSetParameters. + + 0 30 480: SEQUENCE { + 4 30 94: SEQUENCE { + 6 06 7: OBJECT IDENTIFIER + : id-Gost28147-89-TestParamSet + 15 30 83: SEQUENCE { + 17 04 64: OCTET STRING + : 4C DE 38 9C 29 89 EF B6 FF EB 56 C5 5E C2 9B 02 + : 98 75 61 3B 11 3F 89 60 03 97 0C 79 8A A1 D5 5D + : E2 10 AD 43 37 5D B3 8E B4 2C 77 E7 CD 46 CA FA + : D6 6A 20 1F 70 F4 1E A4 AB 03 F2 21 65 B8 44 D8 + + + +Popov, et al. Informational [Page 30] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + 83 02 1: INTEGER 0 + 86 02 1: INTEGER 64 + 89 30 9: SEQUENCE { + 91 06 7: OBJECT IDENTIFIER + : id-Gost28147-89-None-KeyMeshing + : } + : } + : } + 100 30 94: SEQUENCE { + 102 06 7: OBJECT IDENTIFIER + : id-Gost28147-89-CryptoPro-A-ParamSet + 111 30 83: SEQUENCE { + 113 04 64: OCTET STRING + + -- K1 K2 K3 K4 K5 K6 K7 K8 + -- 9 3 E E B 3 1 B + -- 6 7 4 7 5 A D A + -- 3 E 6 A 1 D 2 F + -- 2 9 2 C 9 C 9 5 + -- 8 8 B D 8 1 7 0 + -- B A 3 1 D 2 A C + -- 1 F D 3 F 0 6 E + -- 7 0 8 9 0 B 0 8 + -- A 5 C 0 E 7 8 6 + -- 4 2 F 2 4 5 C 2 + -- E 6 5 B 2 9 4 3 + -- F C A 4 3 4 5 9 + -- C B 0 F C 8 F 1 + -- 0 4 7 8 7 F 3 7 + -- D D 1 5 A E B D + -- 5 1 9 6 6 6 E 4 + + : 93 EE B3 1B 67 47 5A DA 3E 6A 1D 2F 29 2C 9C 95 + : 88 BD 81 70 BA 31 D2 AC 1F D3 F0 6E 70 89 0B 08 + : A5 C0 E7 86 42 F2 45 C2 E6 5B 29 43 FC A4 34 59 + : CB 0F C8 F1 04 78 7F 37 DD 15 AE BD 51 96 66 E4 + 179 02 1: INTEGER 1 + 182 02 1: INTEGER 64 + 185 30 9: SEQUENCE { + 187 06 7: OBJECT IDENTIFIER + : id-Gost28147-89-CryptoPro-KeyMeshing + : } + : } + : } + 196 30 94: SEQUENCE { + 198 06 7: OBJECT IDENTIFIER + : id-Gost28147-89-CryptoPro-B-ParamSet + 207 30 83: SEQUENCE { + + + +Popov, et al. Informational [Page 31] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + 209 04 64: OCTET STRING + : 80 E7 28 50 41 C5 73 24 B2 00 C2 AB 1A AD F6 BE + : 34 9B 94 98 5D 26 5D 13 05 D1 AE C7 9C B2 BB 31 + : 29 73 1C 7A E7 5A 41 42 A3 8C 07 D9 CF FF DF 06 + : DB 34 6A 6F 68 6E 80 FD 76 19 E9 85 FE 48 35 EC + 275 02 1: INTEGER 1 + 278 02 1: INTEGER 64 + 281 30 9: SEQUENCE { + 283 06 7: OBJECT IDENTIFIER + : id-Gost28147-89-CryptoPro-KeyMeshing + : } + : } + : } + 292 30 94: SEQUENCE { + 294 06 7: OBJECT IDENTIFIER + : id-Gost28147-89-CryptoPro-C-ParamSet + 303 30 83: SEQUENCE { + 305 04 64: OCTET STRING + : 10 83 8C A7 B1 26 D9 94 C7 50 BB 60 2D 01 01 85 + : 9B 45 48 DA D4 9D 5E E2 05 FA 12 2F F2 A8 24 0E + : 48 3B 97 FC 5E 72 33 36 8F C9 C6 51 EC D7 E5 BB + : A9 6E 6A 4D 7A EF F0 19 66 1C AF C3 33 B4 7D 78 + 371 02 1: INTEGER 1 + 374 02 1: INTEGER 64 + 377 30 9: SEQUENCE { + 379 06 7: OBJECT IDENTIFIER + : id-Gost28147-89-CryptoPro-KeyMeshing + : } + : } + : } + 388 30 94: SEQUENCE { + 390 06 7: OBJECT IDENTIFIER + : id-Gost28147-89-CryptoPro-D-ParamSet + 399 30 83: SEQUENCE { + 401 04 64: OCTET STRING + : FB 11 08 31 C6 C5 C0 0A 23 BE 8F 66 A4 0C 93 F8 + : 6C FA D2 1F 4F E7 25 EB 5E 60 AE 90 02 5D BB 24 + : 77 A6 71 DC 9D D2 3A 83 E8 4B 64 C5 D0 84 57 49 + : 15 99 4C B7 BA 33 E9 AD 89 7F FD 52 31 28 16 7E + 467 02 1: INTEGER 1 + 470 02 1: INTEGER 64 + 473 30 9: SEQUENCE { + 475 06 7: OBJECT IDENTIFIER + : id-Gost28147-89-CryptoPro-KeyMeshing + : } + : } + : } + : } + + + +Popov, et al. Informational [Page 32] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + |>Gost28147-89-ParamSetParameters.bin + |MIIB4DBeBgcqhQMCAh8AMFMEQEzeOJwpie+2/+tWxV7CmwKYdWE7ET+JYAOXDHmK + |odVd4hCtQzdds460LHfnzUbK+tZqIB9w9B6kqwPyIWW4RNgCAQACAUAwCQYHKoUD + |AgIOADBeBgcqhQMCAh8BMFMEQJPusxtnR1raPmodLyksnJWIvYFwujHSrB/T8G5w + |iQsIpcDnhkLyRcLmWylD/KQ0WcsPyPEEeH833RWuvVGWZuQCAQECAUAwCQYHKoUD + |AgIOATBeBgcqhQMCAh8CMFMEQIDnKFBBxXMksgDCqxqt9r40m5SYXSZdEwXRrsec + |srsxKXMceudaQUKjjAfZz//fBts0am9oboD9dhnphf5INewCAQECAUAwCQYHKoUD + |AgIOATBeBgcqhQMCAh8DMFMEQBCDjKexJtmUx1C7YC0BAYWbRUja1J1e4gX6Ei/y + |qCQOSDuX/F5yMzaPycZR7Nflu6luak167/AZZhyvwzO0fXgCAQECAUAwCQYHKoUD + |AgIOATBeBgcqhQMCAh8EMFMEQPsRCDHGxcAKI76PZqQMk/hs+tIfT+cl615grpAC + |Xbskd6Zx3J3SOoPoS2TF0IRXSRWZTLe6M+mtiX/9UjEoFn4CAQECAUAwCQYHKoUD + |AgIOAQ== + |<Gost28147-89-ParamSetParameters.bin + +11.2. Digest Algorithm Parameters + + For each AlgorithmIdentifier in this sequence, the parameters field + contains GostR3411-94-ParamSetParameters. + + 0 30 226: SEQUENCE { + 3 30 111: SEQUENCE { + 5 06 7: OBJECT IDENTIFIER + : id-GostR3411-94-TestParamSet + 14 30 100: SEQUENCE { + 16 04 64: OCTET STRING + + -- pi1 pi2 pi3 pi4 pi5 pi6 pi7 pi8 + -- 4 E 5 7 6 4 D 1 + -- A B 8 D C B B F + -- 9 4 1 A 7 A 4 D + -- 2 C D 1 1 0 1 0 + -- D 6 A 0 5 7 3 5 + -- 8 D 3 8 F 2 F 7 + -- 0 F 4 9 D 1 5 A + -- E A 2 F 8 D 9 4 + -- 6 2 E E 4 3 0 9 + -- B 3 F 4 A 6 A 2 + -- 1 8 C 6 9 8 E 3 + -- C 1 7 C E 5 7 E + -- 7 0 6 B 0 9 6 6 + -- F 7 0 2 3 C 8 B + -- 5 5 9 5 B F 2 8 + -- 3 9 B 3 2 E C C + + : 4E 57 64 D1 AB 8D CB BF 94 1A 7A 4D 2C D1 10 10 + : D6 A0 57 35 8D 38 F2 F7 0F 49 D1 5A EA 2F 8D 94 + : 62 EE 43 09 B3 F4 A6 A2 18 C6 98 E3 C1 7C E5 7E + : 70 6B 09 66 F7 02 3C 8B 55 95 BF 28 39 B3 2E CC + + + +Popov, et al. Informational [Page 33] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + 82 04 32: OCTET STRING + : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 + : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 + : } + : } + 116 30 111: SEQUENCE { + 118 06 7: OBJECT IDENTIFIER + : id-GostR3411-94-CryptoProParamSet + 127 30 100: SEQUENCE { + 129 04 64: OCTET STRING + : A5 74 77 D1 4F FA 66 E3 54 C7 42 4A 60 EC B4 19 + : 82 90 9D 75 1D 4F C9 0B 3B 12 2F 54 79 08 A0 AF + : D1 3E 1A 38 C7 B1 81 C6 E6 56 05 87 03 25 EB FE + : 9C 6D F8 6D 2E AB DE 20 BA 89 3C 92 F8 D3 53 BC + 195 04 32: OCTET STRING + : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 + : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 + : } + : } + : } + + |>GostR3411-94-ParamSetParameters.bin + |MIHiMG8GByqFAwICHgAwZARATldk0auNy7+UGnpNLNEQENagVzWNOPL3D0nRWuov + |jZRi7kMJs/SmohjGmOPBfOV+cGsJZvcCPItVlb8oObMuzAQgAAAAAAAAAAAAAAAA + |AAAAAAAAAAAAAAAAAAAAAAAAAAAwbwYHKoUDAgIeATBkBECldHfRT/pm41THQkpg + |7LQZgpCddR1PyQs7Ei9UeQigr9E+GjjHsYHG5lYFhwMl6/6cbfhtLqveILqJPJL4 + |01O8BCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA== + |<GostR3411-94-ParamSetParameters.bin + +11.3. GOST R 34.10-94 Public Key Algorithm Parameters + + For each AlgorithmIdentifier in this sequence, the parameters field + contains GostR3410-94-ParamSetParameters. + + 0 30 2882: SEQUENCE { + 4 30 209: SEQUENCE { + 7 06 7: OBJECT IDENTIFIER + : id-GostR3410-94-TestParamSet + 16 30 197: SEQUENCE { + 19 02 2: INTEGER 512 + 23 02 65: INTEGER + : 00 EE 81 72 AE 89 96 60 8F B6 93 59 B8 9E B8 2A + : 69 85 45 10 E2 97 7A 4D 63 BC 97 32 2C E5 DC 33 + : 86 EA 0A 12 B3 43 E9 19 0F 23 17 75 39 84 58 39 + : 78 6B B0 C3 45 D1 65 97 6E F2 19 5E C9 B1 C3 79 + : E3 + 90 02 33: INTEGER + : 00 98 91 5E 7E C8 26 5E DF CD A3 1E 88 F2 48 09 + + + +Popov, et al. Informational [Page 34] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + : DD B0 64 BD C7 28 5D D5 0D 72 89 F0 AC 6F 49 DD + : 2D + 125 02 65: INTEGER + : 00 9E 96 03 15 00 C8 77 4A 86 95 82 D4 AF DE 21 + : 27 AF AD 25 38 B4 B6 27 0A 6F 7C 88 37 B5 0D 50 + : F2 06 75 59 84 A4 9E 50 93 04 D6 48 BE 2A B5 AA + : B1 8E BE 2C D4 6A C3 D8 49 5B 14 2A A6 CE 23 E2 + : 1C + 192 30 22: SEQUENCE { + 194 06 7: OBJECT IDENTIFIER id-GostR3410-94-a + 203 30 11: SEQUENCE { + 205 02 2: INTEGER 24265 + 209 02 2: INTEGER 29505 + 213 02 1: INTEGER 2 + : } + : } + : } + : } + 216 30 342: SEQUENCE { + 220 06 7: OBJECT IDENTIFIER + : id-GostR3410-94-CryptoPro-A-ParamSet + 229 30 329: SEQUENCE { + 233 02 2: INTEGER 1024 + 237 02 129: INTEGER + : 00 B4 E2 5E FB 01 8E 3C 8B 87 50 5E 2A 67 55 3C + : 5E DC 56 C2 91 4B 7E 4F 89 D2 3F 03 F0 33 77 E7 + : 0A 29 03 48 9D D6 0E 78 41 8D 3D 85 1E DB 53 17 + : C4 87 1E 40 B0 42 28 C3 B7 90 29 63 C4 B7 D8 5D + : 52 B9 AA 88 F2 AF DB EB 28 DA 88 69 D6 DF 84 6A + : 1D 98 92 4E 92 55 61 BD 69 30 0B 9D DD 05 D2 47 + : B5 92 2D 96 7C BB 02 67 18 81 C5 7D 10 E5 EF 72 + : D3 E6 DA D4 22 3D C8 2A A1 F7 D0 29 46 51 A4 80 + : DF + 369 02 33: INTEGER + : 00 97 24 32 A4 37 17 8B 30 BD 96 19 5B 77 37 89 + : AB 2F FF 15 59 4B 17 6D D1 75 B6 32 56 EE 5A F2 + : CF + 404 02 129: INTEGER + : 00 8F D3 67 31 23 76 54 BB E4 1F 5F 1F 84 53 E7 + : 1C A4 14 FF C2 2C 25 D9 15 30 9E 5D 2E 62 A2 A2 + : 6C 71 11 F3 FC 79 56 8D AF A0 28 04 2F E1 A5 2A + : 04 89 80 5C 0D E9 A1 A4 69 C8 44 C7 CA BB EE 62 + : 5C 30 78 88 8C 1D 85 EE A8 83 F1 AD 5B C4 E6 77 + : 6E 8E 1A 07 50 91 2D F6 4F 79 95 64 99 F1 E1 82 + : 47 5B 0B 60 E2 63 2A DC D8 CF 94 E9 C5 4F D1 F3 + : B1 09 D8 1F 00 BF 2A B8 CB 86 2A DF 7D 40 B9 36 + : 9A + 536 30 24: SEQUENCE { + + + +Popov, et al. Informational [Page 35] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + 538 06 7: OBJECT IDENTIFIER id-GostR3410-94-bBis + 547 30 13: SEQUENCE { + 549 02 4: INTEGER 1376285941 + 555 02 5: INTEGER + : 00 EE 39 AD B3 + : } + : } + : } + : } + 562 30 427: SEQUENCE { + 566 06 7: OBJECT IDENTIFIER + : id-GostR3410-94-CryptoPro-B-ParamSet + 575 30 414: SEQUENCE { + 579 02 2: INTEGER 1024 + 583 02 129: INTEGER + : 00 C6 97 1F C5 75 24 B3 0C 90 18 C5 E6 21 DE 15 + : 49 97 36 85 4F 56 A6 F8 AE E6 5A 7A 40 46 32 B1 + : BC F0 34 9F FC AF CB 0A 10 31 77 97 1F C1 61 2A + : DC DB 8C 8C C9 38 C7 02 25 C8 FD 12 AF F0 1B 1D + : 06 4E 0A D6 FD E6 AB 91 59 16 6C B9 F2 FC 17 1D + : 92 F0 CC 7B 6A 6B 2C D7 FA 