summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc9215.txt
blob: 15920a20d4d925b70d0913aa61fd30e1e2a7664a (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290
1291
1292
1293
1294
1295
1296
1297
1298
1299
1300
1301
1302
1303
1304
1305
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
1327
1328
1329
1330
1331
1332
1333
1334
1335
1336
1337
1338
1339
1340
1341
1342
1343
1344
1345
1346
1347
1348
1349
1350
1351
1352
1353
1354
1355
1356
1357
1358
1359
1360
1361
1362
1363
1364
1365
1366
1367
1368
1369
1370
1371
1372
1373
1374
1375
1376
1377
1378
1379
1380
1381
1382
1383
1384
1385
1386
1387
1388
1389
1390
1391
1392
1393
1394
1395
1396
1397
1398
1399
1400
1401
1402
1403
1404
1405
1406
1407
1408
1409
1410
1411
1412
1413
1414
1415
1416
1417
1418
1419
1420
1421
1422
1423
1424
1425
1426
1427
1428
1429
1430
1431
1432
1433
1434
1435
1436
1437
1438
1439
1440
1441
1442
1443
1444
1445
1446
1447
1448
1449
1450
1451
1452
1453
1454
1455
1456
1457
1458
1459
1460
1461
1462
1463
1464
1465
1466
1467
1468
1469
1470
1471
1472
1473
1474
1475
1476
1477
1478
1479
1480
1481
1482
1483
1484
1485
1486
1487
1488
1489
1490
1491
Independent Submission                                 D. Baryshkov, Ed.
Request for Comments: 9215                                   Linaro Ltd.
Category: Informational                                      V. Nikolaev
ISSN: 2070-1721                                                CryptoPro
                                                            A. Chelpanov
                                                            InfoTeCS JSC
                                                              March 2022


   Using GOST R 34.10-2012 and GOST R 34.11-2012 Algorithms with the
                Internet X.509 Public Key Infrastructure

Abstract

   This document describes encoding formats, identifiers, and parameter
   formats for the GOST R 34.10-2012 and GOST R 34.11-2012 algorithms
   for use in the Internet X.509 Public Key Infrastructure (PKI).

   This specification is developed to facilitate implementations that
   wish to support the GOST algorithms.  This document does not imply
   IETF endorsement of the cryptographic algorithms used in this
   document.

Status of This Memo

   This document is not an Internet Standards Track specification; it is
   published for informational purposes.

   This is a contribution to the RFC Series, independently of any other
   RFC stream.  The RFC Editor has chosen to publish this document at
   its discretion and makes no statement about its value for
   implementation or deployment.  Documents approved for publication by
   the RFC Editor are not candidates for any level of Internet Standard;
   see Section 2 of RFC 7841.

   Information about the current status of this document, any errata,
   and how to provide feedback on it may be obtained at
   https://www.rfc-editor.org/info/rfc9215.

Copyright Notice

   Copyright (c) 2022 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (https://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.

Table of Contents

   1.  Introduction
     1.1.  Requirements Language
   2.  Signature Algorithm Support
   3.  Hash Function Support
   4.  Subject Public Keys Information Fields
     4.1.  Public Key Identifiers
     4.2.  Public Key Parameters
     4.3.  Public Key Encoding
     4.4.  Key Usage Extension
   5.  Qualified Certificate Extensions
     5.1.  Distinguished Name Additions
     5.2.  Certificate Policies
     5.3.  Subject Sign Tool
     5.4.  Issuer Sign Tool
   6.  Historical Considerations
   7.  IANA Considerations
   8.  Security Considerations
   9.  References
     9.1.  Normative References
     9.2.  Informative References
   Appendix A.  GostR3410-2012-PKISyntax
   Appendix B.  GostR3410-2012-RuStrongCertsSyntax
   Appendix C.  Public Key Parameters
   Appendix D.  Test Examples
     D.1.  GOST R 34.10-2001 Test Parameters (256-Bit Private Key
           Length)
       D.1.1.  Certificate Request
       D.1.2.  Certificate
       D.1.3.  Certificate Revocation List
     D.2.  GOST R 34.10-2012 TC26-256-A Parameters (256-Bit Private
           Key Length)
       D.2.1.  Certificate Request
       D.2.2.  Certificate
       D.2.3.  Certificate Revocation List
     D.3.  GOST R 34.10-2012 Test Parameters (512-Bit Private Key
           Length)
       D.3.1.  Certificate Request
       D.3.2.  Certificate
       D.3.3.  Certificate Revocation List
   Appendix E.  GOST R 34.10-2012 Test Parameters (Curve Definition)
     E.1.  Elliptic Curve Modulus
     E.2.  Elliptic Curve Coefficients
     E.3.  Elliptic Curve Points Group Order
     E.4.  Order of Cyclic Subgroup of Elliptic Curve Points Group
     E.5.  Elliptic Curve Point Coordinates
   Contributors
   Authors' Addresses

1.  Introduction

   This document describes the conventions for using the GOST R
   34.10-2012 signature algorithm [GOSTR3410-2012] [RFC7091] and the
   GOST R 34.11-2012 hash function [GOSTR3411-2012] [RFC6986] in the
   Internet X.509 Public Key Infrastructure (PKI) [RFC5280].

   This specification defines the contents of the signatureAlgorithm,
   signatureValue, signature, and subjectPublicKeyInfo fields within
   X.509 Certificates and Certificate Revocation Lists (CRLs).  For each
   algorithm, the appropriate alternatives for the keyUsage certificate
   extension are provided.

   This specification is developed to facilitate implementations that
   wish to support the GOST algorithms.  This document does not imply
   IETF endorsement of the cryptographic algorithms used in this
   document.

1.1.  Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in
   BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
   capitals, as shown here.

2.  Signature Algorithm Support

   Conforming Certificate Authorities (CAs) MAY use the GOST R
   34.10-2012 signature algorithm to sign certificates and CRLs.  This
   signature algorithm MUST always be used with the GOST R 34.11-2012
   hash function.  It may use a key length of either 256 bits or 512
   bits.

   The ASN.1 object identifier (OID) used to identify the GOST R
   34.10-2012 signature algorithm with a 256-bit key length and the GOST
   R 34.11-2012 hash function with a 256-bit hash code is:

   id-tc26-signwithdigest-gost3410-12-256 OBJECT IDENTIFIER ::=
       { iso(1) member-body(2) ru(643) rosstandart(7) tc26(1)
           algorithms(1) signwithdigest(3) gost3410-12-256(2)}

   The GOST R 34.10-2012 signature algorithm with a 256-bit key length
   generates a digital signature in the form of two 256-bit integers: r
   and s.  Its octet string representation consists of 64 octets, where
   the first 32 octets contain the big-endian representation of s and
   the second 32 octets contain the big-endian representation of r.

   The ASN.1 OID used to identify the GOST R 34.10-2012 signature
   algorithm with a 512-bit key length and the GOST R 34.11-2012 hash
   function with a 512-bit hash code is:

   id-tc26-signwithdigest-gost3410-12-512 OBJECT IDENTIFIER ::=
       { iso(1) member-body(2) ru(643) rosstandart(7) tc26(1)
           algorithms(1) signwithdigest(3) gost3410-12-512(3)}

   The GOST R 34.10-2012 signature algorithm with a 512-bit key length
   generates a digital signature in the form of two 512-bit integers: r
   and s.  Its octet string representation consists of 128 octets, where
   the first 64 octets contain the big-endian representation of s and
   the second 64 octets contain the big-endian representation of r.

   When either of these OIDs is used as the algorithm field in an
   AlgorithmIdentifier structure, the encoding MUST omit the parameters
   field.

   The described definition of a signature value is directly usable in
   the Cryptographic Message Syntax (CMS) [RFC5652], where such values
   are represented as octet strings.  However, signature values in
   certificates and CRLs [RFC5280] are represented as bit strings, and
   thus the octet string representation must be converted.

   To convert an octet string signature value to a bit string, the most
   significant bit of the first octet of the signature value SHALL
   become the first bit of the bit string, and so on through the least
   significant bit of the last octet of the signature value, which SHALL
   become the last bit of the bit string.

3.  Hash Function Support

   The ASN.1 OID used to identify the GOST R 34.11-2012 hash function
   with a 256-bit hash code is:

   id-tc26-gost3411-12-256 OBJECT IDENTIFIER ::=
       { iso(1) member-body(2) ru(643) rosstandart(7) tc26(1)
           algorithms(1) digest(2) gost3411-12-256(2)}

   The ASN.1 OID used to identify the GOST R 34.11-2012 hash function
   with a 512-bit hash code is:

   id-tc26-gost3411-12-512 OBJECT IDENTIFIER ::=
       { iso(1) member-body(2) ru(643) rosstandart(7) tc26(1)
           algorithms(1) digest(2) gost3411-12-512(3)}

   When either of these OIDs is used as the algorithm field in an
   AlgorithmIdentifier structure, the encoding MUST omit the parameters
   field.

4.  Subject Public Keys Information Fields

4.1.  Public Key Identifiers

   GOST R 34.10-2012 public keys with a 256-bit private key length are
   identified by the following OID:

   id-tc26-gost3410-12-256 OBJECT IDENTIFIER ::=
       { iso(1) member-body(2) ru(643) rosstandart(7) tc26(1)
           algorithms(1) sign(1) gost3410-12-256(1)}

   GOST R 34.10-2012 public keys with a 512-bit private key length are
   identified by the following OID:

   id-tc26-gost3410-12-512 OBJECT IDENTIFIER ::=
       { iso(1) member-body(2) ru(643) rosstandart(7) tc26(1)
           algorithms(1) sign(1) gost3410-12-512(2)}

4.2.  Public Key Parameters

   When either of these identifiers appears as the algorithm field in
   the SubjectPublicKeyInfo.algorithm.algorithm field, the parameters
   field MUST have the following structure:

   GostR3410-2012-PublicKeyParameters ::= SEQUENCE
       {
           publicKeyParamSet OBJECT IDENTIFIER,
           digestParamSet OBJECT IDENTIFIER OPTIONAL
       }

   where:

   *  publicKeyParamSet is the public key parameters identifier for GOST
      R 34.10-2012 parameters (see Sections 5.1.1 and 5.2.1 of [RFC7836]
      or Appendix C) or GOST R 34.10-2001 parameters (see Section 8.4 of
      [RFC4357]).

   *  digestParamSet is the parameters identifier for the corresponding
      GOST R 34.11-2012 parameters (see Section 3).