34 2A CB E2 C9 31 5A + : 42 D5 76 B1 EC CE 77 A9 63 15 7F 3D 0B D9 6A 8E + : B0 B0 F3 50 2A D2 38 10 1B 05 11 63 34 F1 E5 B7 + : AB + 715 02 33: INTEGER + : 00 B0 9D 63 4C 10 89 9C D7 D4 C3 A7 65 74 03 E0 + : 58 10 B0 7C 61 A6 88 BA B2 C3 7F 47 5E 30 8B 06 + : 07 + 750 02 128: INTEGER + : 3D 26 B4 67 D9 4A 3F FC 9D 71 BF 8D B8 93 40 84 + : 13 72 64 F3 C2 E9 EB 16 DC A2 14 B8 BC 7C 87 24 + : 85 33 67 44 93 4F D2 EF 59 43 F9 ED 0B 74 5B 90 + : AA 3E C8 D7 0C DC 91 68 24 78 B6 64 A2 E1 F8 FB + : 56 CE F2 97 2F EE 7E DB 08 4A F7 46 41 9B 85 4F + : AD 02 CC 3E 36 46 FF 2E 1A 18 DD 4B EB 3C 44 F7 + : F2 74 55 88 02 96 49 67 45 46 CC 91 87 C2 07 FB + : 8F 2C EC E8 E2 29 3F 68 39 5C 47 04 AF 04 BA B5 + 881 30 110: SEQUENCE { + 883 06 7: OBJECT IDENTIFIER id-GostR3410-94-bBis + 892 30 99: SEQUENCE { + 894 02 4: INTEGER 1536654555 + 900 02 4: INTEGER 1855361757 + 906 02 85: INTEGER + : 00 BC 3C BB DB 7E 6F 84 82 86 E1 9A D9 A2 7A 8E + : 29 7E 5B 71 C5 3D D9 74 CD F6 0F 93 73 56 DF 69 + : CB C9 7A 30 0C CC 71 68 5C 55 30 46 14 7F 11 56 + : 8C 4F DD F3 63 D9 D8 86 43 83 45 A6 2C 3B 75 96 + : 3D 65 46 AD FA BF 31 B3 12 90 D1 2C AE 65 EC B8 + + + +Popov, et al. Informational [Page 36] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + : 30 9E F6 67 82 + : } + : } + : } + : } + 993 30 351: SEQUENCE { + 997 06 7: OBJECT IDENTIFIER + : id-GostR3410-94-CryptoPro-C-ParamSet + 1006 30 338: SEQUENCE { + 1010 02 2: INTEGER 1024 + 1014 02 129: INTEGER + : 00 9D 88 E6 D7 FE 33 13 BD 2E 74 5C 7C DD 2A B9 + : EE 4A F3 C8 89 9E 84 7D E7 4A 33 78 3E A6 8B C3 + : 05 88 BA 1F 73 8C 6A AF 8A B3 50 53 1F 18 54 C3 + : 83 7C C3 C8 60 FF D7 E2 E1 06 C3 F6 3B 3D 8A 4C + : 03 4C E7 39 42 A6 C3 D5 85 B5 99 CF 69 5E D7 A3 + : C4 A9 3B 2B 94 7B 71 57 BB 1A 1C 04 3A B4 1E C8 + : 56 6C 61 45 E9 38 A6 11 90 6D E0 D3 2E 56 24 94 + : 56 9D 7E 99 9A 0D DA 5C 87 9B DD 91 FE 12 4D F1 + : E9 + 1146 02 33: INTEGER + : 00 FA DD 19 7A BD 19 A1 B4 65 3E EC F7 EC A4 D6 + : A2 2B 1F 7F 89 3B 64 1F 90 16 41 FB B5 55 35 4F + : AF + 1181 02 128: INTEGER + : 74 47 ED 71 56 31 05 99 07 0B 12 60 99 47 A5 C8 + : C8 A8 62 5C F1 CF 25 2B 40 7B 33 1F 93 D6 39 DD + : D1 BA 39 26 56 DE CA 99 2D D0 35 35 43 29 A1 E9 + : 5A 6E 32 D6 F4 78 82 D9 60 B8 F1 0A CA FF 79 6D + : 13 CD 96 11 F8 53 DA B6 D2 62 34 83 E4 67 88 70 + : 84 93 93 7A 1A 29 44 25 98 AE C2 E0 74 20 22 56 + : 34 40 FE 9C 18 74 0E CE 67 65 AC 05 FA F0 24 A6 + : 4B 02 6E 7E 40 88 40 81 9E 96 2E 7E 5F 40 1A E3 + 1312 30 34: SEQUENCE { + 1314 06 7: OBJECT IDENTIFIER id-GostR3410-94-bBis + 1323 30 23: SEQUENCE { + 1325 02 4: INTEGER 1132758852 + 1331 02 5: INTEGER + : 00 B5 0A 82 6D + 1338 02 8: INTEGER + : 7F 57 5E 81 94 BC 5B DF + : } + : } + : } + : } + 1348 30 371: SEQUENCE { + 1352 06 7: OBJECT IDENTIFIER + : id-GostR3410-94-CryptoPro-D-ParamSet + + + +Popov, et al. Informational [Page 37] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + 1361 30 358: SEQUENCE { + 1365 02 2: INTEGER 1024 + 1369 02 129: INTEGER + : 00 80 F1 02 D3 2B 0F D1 67 D0 69 C2 7A 30 7A DA + : D2 C4 66 09 19 04 DB AA 55 D5 B8 CC 70 26 F2 F7 + : A1 91 9B 89 0C B6 52 C4 0E 05 4E 1E 93 06 73 5B + : 43 D7 B2 79 ED DF 91 02 00 1C D9 E1 A8 31 FE 8A + : 16 3E ED 89 AB 07 CF 2A BE 82 42 AC 9D ED DD BF + : 98 D6 2C DD D1 EA 4F 5F 15 D3 A4 2A 66 77 BD D2 + : 93 B2 42 60 C0 F2 7C 0F 1D 15 94 86 14 D5 67 B6 + : 6F A9 02 BA A1 1A 69 AE 3B CE AD BB 83 E3 99 C9 + : B5 + 1501 02 33: INTEGER + : 00 F0 F5 44 C4 18 AA C2 34 F6 83 F0 33 51 1B 65 + : C2 16 51 A6 07 8B DA 2D 69 BB 9F 73 28 67 50 21 + : 49 + 1536 02 128: INTEGER + : 6B CC 0B 4F AD B3 88 9C 1E 06 AD D2 3C C0 9B 8A + : B6 EC DE DF 73 F0 46 32 59 5E E4 25 00 05 D6 AF + : 5F 5A DE 44 CB 1E 26 E6 26 3C 67 23 47 CF A2 6F + : 9E 93 93 68 1E 6B 75 97 33 78 4C DE 5D BD 9A 14 + : A3 93 69 DF D9 9F A8 5C C0 D1 02 41 C4 01 03 43 + : F3 4A 91 39 3A 70 6C F1 26 77 CB FA 1F 57 8D 6B + : 6C FB E8 A1 24 2C FC C9 4B 3B 65 3A 47 6E 14 5E + : 38 62 C1 8C C3 FE D8 25 7C FE F7 4C DB 20 5B F1 + 1667 30 54: SEQUENCE { + 1669 06 7: OBJECT IDENTIFIER id-GostR3410-94-bBis + 1678 30 43: SEQUENCE { + 1680 02 4: INTEGER 333089693 + 1686 02 5: INTEGER + : 00 A0 E9 DE 4B + 1693 02 28: INTEGER + : 41 AB 97 85 7F 42 61 43 55 D3 2D B0 B1 06 9F 10 + : 9A 4D A2 83 67 6C 7C 53 A6 81 85 B4 + : } + : } + : } + : } + 1723 30 396: SEQUENCE { + 1727 06 7: OBJECT IDENTIFIER + : id-GostR3410-94-CryptoPro-XchA-ParamSet + 1736 30 383: SEQUENCE { + 1740 02 2: INTEGER 1024 + 1744 02 129: INTEGER + : 00 CA 3B 3F 2E EE 9F D4 63 17 D4 95 95 A9 E7 51 + : 8E 6C 63 D8 F4 EB 4D 22 D1 0D 28 AF 0B 88 39 F0 + : 79 F8 28 9E 60 3B 03 53 07 84 B9 BB 5A 1E 76 85 + : 