   The following values, when used as publicKeyParamSet, define test
   public key parameter sets and MUST NOT be used outside of testing
   scenarios:

   *  id-GostR3410-2001-TestParamSet

   *  id-tc26-gost-3410-2012-512-paramSetTest

   The digestParamSet field:

   *  SHOULD be omitted if the GOST R 34.10-2012 signature algorithm is
      used with a 512-bit key length

   *  MUST be present and must be equal to id-tc26-digest-
      gost3411-12-256 if one of the following values is used as
      publicKeyParamSet:

      -  id-GostR3410-2001-TestParamSet

      -  id-GostR3410-2001-CryptoPro-A-ParamSet

      -  id-GostR3410-2001-CryptoPro-B-ParamSet

      -  id-GostR3410-2001-CryptoPro-C-ParamSet

      -  id-GostR3410-2001-CryptoPro-XchA-ParamSet

      -  id-GostR3410-2001-CryptoPro-XchB-ParamSet

   *  SHOULD be omitted if publicKeyParamSet is equal to:

      -  id-tc26-gost-3410-2012-256-paramSetA

   *  MUST be omitted if one of the following values is used as
      publicKeyParamSet:

      -  id-tc26-gost-3410-2012-256-paramSetB

      -  id-tc26-gost-3410-2012-256-paramSetC

      -  id-tc26-gost-3410-2012-256-paramSetD

4.3.  Public Key Encoding

   The GOST R 34.10-2012 public key MUST be ASN.1 DER encoded as an
   OCTET STRING.  This encoding SHALL be used as the content (i.e., the
   value) of the subjectPublicKey field (a BIT STRING) of the
   SubjectPublicKeyInfo structure.

   GostR3410-2012-256-PublicKey ::= OCTET STRING (SIZE(64))
   GostR3410-2012-512-PublicKey ::= OCTET STRING (SIZE (128))

   GostR3410-2012-256-PublicKey MUST contain 64 octets, where the first
   32 octets contain the little-endian representation of the x
   coordinate of the public key and the second 32 octets contain the
   little-endian representation of the y coordinate of the public key.

   GostR3410-2012-512-PublicKey MUST contain 128 octets, where the first
   64 octets contain the little-endian representation of the x
   coordinate of the public key and the second 64 octets contain the
   little-endian representation of the y coordinate of the public key.

4.4.  Key Usage Extension

   If the KeyUsage extension is present in a certificate with the GOST R
   34.10-2012 public key, the following values MAY be present:

   *  digitalSignature (0)

   *  contentCommitment (1)

   *  keyEncipherment (2)

   *  dataEncipherment (3)

   *  keyAgreement (4)

   *  keyCertSign (5)

   *  cRLSign (6)

   *  encipherOnly (7)

   *  decipherOnly (8)

   Note that contentCommitment was named nonRepudiation in previous
   versions of X.509.

   If the key is going to be used for key agreement, the keyAgreement
   flag MUST be present in the KeyUsage extension, with the encipherOnly
   and decipherOnly flags being optional.  However, the encipherOnly and
   decipherOnly flags MUST NOT be present simultaneously.

5.  Qualified Certificate Extensions

   This section defines additional OIDs for use in qualified
   certificates for checking digital signatures.

5.1.  Distinguished Name Additions

   OGRN is the main state registration number of juridical entities.

   OGRN ::= NUMERIC STRING (SIZE(13))

   The corresponding OID is 1.2.643.100.1.

   SNILS is the individual insurance account number.

   SNILS ::= NUMERIC STRING (SIZE(11))

   The corresponding OID is 1.2.643.100.3.

   INNLE is the individual taxpayer number (ITN) of the legal entity.

   INNLE ::= NUMERIC STRING (SIZE(10))

   The corresponding OID is 1.2.643.100.4.

   OGRNIP is the main state registration number of individual
   entrepreneurs (sole traders).

   OGRNIP ::= NUMERIC STRING (SIZE(15))

   The corresponding OID is 1.2.643.100.5.

   IdentificationKind represents the way the receiver of the certificate
   was identified by the CA.

   IdentificationKind ::= INTEGER { personal(0), remote-cert(1),
               remote-passport(2), remote-system(3) }

   The corresponding OID is 1.2.643.100.114.

   INN is the individual taxpayer number (ITN).

   INN ::= NUMERIC STRING (SIZE(12))

   The corresponding OID is 1.2.643.3.131.1.1.

5.2.  Certificate Policies

   The Russian national regulation body for cryptography defines several
   security levels of cryptographic tools.  Depending on the class of
   cryptographic token used by the certificate owner, the following OIDs
   must be included in certificate policies.  Certificates should
   include OIDs, starting from the lowest (KC1) up to the strongest
   applicable.

   *  1.2.643.100.113.1 - class KC1

   *  1.2.643.100.113.2 - class KC2

   *  1.2.643.100.113.3 - class KC3

   *  1.2.643.100.113.4 - class KB1

   *  1.2.643.100.113.5 - class KB2

   *  1.2.643.100.113.6 - class KA1

5.3.  Subject Sign Tool

   To denote the token or software type used by the certificate owner,
   the following non-critical SubjectSignTool extension with OID
   1.2.643.100.111 should be included.  It is defined as

   SubjectSignTool ::= UTF8String(SIZE(1..200))

5.4.  Issuer Sign Tool

   To denote the tools used to generate key pairs and tools used by the
   CA to sign certificates, the following non-critical IssuerSignTool
   extension with OID 1.2.643.100.112 should be included.  It is defined
   as

   IssuerSignTool ::= SEQUENCE {
     signTool     UTF8String(SIZE(1..200)),
     cATool       UTF8String(SIZE(1..200)),
     signToolCert UTF8String(SIZE(1..100)),
     cAToolCert   UTF8String(SIZE(1..100)) }

   where:

   *  signTool identifies tools used to create key pairs.

   *  cATool identifies tools used by the CA.

   *  signToolCert and cAToolCert contain the notice of the conformance
      of respective tools to Russian federal law on digital signatures.

6.  Historical Considerations

   Note that, for a significant period of time, there were no documents
   describing GostR3410-2012-PublicKeyParameters.  Several old
   implementations have used GostR3410-2001-PublicKeyParameters instead.
   These implementations will return an error if the digestParamSet
   field is not included in public key parameters.  Thus, an
   implementation wishing to collaborate with old implementations might
   want to include digestParamSet equal to id-tc26-digest-
   gost3411-12-512 if one of the following values is used as
   publicKeyParamSet:

   *  id-tc26-gost-3410-12-512-paramSetA

   *  id-tc26-gost-3410-12-512-paramSetB

   Note that the usage of keyEncipherment and dataEncipherment values
   for the KeyUsage extension is not fully defined for the GOST R
   34.10-2012 public keys, so they SHOULD be used with additional care.

7.  IANA Considerations

   This document has no IANA actions.

8.  Security Considerations

   It is RECOMMENDED that applications verify signature values and
   subject public keys to conform to the GOST R 34.10-2012 standard
   [GOSTR3410-2012] [RFC7091] prior to their use.

   It is RECOMMENDED that CAs and applications make sure that the
   private key for creating signatures is not used for more than its
   allowed validity period (typically 15 months for the GOST R
   34.10-2012 algorithm).

   Test parameter sets (id-GostR3410-2001-TestParamSet and id-tc26-gost-
   3410-2012-512-paramSetTest) MUST NOT be used outside of testing
   scenarios.  The use of parameter sets not described herein is NOT
   RECOMMENDED.  When different parameters are used, it is RECOMMENDED
   that they be subjected to examination by an authorized agency with
   approved methods of cryptographic analysis.

   For security discussions concerning the use of algorithm parameters,
   see [ANS17] and the Security Considerations sections in [RFC4357] and
   [RFC7836].

9.  References

9.1.  Normative References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <https://www.rfc-editor.org/info/rfc2119>.

   [RFC4357]  Popov, V., Kurepkin, I., and S. Leontiev, "Additional
              Cryptographic Algorithms for Use with GOST 28147-89, GOST
              R 34.10-94, GOST R 34.10-2001, and GOST R 34.11-94
              Algorithms", RFC 4357, DOI 10.17487/RFC4357, January 2006,
              <https://www.rfc-editor.org/info/rfc4357>.

   [RFC5280]  Cooper, D., Santesson, S., Farrell, S., Boeyen, S.,
              Housley, R., and W. Polk, "Internet X.509 Public Key
              Infrastructure Certificate and Certificate Revocation List
              (CRL) Profile", RFC 5280, DOI 10.17487/RFC5280, May 2008,
              <https://www.rfc-editor.org/info/rfc5280>.

   [RFC5652]  Housley, R., "Cryptographic Message Syntax (CMS)", STD 70,
              RFC 5652, DOI 10.17487/RFC5652, September 2009,
              <https://www.rfc-editor.org/info/rfc5652>.

   [RFC6986]  Dolmatov, V., Ed. and A. Degtyarev, "GOST R 34.11-2012:
              Hash Function", RFC 6986, DOI 10.17487/RFC6986, August
              2013, <https://www.rfc-editor.org/info/rfc6986>.

   [RFC7091]  Dolmatov, V., Ed. and A. Degtyarev, "GOST R 34.10-2012:
              Digital Signature Algorithm", RFC 7091,
              DOI 10.17487/RFC7091, December 2013,
              <https://www.rfc-editor.org/info/rfc7091>.

   [RFC7836]  Smyshlyaev, S., Ed., Alekseev, E., Oshkin, I., Popov, V.,
              Leontiev, S., Podobaev, V., and D. Belyavsky, "Guidelines
              on the Cryptographic Algorithms to Accompany the Usage of
              Standards GOST R 34.10-2012 and GOST R 34.11-2012",
              RFC 7836, DOI 10.17487/RFC7836, March 2016,
              <https://www.rfc-editor.org/info/rfc7836>.

   [RFC8174]  Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
              2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
              May 2017, <https://www.rfc-editor.org/info/rfc8174>.

9.2.  Informative References

   [ANS17]    Alekseev, E.K., Nikolaev, V.D., and S.V. Smyshlyaev, "On
              the security properties of Russian standardized elliptic
              curves", Mathematical Aspects of Cryptography, 9:3, P.
              5-32, DOI 10.4213/mvk260, 2018,
              <https://doi.org/10.4213/mvk260>.

   [GOSTR3410-2012]
              "Information technology.  Cryptographic data security.
              Signature and verification processes of [electronic]
              digital signature", GOST R 34.10-2012, Federal Agency on
              Technical Regulating and Metrology, 2012.