9E 48 50 C6 70 C7 B7 1C 0D F8 4C A3 E0 D6 C1 77 + + + +Popov, et al. Informational [Page 38] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + : FE 9F 78 A9 D8 43 32 30 A8 83 CD 82 A2 B2 B5 C7 + : A3 30 69 80 27 85 70 CD B7 9B F0 10 74 A6 9C 96 + : 23 34 88 24 B0 C5 37 91 D5 3C 6A 78 CA B6 9E 1C + : FB 28 36 86 11 A3 97 F5 0F 54 1E 16 DB 34 8D BE + : 5F + 1876 02 33: INTEGER + : 00 CA E4 D8 5F 80 C1 47 70 4B 0C A4 8E 85 FB 00 + : A9 05 7A A4 AC C4 46 68 E1 7F 19 96 D7 15 26 90 + : D9 + 1911 02 129: INTEGER + : 00 BE 27 D6 52 F2 F1 E3 39 DA 73 42 11 B8 5B 06 + : AE 4D E2 36 AA 8F BE EB 3F 1A DC C5 2C D4 38 53 + : 77 7E 83 4A 6A 51 81 38 67 8A 8A DB D3 A5 5C 70 + : A7 EA B1 BA 7A 07 19 54 86 77 AA F4 E6 09 FF B4 + : 7F 6B 9D 7E 45 B0 D0 6D 83 D7 AD C5 33 10 AB D8 + : 57 83 E7 31 7F 7E C7 32 68 B6 A9 C0 8D 26 0B 85 + : D8 48 56 96 CA 39 C1 7B 17 F0 44 D1 E0 50 48 90 + : 36 AB D3 81 C5 E6 BF 82 BA 35 2A 1A FF 13 66 01 + : AF + 2043 30 78: SEQUENCE { + 2045 06 7: OBJECT IDENTIFIER id-GostR3410-94-bBis + 2054 30 67: SEQUENCE { + 2056 02 5: INTEGER + : 00 D0 5E 9F 14 + 2063 02 4: INTEGER 1177570399 + 2069 02 52: INTEGER + : 35 AB 87 53 99 CD A3 3C 14 6C A6 29 66 0E 5A 5E + : 5C 07 71 4C A3 26 DB 03 2D D6 75 19 95 CD B9 0A + : 61 2B 92 28 93 2D 83 02 70 4E C2 4A 5D EF 77 39 + : C5 81 3D 83 + : } + : } + : } + : } + 2123 30 375: SEQUENCE { + 2127 06 7: OBJECT IDENTIFIER + : id-GostR3410-94-CryptoPro-XchB-ParamSet + 2136 30 362: SEQUENCE { + 2140 02 2: INTEGER 1024 + 2144 02 129: INTEGER + : 00 92 86 DB DA 91 EC CF C3 06 0A A5 59 83 18 E2 + : A6 39 F5 BA 90 A4 CA 65 61 57 B2 67 3F B1 91 CD + : 05 89 EE 05 F4 CE F1 BD 13 50 84 08 27 14 58 C3 + : 08 51 CE 7A 4E F5 34 74 2B FB 11 F4 74 3C 8F 78 + : 7B 11 19 3B A3 04 C0 E6 BC A2 57 01 BF 88 AF 1C + : B9 B8 FD 47 11 D8 9F 88 E3 2B 37 D9 53 16 54 1B + : F1 E5 DB B4 98 9B 3D F1 36 59 B8 8C 0F 97 A3 C1 + : 08 7B 9F 2D 53 17 D5 57 DC D4 AF C6 D0 A7 54 E2 + + + +Popov, et al. Informational [Page 39] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + : 79 + 2276 02 33: INTEGER + : 00 C9 66 E9 B3 B8 B7 CD D8 2F F0 F8 3A F8 70 36 + : C3 8F 42 23 8E C5 0A 87 6C D3 90 E4 3D 67 B6 01 + : 3F + 2311 02 128: INTEGER + : 7E 9C 30 96 67 6F 51 E3 B2 F9 88 4C F0 AC 21 56 + : 77 94 96 F4 10 E0 49 CE D7 E5 3D 8B 7B 5B 36 6B + : 1A 60 08 E5 19 66 05 A5 5E 89 C3 19 0D AB F8 0B + : 9F 11 63 C9 79 FC D1 83 28 DA E5 E9 04 88 11 B3 + : 70 10 7B B7 71 5F 82 09 1B B9 DE 0E 33 EE 2F ED + : 62 55 47 4F 87 69 FC E5 EA FA EE F1 CB 5A 32 E0 + : D5 C6 C2 F0 FC 0B 34 47 07 29 47 F5 B4 C3 87 66 + : 69 93 A3 33 FC 06 56 8E 53 4A D5 6D 23 38 D7 29 + 2442 30 58: SEQUENCE { + 2444 06 7: OBJECT IDENTIFIER id-GostR3410-94-bBis + 2453 30 47: SEQUENCE { + 2455 02 4: INTEGER 2046851076 + 2461 02 5: INTEGER + : 00 D3 1A 4F F7 + 2468 02 32: INTEGER + : 7E C1 23 D1 61 47 77 62 83 8C 2B EA 9D BD F3 30 + : 74 AF 6D 41 D1 08 A0 66 A1 E7 A0 7A B3 04 8D E2 + : } + : } + : } + : } + 2502 30 380: SEQUENCE { + 2506 06 7: OBJECT IDENTIFIER + : id-GostR3410-94-CryptoPro-XchC-ParamSet + 2515 30 367: SEQUENCE { + 2519 02 2: INTEGER 1024 + 2523 02 129: INTEGER + : 00 B1 94 03 6A CE 14 13 9D 36 D6 42 95 AE 6C 50 + : FC 4B 7D 65 D8 B3 40 71 13 66 CA 93 F3 83 65 39 + : 08 EE 63 7B E4 28 05 1D 86 61 26 70 AD 7B 40 2C + : 09 B8 20 FA 77 D9 DA 29 C8 11 1A 84 96 DA 6C 26 + : 1A 53 ED 25 2E 4D 8A 69 A2 03 76 E6 AD DB 3B DC + : D3 31 74 9A 49 1A 18 4B 8F DA 6D 84 C3 1C F0 5F + : 91 19 B5 ED 35 24 6E A4 56 2D 85 92 8B A1 13 6A + : 8D 0E 5A 7E 5C 76 4B A8 90 20 29 A1 33 6C 63 1A + : 1D + 2655 02 33: INTEGER + : 00 96 12 04 77 DF 0F 38 96 62 8E 6F 4A 88 D8 3C + : 93 20 4C 21 0F F2 62 BC CB 7D AE 45 03 55 12 52 + : 59 + 2690 02 128: INTEGER + : 3F 18 17 05 2B AA 75 98 FE 3E 4F 4F C5 C5 F6 16 + + + +Popov, et al. Informational [Page 40] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + : E1 22 CF F9 EB D8 9E F8 1D C7 CE 8B F5 6C C6 4B + : 43 58 6C 80 F1 C4 F5 6D D5 71 8F DD 76 30 0B E3 + : 36 78 42 59 CA 25 AA DE 5A 48 3F 64 C0 2A 20 CF + : 4A 10 F9 C1 89 C4 33 DE FE 31 D2 63 E6 C9 76 46 + : 60 A7 31 EC CA EC B7 4C 82 79 30 37 31 E8 CF 69 + : 20 5B C7 3E 5A 70 BD F9 3E 5B B6 81 DA B4 EE B9 + : C7 33 CA AB 2F 67 3C 47 5E 0E CA 92 1D 29 78 2E + 2821 30 63: SEQUENCE { + 2823 06 7: OBJECT IDENTIFIER id-GostR3410-94-bBis + 2832 30 52: SEQUENCE { + 2834 02 4: INTEGER 371898640 + 2840 02 5: INTEGER + : 00 93 F8 28 D3 + 2847 02 37: INTEGER + : 00 CA 82 CC E7 8A 73 8B C4 6F 10 3D 53 B9 BF 80 + : 97 45 EC 84 5E 4F 6D A4 62 60 6C 51 F6 0E CF 30 + : 2E 31 20 4B 81 + : } + : } + : } + : } + : } + + |>GostR3410-94-ParamSetParameters.bin + |MIILQjCB0QYHKoUDAgIgADCBxQICAgACQQDugXKuiZZgj7aTWbieuCpphUUQ4pd6 + |TWO8lzIs5dwzhuoKErND6RkPIxd1OYRYOXhrsMNF0WWXbvIZXsmxw3njAiEAmJFe + |fsgmXt/Nox6I8kgJ3bBkvccoXdUNconwrG9J3S0CQQCelgMVAMh3SoaVgtSv3iEn + |r60lOLS2JwpvfIg3tQ1Q8gZ1WYSknlCTBNZIviq1qrGOvizUasPYSVsUKqbOI+Ic + |MBYGByqFAwICFAEwCwICXskCAnNBAgECMIIBVgYHKoUDAgIgAjCCAUkCAgQAAoGB + |ALTiXvsBjjyLh1BeKmdVPF7cVsKRS35PidI/A/Azd+cKKQNIndYOeEGNPYUe21MX + |xIceQLBCKMO3kCljxLfYXVK5qojyr9vrKNqIadbfhGodmJJOklVhvWkwC53dBdJH + |tZItlny7AmcYgcV9EOXvctPm2tQiPcgqoffQKUZRpIDfAiEAlyQypDcXizC9lhlb + |dzeJqy//FVlLF23RdbYyVu5a8s8CgYEAj9NnMSN2VLvkH18fhFPnHKQU/8IsJdkV + |MJ5dLmKiomxxEfP8eVaNr6AoBC/hpSoEiYBcDemhpGnIRMfKu+5iXDB4iIwdhe6o + |g/GtW8Tmd26OGgdQkS32T3mVZJnx4YJHWwtg4mMq3NjPlOnFT9HzsQnYHwC/KrjL + |hirffUC5NpowGAYHKoUDAgIUBDANAgRSCHT1AgUA7jmtszCCAasGByqFAwICIAMw + |ggGeAgIEAAKBgQDGlx/FdSSzDJAYxeYh3hVJlzaFT1am+K7mWnpARjKxvPA0n/yv + |ywoQMXeXH8FhKtzbjIzJOMcCJcj9Eq/wGx0GTgrW/earkVkWbLny/BcdkvDMe2pr + |LNf6NCrL4skxWkLVdrHsznepYxV/PQvZao6wsPNQKtI4EBsFEWM08eW3qwIhALCd + |Y0wQiZzX1MOnZXQD4FgQsHxhpoi6ssN/R14wiwYHAoGAPSa0Z9lKP/ydcb+NuJNA + |hBNyZPPC6esW3KIUuLx8hySFM2dEk0/S71lD+e0LdFuQqj7I1wzckWgkeLZkouH4 + |+1bO8pcv7n7bCEr3RkGbhU+tAsw+Nkb/LhoY3UvrPET38nRViAKWSWdFRsyRh8IH + |+48s7OjiKT9oOVxHBK8EurUwbgYHKoUDAgIUBDBjAgRbl3zbAgRulpLdAlUAvDy7 + |235vhIKG4ZrZonqOKX5bccU92XTN9g+Tc1bfacvJejAMzHFoXFUwRhR/EVaMT93z + |Y9nYhkODRaYsO3WWPWVGrfq/MbMSkNEsrmXsuDCe9meCMIIBXwYHKoUDAgIgBDCC + |AVICAgQAAoGBAJ2I5tf+MxO9LnRcfN0que5K88iJnoR950ozeD6mi8MFiLofc4xq + |r4qzUFMfGFTDg3zDyGD/1+LhBsP2Oz2KTANM5zlCpsPVhbWZz2le16PEqTsrlHtx + |V7saHAQ6tB7IVmxhRek4phGQbeDTLlYklFadfpmaDdpch5vdkf4STfHpAiEA+t0Z + + + +Popov, et al. Informational [Page 41] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + |er0ZobRlPuz37KTWoisff4k7ZB+QFkH7tVU1T68CgYB0R+1xVjEFmQcLEmCZR6XI + |yKhiXPHPJStAezMfk9Y53dG6OSZW3sqZLdA1NUMpoelabjLW9HiC2WC48QrK/3lt + |E82WEfhT2rbSYjSD5GeIcISTk3oaKUQlmK7C4HQgIlY0QP6cGHQOzmdlrAX68CSm + |SwJufkCIQIGeli5+X0Aa4zAiBgcqhQMCAhQEMBcCBEOEh0QCBQC1CoJtAgh/V16B + |lLxb3zCCAXMGByqFAwICIAUwggFmAgIEAAKBgQCA8QLTKw/RZ9BpwnowetrSxGYJ + |GQTbqlXVuMxwJvL3oZGbiQy2UsQOBU4ekwZzW0PXsnnt35ECABzZ4agx/ooWPu2J + |qwfPKr6CQqyd7d2/mNYs3dHqT18V06QqZne90pOyQmDA8nwPHRWUhhTVZ7ZvqQK6 + |oRpprjvOrbuD45nJtQIhAPD1RMQYqsI09oPwM1EbZcIWUaYHi9otabufcyhnUCFJ + |AoGAa8wLT62ziJweBq3SPMCbirbs3t9z8EYyWV7kJQAF1q9fWt5Eyx4m5iY8ZyNH + |z6JvnpOTaB5rdZczeEzeXb2aFKOTad/Zn6hcwNECQcQBA0PzSpE5OnBs8SZ3y/of + |V41rbPvooSQs/MlLO2U6R24UXjhiwYzD/tglfP73TNsgW/EwNgYHKoUDAgIUBDAr + |AgQT2oudAgUAoOneSwIcQauXhX9CYUNV0y2wsQafEJpNooNnbHxTpoGFtDCCAYwG + |ByqFAwICIQEwggF/AgIEAAKBgQDKOz8u7p/UYxfUlZWp51GObGPY9OtNItENKK8L + |iDnwefgonmA7A1MHhLm7Wh52hZ5IUMZwx7ccDfhMo+DWwXf+n3ip2EMyMKiDzYKi + |srXHozBpgCeFcM23m/AQdKacliM0iCSwxTeR1TxqeMq2nhz7KDaGEaOX9Q9UHhbb + |NI2+XwIhAMrk2F+AwUdwSwykjoX7AKkFeqSsxEZo4X8ZltcVJpDZAoGBAL4n1lLy + |8eM52nNCEbhbBq5N4jaqj77rPxrcxSzUOFN3foNKalGBOGeKitvTpVxwp+qxunoH + |GVSGd6r05gn/tH9rnX5FsNBtg9etxTMQq9hXg+cxf37HMmi2qcCNJguF2EhWlso5 + |wXsX8ETR4FBIkDar04HF5r+CujUqGv8TZgGvME4GByqFAwICFAQwQwIFANBenxQC + |BEYwTF8CNDWrh1OZzaM8FGymKWYOWl5cB3FMoybbAy3WdRmVzbkKYSuSKJMtgwJw + |TsJKXe93OcWBPYMwggF3BgcqhQMCAiECMIIBagICBAACgYEAkobb2pHsz8MGCqVZ + |gxjipjn1upCkymVhV7JnP7GRzQWJ7gX0zvG9E1CECCcUWMMIUc56TvU0dCv7EfR0 + |PI94exEZO6MEwOa8olcBv4ivHLm4/UcR2J+I4ys32VMWVBvx5du0mJs98TZZuIwP + |l6PBCHufLVMX1Vfc1K/G0KdU4nkCIQDJZumzuLfN2C/w+Dr4cDbDj0IjjsUKh2zT + |kOQ9Z7YBPwKBgH6cMJZnb1HjsvmITPCsIVZ3lJb0EOBJztflPYt7WzZrGmAI5Rlm + |BaVeicMZDav4C58RY8l5/NGDKNrl6QSIEbNwEHu3cV+CCRu53g4z7i/tYlVHT4dp + |/OXq+u7xy1oy4NXGwvD8CzRHBylH9bTDh2Zpk6Mz/AZWjlNK1W0jONcpMDoGByqF + |AwICFAQwLwIEegB4BAIFANMaT/cCIH7BI9FhR3dig4wr6p298zB0r21B0QigZqHn + |oHqzBI3iMIIBfAYHKoUDAgIhAzCCAW8CAgQAAoGBALGUA2rOFBOdNtZCla5sUPxL + |fWXYs0BxE2bKk/ODZTkI7mN75CgFHYZhJnCte0AsCbgg+nfZ2inIERqEltpsJhpT + |7SUuTYppogN25q3bO9zTMXSaSRoYS4/abYTDHPBfkRm17TUkbqRWLYWSi6ETao0O + |Wn5cdkuokCApoTNsYxodAiEAlhIEd98POJZijm9KiNg8kyBMIQ/yYrzLfa5FA1US + |UlkCgYA/GBcFK6p1mP4+T0/FxfYW4SLP+evYnvgdx86L9WzGS0NYbIDxxPVt1XGP + |3XYwC+M2eEJZyiWq3lpIP2TAKiDPShD5wYnEM97+MdJj5sl2RmCnMezK7LdMgnkw + |NzHoz2kgW8c+WnC9+T5btoHatO65xzPKqy9nPEdeDsqSHSl4LjA/BgcqhQMCAhQE + |MDQCBBYquRACBQCT+CjTAiUAyoLM54pzi8RvED1Tub+Al0XshF5PbaRiYGxR9g7P + |MC4xIEuB + |<GostR3410-94-ParamSetParameters.bin + +11.4. GOST R 34.10-2001 Public Key Algorithm Parameters + + For each AlgorithmIdentifier in this sequence, the parameters field + contains GostR3410-2001-ParamSetParameters. + + 0 30 998: SEQUENCE { + 4 30 156: SEQUENCE { + 7 06 7: OBJECT IDENTIFIER + : id-GostR3410-2001-TestParamSet + + + +Popov, et al. Informational [Page 42] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + 16 30 144: SEQUENCE { + 19 02 1: INTEGER 7 + 22 02 32: INTEGER + : 5F BF F4 98 AA 93 8C E7 39 B8 E0 22 FB AF EF 40 + : 56 3F 6E 6A 34 72 FC 2A 51 4C 0C E9 DA E2 3B 7E + 56 02 33: INTEGER + : 00 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 + : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 + : 31 + 91 02 33: INTEGER + : 00 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 + : 01 50 FE 8A 18 92 97 61 54 C5 9C FC 19 3A CC F5 + : B3 + 126 02 1: INTEGER 2 + 129 02 32: INTEGER + : 08 E2 A8 A0 E6 51 47 D4 BD 63 16 03 0E 16 D1 9C + : 85 C9 7F 0A 9C A2 67 12 2B 96 AB BC EA 7E 8F C8 + : } + : } + 163 30 159: SEQUENCE { + 166 06 7: OBJECT IDENTIFIER + : id-GostR3410-2001-CryptoPro-A-ParamSet + 175 30 147: SEQUENCE { + 178 02 33: INTEGER + : 00 FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF + : FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FD + : 94 + 213 02 2: INTEGER 166 + 217 02 33: INTEGER + : 00 FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF + : FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FD + : 97 + 252 02 33: INTEGER + : 00 FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF + : FF 6C 61 10 70 99 5A D1 00 45 84 1B 09 B7 61 B8 + : 93 + 287 02 1: INTEGER 1 + 290 02 33: INTEGER + : 00 8D 91 E4 71 E0 98 9C DA 27 DF 50 5A 45 3F 2B + : 76 35 29 4F 2D DF 23 E3 B1 22 AC C9 9C 9E 9F 1E + : 14 + : } + : } + 325 30 188: SEQUENCE { + 328 06 7: OBJECT IDENTIFIER + : id-GostR3410-2001-CryptoPro-B-ParamSet + 337 30 176: SEQUENCE { + 340 02 33: INTEGER + + + +Popov, et al. Informational [Page 43] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + : 00 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 + : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0C + : 96 + 375 02 32: INTEGER + : 3E 1A F4 19 A2 69 A5 F8 66 A7 D3 C2 5C 3D F8 0A + : E9 79 25 93 73 FF 2B 18 2F 49 D4 CE 7E 1B BC 8B + 409 02 33: INTEGER + : 00 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 + : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0C + : 99 + 444 02 33: INTEGER + : 00 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 + : 01 5F 70 0C FF F1 A6 24 E5 E4 97 16 1B CC 8A 19 + : 8F + 479 02 1: INTEGER 1 + 482 02 32: INTEGER + : 3F A8 12 43 59 F9 66 80 B8 3D 1C 3E B2 C0 70 E5 + : C5 45 C9 85 8D 03 EC FB 74 4B F8 D7 17 71 7E FC + : } + : } + 516 30 159: SEQUENCE { + 519 06 7: OBJECT IDENTIFIER + : id-GostR3410-2001-CryptoPro-C-ParamSet + 528 30 147: SEQUENCE { + 531 02 33: INTEGER + : 00 9B 9F 60 5F 5A 85 81 07 AB 1E C8 5E 6B 41 C8 + : AA CF 84 6E 86 78 90 51 D3 79 98 F7 B9 02 2D 75 + : 98 + 566 02 3: INTEGER 32858 + 571 02 33: INTEGER + : 00 9B 9F 60 5F 5A 85 81 07 AB 1E C8 5E 6B 41 C8 + : AA CF 84 6E 86 78 90 51 D3 79 98 F7 B9 02 2D 75 + : 9B + 606 02 33: INTEGER + : 00 9B 9F 60 5F 5A 85 81 07 AB 1E C8 5E 6B 41 C8 + : AA 58 2C A3 51 1E DD FB 74 F0 2F 3A 65 98 98 0B + : B9 + 641 02 1: INTEGER 0 + 644 02 32: INTEGER + : 41 EC E5 57 43 71 1A 8C 3C BF 37 83 CD 08 C0 EE + : 4D 4D C4 40 D4 64 1A 8F 36 6E 55 0D FD B3 BB 67 + : } + : } + 678 30 159: SEQUENCE { + 681 06 7: OBJECT IDENTIFIER + : id-GostR3410-2001-CryptoPro-XchA-ParamSet + 690 30 147: SEQUENCE { + 693 02 33: INTEGER + + + +Popov, et al. Informational [Page 44] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + : 00 FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF + : FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FD + : 94 + 728 02 2: INTEGER 166 + 732 02 33: INTEGER + : 00 FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF + : FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FD + : 97 + 767 02 33: INTEGER + : 00 FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF + : FF 6C 61 10 70 99 5A D1 00 45 84 1B 09 B7 61 B8 + : 93 + 802 02 1: INTEGER 1 + 805 02 33: INTEGER + : 00 8D 91 E4 71 E0 98 9C DA 27 DF 50 5A 45 3F 2B + : 76 35 29 4F 2D DF 23 E3 B1 22 AC C9 9C 9E 9F 1E + : 14 + : } + : } + 840 30 159: SEQUENCE { + 843 06 7: OBJECT IDENTIFIER + : id-GostR3410-2001-CryptoPro-XchB-ParamSet + 852 30 147: SEQUENCE { + 855 02 33: INTEGER + : 00 9B 9F 60 5F 5A 85 81 07 AB 1E C8 5E 6B 41 C8 + : AA CF 84 6E 86 78 90 51 D3 79 98 F7 B9 02 2D 75 + : 98 + 890 02 3: INTEGER 32858 + 895 02 33: INTEGER + : 00 9B 9F 60 5F 5A 85 81 07 AB 1E C8 5E 6B 41 C8 + : AA CF 84 6E 86 78 90 51 D3 79 98 F7 B9 02 2D 75 + : 9B + 930 02 33: INTEGER + : 00 9B 9F 60 5F 5A 85 81 07 AB 1E C8 5E 6B 41 C8 + : AA 58 2C A3 51 1E DD FB 74 F0 2F 3A 65 98 98 0B + : B9 + 965 02 1: INTEGER 0 + 968 02 32: INTEGER + : 41 EC E5 57 43 71 1A 8C 3C BF 37 83 CD 08 C0 EE + : 4D 4D C4 40 D4 64 1A 8F 36 6E 55 0D FD B3 BB 67 + : } + : } + : } + + |>GostR3410-2001-ParamSetParameters.bin + |MIID5jCBnAYHKoUDAgIjADCBkAIBBwIgX7/0mKqTjOc5uOAi+6/vQFY/bmo0cvwq + |UUwM6driO34CIQCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEMQIhAIAA + |AAAAAAAAAAAAAAAAAAFQ/ooYkpdhVMWc/Bk6zPWzAgECAiAI4qig5lFH1L1jFgMO + + + +Popov, et al. Informational [Page 45] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + |FtGchcl/CpyiZxIrlqu86n6PyDCBnwYHKoUDAgIjATCBkwIhAP////////////// + |//////////////////////////2UAgIApgIhAP////////////////////////// + |//////////////2XAiEA/////////////////////2xhEHCZWtEARYQbCbdhuJMC + |AQECIQCNkeRx4Jic2iffUFpFPyt2NSlPLd8j47EirMmcnp8eFDCBvAYHKoUDAgIj + |AjCBsAIhAIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAyWAiA+GvQZomml + |+Gan08JcPfgK6Xklk3P/KxgvSdTOfhu8iwIhAIAAAAAAAAAAAAAAAAAAAAAAAAAA + |AAAAAAAAAAAAAAyZAiEAgAAAAAAAAAAAAAAAAAAAAV9wDP/xpiTl5JcWG8yKGY8C + |AQECID+oEkNZ+WaAuD0cPrLAcOXFRcmFjQPs+3RL+NcXcX78MIGfBgcqhQMCAiMD + |MIGTAiEAm59gX1qFgQerHshea0HIqs+EboZ4kFHTeZj3uQItdZgCAwCAWgIhAJuf + |YF9ahYEHqx7IXmtByKrPhG6GeJBR03mY97kCLXWbAiEAm59gX1qFgQerHshea0HI + |qlgso1Ee3ft08C86ZZiYC7kCAQACIEHs5VdDcRqMPL83g80IwO5NTcRA1GQajzZu + |VQ39s7tnMIGfBgcqhQMCAiQAMIGTAiEA//////////////////////////////// + |/////////ZQCAgCmAiEA/////////////////////////////////////////ZcC + |IQD/////////////////////bGEQcJla0QBFhBsJt2G4kwIBAQIhAI2R5HHgmJza + |J99QWkU/K3Y1KU8t3yPjsSKsyZyenx4UMIGfBgcqhQMCAiQBMIGTAiEAm59gX1qF + |gQerHshea0HIqs+EboZ4kFHTeZj3uQItdZgCAwCAWgIhAJufYF9ahYEHqx7IXmtB + |yKrPhG6GeJBR03mY97kCLXWbAiEAm59gX1qFgQerHshea0HIqlgso1Ee3ft08C86 + |ZZiYC7kCAQACIEHs5VdDcRqMPL83g80IwO5NTcRA1GQajzZuVQ39s7tn + |<GostR3410-2001-ParamSetParameters.bin + +12. Acknowledgements + + This document was created in accordance with "Russian Cryptographic + Software Compatibility Agreement", signed by FGUE STC "Atlas", + CRYPTO-PRO, Factor-TS, MD PREI, Infotecs GmbH, SPRCIS (SPbRCZI), + Cryptocom, R-Alpha. The aim of this agreement is to achieve mutual + compatibility of the products and solutions. + + The authors wish to thank the following: + + Microsoft Corporation Russia for providing information about + company products and solutions, and also for technical consulting + in PKI. + + RSA Security Russia and Demos Co Ltd for active collaboration and + critical help in creation of this document. + + Peter Gutmann for his helpful "dumpasn1" program. + + Russ Hously (Vigil Security, LLC, housley@vigilsec.com) and + Vasilij Sakharov (DEMOS Co Ltd, svp@dol.ru) for encouraging the + authors to create this document. + + Derek Atkins (IHTFP Consulting, derek@ihtfp.com) and his wife, + Heather Anne Harrison, for making the document readable. + + Grigorij Chudov for navigating the IETF process for this document. + + + + +Popov, et al. Informational [Page 46] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + This document is based on a contribution of CRYPTO-PRO Company. Any + substantial use of the text from this document must acknowledge + CRYPTO-PRO. CRYPTO-PRO requests that all material mentioning or + referencing this document identify this as "CRYPTO-PRO CPALGS". + +13. References + +13.1. Normative References + + [GOST28147] "Cryptographic Protection for Data Processing System", + GOST 28147-89, Gosudarstvennyi Standard of USSR, + Government Committee of the USSR for Standards, 1989. + (In Russian) + + [GOSTR341094] "Information technology. Cryptographic Data Security. + Produce and check procedures of Electronic Digital + Signatures based on Asymmetric Cryptographic + Algorithm.", GOST R 34.10-94, Gosudarstvennyi Standard + of Russian Federation, Government Committee of the + Russia for Standards, 1994. (In Russian) + + [GOSTR341001] "Information technology. Cryptographic data security. + Signature and verification processes of [electronic] + digital signature.", GOST R 34.10-2001, Gosudarstvennyi + Standard of Russian Federation, Government Committee of + the Russia for Standards, 2001. (In Russian) + + [GOSTR341194] "Information technology. Cryptographic Data Security. + Hashing function.", GOST R 34.11-94, Gosudarstvennyi + Standard of Russian Federation, Government Committee of + the Russia for Standards, 1994. (In Russian) + [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate + Requirement Levels", BCP 14, RFC 2119, March 1997. + + [HMAC] Krawczyk, H., Bellare, M., and R. Canetti, "HMAC: + Keyed-Hashing for Message Authentication", RFC 2104, + February 1997. + +13.2. Informative References + + [Schneier95] B. Schneier, Applied cryptography, second edition, John + Wiley & Sons, Inc., 1995. + + [RFDSL] "Russian Federal Digital Signature Law", 10 Jan 2002 N + 1-FZ + + [RFLLIC] "Russian Federal Law on Licensing of