   [GOSTR3411-2012]
              "Information technology.  Cryptographic Data Security.
              Hashing function", GOST R 34.11-2012, Federal Agency on
              Technical Regulating and Metrology, 2012.

Appendix A.  GostR3410-2012-PKISyntax

   GostR3410-2012-PKISyntax
       { iso(1) member-body(2) ru(643) rosstandart(7)
         tc26(1) modules(0) gostR3410-2012-PKISyntax(2) }

   DEFINITIONS ::=
   BEGIN
   -- EXPORTS All --

       -- ASN.1 TC 26 root
       id-tc26 OBJECT IDENTIFIER ::=
           { iso(1) member-body(2) ru(643) rosstandart(7) tc26(1) }

       -- Signature algorithm
       id-tc26-sign OBJECT IDENTIFIER ::=
       { id-tc26 algorithms(1) sign(1) }

       -- Hash algorithm
       id-tc26-digest OBJECT IDENTIFIER ::=
       { id-tc26 algorithms(1) digest(2) }

       -- Public key identifiers
       id-tc26-sign-constants OBJECT IDENTIFIER ::=
       { id-tc26 constants(2) sign(1) }

       -- Public key algorithm GOST R 34.10-2012 / 256-bit identifiers
       id-tc26-gost-3410-2012-256-constants OBJECT IDENTIFIER ::=
       { id-tc26-sign-constants gost-3410-2012-256(1) }

       -- Public key algorithm GOST R 34.10-2012 / 512-bit identifiers
       id-tc26-gost-3410-2012-512-constants OBJECT IDENTIFIER ::=
       { id-tc26-sign-constants gost-3410-2012-512(2) }

       -- GOST R 34.10-2012 / 256-bit signature algorithm
       id-tc26-gost3410-12-256 OBJECT IDENTIFIER ::=
       { id-tc26-sign gost3410-12-256(1) }

       -- GOST R 34.10-2012 / 512-bit signature algorithm
       id-tc26-gost3410-12-512 OBJECT IDENTIFIER ::=
       { id-tc26-sign gost3410-12-512(2) }

       -- GOST R 34.11-2012 / 256-bit hash algorithm
       id-tc26-gost3411-12-256 OBJECT IDENTIFIER ::=
       { id-tc26-digest gost3411-12-256(2)}

       -- GOST R 34.11-2012 / 512-bit hash algorithm
       id-tc26-gost3411-12-512 OBJECT IDENTIFIER ::=
       { id-tc26-digest gost3411-12-512(3)}

       -- GOST R 34.10-2012 / GOST R 34.11-2012 sign/hash algorithm
       id-tc26-signwithdigest OBJECT IDENTIFIER ::=
       { id-tc26 algorithms(1) signwithdigest(3) }

       -- Signature & hash algorithm GOST R 34.10-2012 / 256 bits
       -- with GOST R 34.11-2012
       id-tc26-signwithdigest-gost3410-12-256 OBJECT IDENTIFIER ::=
       { id-tc26-signwithdigest gost3410-12-256(2) }

       -- Signature & hash algorithm GOST R 34.10-2012 / 512 bits
       -- with GOST R 34.11-2012
       id-tc26-signwithdigest-gost3410-12-512 OBJECT IDENTIFIER ::=
       { id-tc26-signwithdigest gost3410-12-512(3) }

       -- GOST R 34.10-2012 / 256-bit signature algorithm
       -- parameters identifier: "Set A"
       id-tc26-gost-3410-2012-256-paramSetA OBJECT IDENTIFIER ::=
       { id-tc26-gost-3410-2012-256-constants paramSetA(1) }

       -- GOST R 34.10-2012 / 256-bit signature algorithm
       -- parameters identifier: "Set B"
       id-tc26-gost-3410-2012-256-paramSetB OBJECT IDENTIFIER ::=
       { id-tc26-gost-3410-2012-256-constants paramSetB(2) }

       -- GOST R 34.10-2012 / 256-bit signature algorithm
       -- parameters identifier: "Set C"
       id-tc26-gost-3410-2012-256-paramSetC OBJECT IDENTIFIER ::=
       { id-tc26-gost-3410-2012-256-constants paramSetC(3) }

       -- GOST R 34.10-2012 / 256-bit signature algorithm
       -- parameters identifier: "Set D"
       id-tc26-gost-3410-2012-256-paramSetD OBJECT IDENTIFIER ::=
       { id-tc26-gost-3410-2012-256-constants paramSetD(4) }

       -- GOST R 34.10-2012 / 512-bit signature algorithm
       -- parameters identifier: "Test set"
       id-tc26-gost-3410-2012-512-paramSetTest OBJECT IDENTIFIER ::=
       { id-tc26-gost-3410-2012-512-constants paramSetTest(0) }

       -- GOST R 34.10-2012 / 512-bit signature algorithm
       -- parameters identifier: "Set A"
       id-tc26-gost-3410-2012-512-paramSetA OBJECT IDENTIFIER ::=
       { id-tc26-gost-3410-2012-512-constants paramSetA(1) }

       -- GOST R 34.10-2012 / 512-bit signature algorithm
       -- parameters identifier: "Set B"
       id-tc26-gost-3410-2012-512-paramSetB OBJECT IDENTIFIER ::=
       { id-tc26-gost-3410-2012-512-constants paramSetB(2) }