Selected Activity + Categories", 08 Aug 2001 N 128-FZ + + + +Popov, et al. Informational [Page 47] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + [CRYPTOLIC] "Russian Federal Government Regulation on Licensing of + Selected Activity Categories in Cryptography Area", 23 + Sep 2002 N 691 + + [X.660] ITU-T Recommendation X.660 Information Technology - + ASN.1 encoding rules: Specification of Basic Encoding + Rules (BER), Canonical Encoding Rules (CER) and + Distinguished Encoding Rules (DER), 1997. + + [RFC4134] Hoffman, P., "Examples of S/MIME Messages", RFC 4134, + July 2005. + + [TLS] Dierks, T. and C. Allen, "The TLS Protocol Version + 1.0", RFC 2246, January 1999. + +Authors' Addresses + + Vladimir Popov + CRYPTO-PRO + 38, Obraztsova, + Moscow, 127018, Russian Federation + + EMail: vpopov@cryptopro.ru + + + Igor Kurepkin + CRYPTO-PRO + 38, Obraztsova, + Moscow, 127018, Russian Federation + + EMail: kure@cryptopro.ru + + + Serguei Leontiev + CRYPTO-PRO + 38, Obraztsova, + Moscow, 127018, Russian Federation + + EMail: lse@cryptopro.ru + + + Grigorij Chudov + CRYPTO-PRO + 38, Obraztsova, + Moscow, 127018, Russian Federation + + EMail: chudov@cryptopro.ru + + + + +Popov, et al. Informational [Page 48] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + Alexandr Afanasiev + Factor-TS + office 711, 14, Presnenskij val, + Moscow, 123557, Russian Federation + + EMail: afa1@factor-ts.ru + + + Nikolaj Nikishin + Infotecs GmbH + p/b 35, 80-5, Leningradskij prospekt, + Moscow, 125315, Russian Federation + + EMail: nikishin@infotecs.ru + + + Boleslav Izotov + FGUE STC "Atlas" + 38, Obraztsova, + Moscow, 127018, Russian Federation + + EMail: izotov@nii.voskhod.ru + + Elena Minaeva + MD PREI + build 3, 6A, Vtoroj Troitskij per., + Moscow, Russian Federation + + EMail: evminaeva@mail.ru + + + Serguei Murugov + R-Alpha + 4/1, Raspletina, + Moscow, 123060, Russian Federation + + EMail: msm@top-cross.ru + + + Igor Ovcharenko + MD PREI + Office 600, 14, B.Novodmitrovskaya, + Moscow, Russian Federation + + EMail: igori@mo.msk.ru + + + + + + +Popov, et al. Informational [Page 49] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + + Igor Ustinov + Cryptocom + office 239, 51, Leninskij prospekt, + Moscow, 119991, Russian Federation + + EMail: igus@cryptocom.ru + + Anatolij Erkin + SPRCIS (SPbRCZI) + 1, Obrucheva, + St.Petersburg, 195220, Russian Federation + + EMail: erkin@nevsky.net + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Popov, et al. Informational [Page 50] + +RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 + + +Full Copyright Statement + + Copyright (C) The Internet Society (2006). + + This document is subject to the rights, licenses and restrictions + contained in BCP 78, and except as set forth therein, the authors + retain all their rights. + + This document and the information contained herein are provided on an + "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS + OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET + ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, + INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE + INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED + WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Intellectual Property + + The IETF takes no position regarding the validity or scope of any + Intellectual Property Rights or other rights that might be claimed to + pertain to the implementation or use of the technology described in + this document or the extent to which any license under such rights + might or might not be available; nor does it represent that it has + made any independent effort to identify any such rights. Information + on the procedures with respect to rights in RFC documents can be + found in BCP 78 and BCP 79. + + Copies of IPR disclosures made to the IETF Secretariat and any + assurances of licenses to be made available, or the result of an + attempt made to obtain a general license or permission for the use of + such proprietary rights by implementers or users of this + specification can be obtained from the IETF on-line IPR repository at + http://www.ietf.org/ipr. + + The IETF invites any interested party to bring to its attention any + copyrights, patents or patent applications, or other proprietary + rights that may cover technology that may be required to implement + this standard. Please address the information to the IETF at + ietf-ipr@ietf.org. + +Acknowledgement + + Funding for the RFC Editor function is provided by the IETF + Administrative Support Activity (IASA). + + + + + + + +Popov, et al. Informational [Page 51] + |