       -- GOST R 34.10-2012 / 512-bit signature algorithm
       -- parameters identifier: "Set C"
       id-tc26-gost-3410-2012-512-paramSetC OBJECT IDENTIFIER ::=
       { id-tc26-gost-3410-2012-512-constants paramSetC(3) }

       -- Public key GOST R 34.10-2012 / 256 bits
       GostR3410-2012-256-PublicKey ::= OCTET STRING (SIZE (64))
       -- Public key GOST R 34.10-2012 / 512 bits
       GostR3410-2012-512-PublicKey ::= OCTET STRING (SIZE (128))
       -- Public key GOST R 34.10-2012
       GostR3410-2012-PublicKey ::= OCTET STRING (SIZE (64 | 128))

       -- Public key parameters GOST R 34.10-2012
       GostR3410-2012-PublicKeyParameters ::=
           SEQUENCE {
               publicKeyParamSet OBJECT IDENTIFIER,
               digestParamSet OBJECT IDENTIFIER OPTIONAL
               }

   END -- GostR3410-2012-PKISyntax

Appendix B.  GostR3410-2012-RuStrongCertsSyntax

   RuStrongCertsSyntax
       { iso(1) member-body(2) ru(643) rosstandart(7)
         tc26(1) modules(0) ruStrongCertsSyntax(6) }

   DEFINITIONS ::=
   BEGIN
   -- EXPORTS All --

       id-ca OBJECT IDENTIFIER ::=
           { iso(1) member-body(2) ru(643) ca(3) }

       id-fss OBJECT IDENTIFIER ::=
           { iso(1) member-body(2) ru(643) fss(100) }

       id-fns OBJECT IDENTIFIER ::=
           { id-ca fns(131) }

       -- The main state registration number of juridical entities.
       OGRN ::= NumericString(SIZE (13))

       id-OGRN OBJECT IDENTIFIER ::=
            { id-fss ogrn(1) }

       --  The individual insurance account number.
       SNILS ::= NumericString(SIZE (11))

       id-SNILS OBJECT IDENTIFIER ::=
            { id-fss snils(3) }

       -- The main state registration number of
       -- individual entrepreneurs (sole traders).
       OGRNIP ::= NumericString(SIZE (15))

       id-OGRNIP OBJECT IDENTIFIER ::=
            { id-fss ogrnip(5) }

       id-class OBJECT IDENTIFIER ::=
            { id-fss class(113) }

       id-class-kc1 OBJECT IDENTIFIER ::=
            { id-class kc1(1) }

       id-class-kc2 OBJECT IDENTIFIER ::=
            { id-class kc2(2) }

       id-class-kc3 OBJECT IDENTIFIER ::=
            { id-class kc3(3) }

       id-class-kb1 OBJECT IDENTIFIER ::=
            { id-class kb1(4) }

       id-class-kb2 OBJECT IDENTIFIER ::=
            { id-class kb2(5) }

       id-class-ka OBJECT IDENTIFIER ::=
            { id-class ka(6) }

       -- The individual taxpayer number (ITN).
       INN ::= NumericString(SIZE (12))

       id-INN OBJECT IDENTIFIER ::=
            { id-fns ids(1) inn(1) }

       -- The organization taxpayer number (OTN).
       INNLE ::= NumericString(SIZE (10))

       id-INNLE OBJECT IDENTIFIER ::=
            { id-fss innle(4) }

       -- The token or software type used by the certificate owner.
       SubjectSignTool ::= UTF8String(SIZE(1..200))

       id-SubjectSignTool OBJECT IDENTIFIER ::=
            { id-fss subjectSignTool(111) }

       -- The tools used to generate key pairs and tools used by
       -- the CA to sign certificates.
       IssuerSignTool ::= SEQUENCE {
            signTool     UTF8String(SIZE(1..200)),
            cATool       UTF8String(SIZE(1..200)),
            signToolCert UTF8String(SIZE(1..100)),
            cAToolCert   UTF8String(SIZE(1..100)) }

       id-IssuerSignTool OBJECT IDENTIFIER ::=
            { id-fss issuerSignTool(112) }

       -- The method of identifying the owner, when it applies/receives
       -- the certificate in the CA.
       IdentificationKind ::= INTEGER { personal(0), remote-cert(1),
            remote-passport(2), remote-system(3) }

       id-IdentificationKind OBJECT IDENTIFIER ::=
            { id-fss identificationKind(114) }

   END -- RuStrongCertsSyntax

Appendix C.  Public Key Parameters

   Here we define three new OIDs for three existing public key parameter
   sets defined in [RFC4357].  These OIDs MUST be used with GOST R
   34.10-2012 public keys only.

   id-tc26-gost-3410-2012-256-paramSetB OBJECT IDENTIFIER ::=
       { iso(1) member-body(2) ru(643) rosstandart(7) tc26(1)
           constants(2) sign-constants(1) gost-3410-12-256-constants(1)
             paramSetB(2)}

   The elliptic curve of this parameter set is the same as that of id-
   GostR3410-2001-CryptoPro-A-ParamSet (and id-GostR3410-2001-CryptoPro-
   XchA-ParamSet), which can be found in [RFC4357].

   id-tc26-gost-3410-2012-256-paramSetC OBJECT IDENTIFIER ::=
       { iso(1) member-body(2) ru(643) rosstandart(7) tc26(1)
           constants(2) sign-constants(1) gost-3410-12-256-constants(1)
             paramSetC(3)}

   The elliptic curve of this parameter set is the same as that of id-
   GostR3410-2001-CryptoPro-B-ParamSet, which can be found in [RFC4357].

   id-tc26-gost-3410-2012-256-paramSetD OBJECT IDENTIFIER ::=
       { iso(1) member-body(2) ru(643) rosstandart(7) tc26(1)
           constants(2) sign-constants(1) gost-3410-12-256-constants(1)
             paramSetD(4)}

   The elliptic curve of this parameter set is the same as that of id-
   GostR3410-2001-CryptoPro-C-ParamSet (and id-GostR3410-2001-CryptoPro-
   XchB-ParamSet), which can be found in [RFC4357].

Appendix D.  Test Examples

D.1.  GOST R 34.10-2001 Test Parameters (256-Bit Private Key Length)

   This example uses the curve defined in Section 7.1 of [RFC7091].

   The private key is

   d = 0x7A929ADE789BB9BE10ED359DD39A72C1\\
         1B60961F49397EEE1D19CE9891EC3B28

   The public key is

   x = 0x7F2B49E270DB6D90D8595BEC458B50C5\\
         8585BA1D4E9B788F6689DBD8E56FD80B

   y = 0x26F1B489D6701DD185C8413A977B3CBB\\
         AF64D1C593D26627DFFB101A87FF77DA

D.1.1.  Certificate Request

   -----BEGIN CERTIFICATE REQUEST-----
   MIHTMIGBAgEAMBIxEDAOBgNVBAMTB0V4YW1wbGUwZjAfBggqhQMHAQEBATATBgcq
   hQMCAiMABggqhQMHAQECAgNDAARAC9hv5djbiWaPeJtOHbqFhcVQi0XsW1nYkG3b
   cOJJK3/ad/+HGhD73ydm0pPF0WSvuzx7lzpByIXRHXDWibTxJqAAMAoGCCqFAwcB
   AQMCA0EAaqqzjjXUqqUXlAMBeZEi2FVIT1efTLuW1jzf3zrMQypBqijS8asUgoDN
   ntVv7aQZdAU1VKQnZ7g60EP9OdwEkw==
   -----END CERTIFICATE REQUEST-----

     0 211: SEQUENCE {
     3 129:   SEQUENCE {
     6   1:     INTEGER 0
     9  18:     SEQUENCE {
    11  16:       SET {
    13  14:         SEQUENCE {
    15   3:           OBJECT IDENTIFIER commonName (2 5 4 3)
    20   7:           PrintableString 'Example'
          :           }
          :         }
          :       }
    29 102:     SEQUENCE {
    31  31:       SEQUENCE {
    33   8:         OBJECT IDENTIFIER '1 2 643 7 1 1 1 1'
    43  19:         SEQUENCE {
    45   7:           OBJECT IDENTIFIER '1 2 643 2 2 35 0'
    54   8:           OBJECT IDENTIFIER '1 2 643 7 1 1 2 2'
          :           }
          :         }
    64  67:       BIT STRING, encapsulates {
    67  64:         OCTET STRING
          :           0B D8 6F E5 D8 DB 89 66 8F 78 9B 4E 1D BA 85 85
          :           C5 50 8B 45 EC 5B 59 D8 90 6D DB 70 E2 49 2B 7F
          :           DA 77 FF 87 1A 10 FB DF 27 66 D2 93 C5 D1 64 AF
          :           BB 3C 7B 97 3A 41 C8 85 D1 1D 70 D6 89 B4 F1 26
          :         }
          :       }
   133   0:     [0] {}
          :     }
   135  10:   SEQUENCE {
   137   8:     OBJECT IDENTIFIER '1 2 643 7 1 1 3 2'
          :     }
   147  65:   BIT STRING
          :     6A AA B3 8E 35 D4 AA A5 17 94 03 01 79 91 22 D8
          :     55 48 4F 57 9F 4C BB 96 D6 3C DF DF 3A CC 43 2A
          :     41 AA 28 D2 F1 AB 14 82 80 CD 9E D5 6F ED A4 19
          :     74 05 35 54 A4 27 67 B8 3A D0 43 FD 39 DC 04 93
          :   }

D.1.2.  Certificate

   -----BEGIN CERTIFICATE-----
   MIIBLTCB26ADAgECAgEKMAoGCCqFAwcBAQMCMBIxEDAOBgNVBAMTB0V4YW1wbGUw
   IBcNMDEwMTAxMDAwMDAwWhgPMjA1MDEyMzEwMDAwMDBaMBIxEDAOBgNVBAMTB0V4
   YW1wbGUwZjAfBggqhQMHAQEBATATBgcqhQMCAiMABggqhQMHAQECAgNDAARAC9hv
   5djbiWaPeJtOHbqFhcVQi0XsW1nYkG3bcOJJK3/ad/+HGhD73ydm0pPF0WSvuzx7
   lzpByIXRHXDWibTxJqMTMBEwDwYDVR0TAQH/BAUwAwEB/zAKBggqhQMHAQEDAgNB
   AE1T8BL+CBd2UH1Nm7gfAO/bTu/Uq4O6xLrPc1Fzz6gcQaoo0vGrFIKAzZ7Vb+2k
   GXQFNVSkJ2e4OtBD/TncBJM=
   -----END CERTIFICATE-----

     0 301: SEQUENCE {
     4 219:   SEQUENCE {
     7   3:     [0] {
     9   1:       INTEGER 2
          :       }
    12   1:     INTEGER 10
    15  10:     SEQUENCE {
    17   8:       OBJECT IDENTIFIER '1 2 643 7 1 1 3 2'
          :       }
    27  18:     SEQUENCE {
    29  16:       SET {
    31  14:         SEQUENCE {
    33   3:           OBJECT IDENTIFIER commonName (2 5 4 3)
    38   7:           PrintableString 'Example'
          :           }
          :         }
          :       }
    47  32:     SEQUENCE {
    49  13:       UTCTime 01/01/2001 00:00:00 GMT
    64  15:       GeneralizedTime 31/12/2050 00:00:00 GMT
          :       }
    81  18:     SEQUENCE {
    83  16:       SET {
    85  14:         SEQUENCE {
    87   3:           OBJECT IDENTIFIER commonName (2 5 4 3)
    92   7:           PrintableString 'Example'
          :           }
          :         }
          :       }
   101 102:     SEQUENCE {
   103  31:       SEQUENCE {
   105   8:         OBJECT IDENTIFIER '1 2 643 7 1 1 1 1'
   115  19:         SEQUENCE {
   117   7:           OBJECT IDENTIFIER '1 2 643 2 2 35 0'
   126   8:           OBJECT IDENTIFIER '1 2 643 7 1 1 2 2'
          :           }
          :         }
   136  67:       BIT STRING, encapsulates {
   139  64:         OCTET STRING
          :           0B D8 6F E5 D8 DB 89 66 8F 78 9B 4E 1D BA 85 85
          :           C5 50 8B 45 EC 5B 59 D8 90 6D DB 70 E2 49 2B 7F
          :           DA 77 FF 87 1A 10 FB DF 27 66 D2 93 C5 D1 64 AF
          :           BB 3C 7B 97 3A 41 C8 85 D1 1D 70 D6 89 B4 F1 26
          :         }
          :       }
   205  19:     [3] {
   207  17:       SEQUENCE {
   209  15:         SEQUENCE {
   211   3:           OBJECT IDENTIFIER basicConstraints (2 5 29 19)
   216   1:           BOOLEAN TRUE
   219   5:           OCTET STRING, encapsulates {
   221   3:             SEQUENCE {
   223   1:               BOOLEAN TRUE
          :               }
          :             }
          :           }
          :         }
          :       }
          :     }
   226  10:   SEQUENCE {
   228   8:     OBJECT IDENTIFIER '1 2 643 7 1 1 3 2'
          :     }
   238  65:   BIT STRING
          :     4D 53 F0 12 FE 08 17 76 50 7D 4D 9B B8 1F 00 EF
          :     DB 4E EF D4 AB 83 BA C4 BA CF 73 51 73 CF A8 1C
          :     41 AA 28 D2 F1 AB 14 82 80 CD 9E D5 6F ED A4 19
          :     74 05 35 54 A4 27 67 B8 3A D0 43 FD 39 DC 04 93
          :   }

D.1.3.  Certificate Revocation List

   -----BEGIN X509 CRL-----
   MIGSMEECAQEwCgYIKoUDBwEBAwIwEjEQMA4GA1UEAxMHRXhhbXBsZRcNMTQwMTAx
   MDAwMDAwWhcNMTQwMTAyMDAwMDAwWjAKBggqhQMHAQEDAgNBAEK/OSoU0+vpV68+
   RstQv19CIaADrT0XJ1PJSpw3ox0gQaoo0vGrFIKAzZ7Vb+2kGXQFNVSkJ2e4OtBD
   /TncBJM=
   -----END X509 CRL-----

     0 146: SEQUENCE {
     3  65:   SEQUENCE {
     5   1:     INTEGER 1
     8  10:     SEQUENCE {
    10   8:       OBJECT IDENTIFIER '1 2 643 7 1 1 3 2'
          :       }
    20  18:     SEQUENCE {
    22  16:       SET {
    24  14:         SEQUENCE {
    26   3:           OBJECT IDENTIFIER commonName (2 5 4 3)
    31   7:           PrintableString 'Example'
          :           }
          :         }
          :       }
    40  13:     UTCTime 01/01/2014 00:00:00 GMT
    55  13:     UTCTime 02/01/2014 00:00:00 GMT
          :     }
    70  10:   SEQUENCE {
    72   8:     OBJECT IDENTIFIER '1 2 643 7 1 1 3 2'
          :     }
    82  65:   BIT STRING
          :     42 BF 39 2A 14 D3 EB E9 57 AF 3E 46 CB 50 BF 5F
          :     42 21 A0 03 AD 3D 17 27 53 C9 4A 9C 37 A3 1D 20
          :     41 AA 28 D2 F1 AB 14 82 80 CD 9E D5 6F ED A4 19
          :     74 05 35 54 A4 27 67 B8 3A D0 43 FD 39 DC 04 93
          :   }

D.2.  GOST R 34.10-2012 TC26-256-A Parameters (256-Bit Private Key
      Length)

   This example uses the curve defined in Appendix A.2 of [RFC7836].

   The private key is

   d = 0x3A929ADE789BB9BE10ED359DD39A72C1\\
         0B87C83F80BE18B85C041F4325B62EC1

   The public key is

   x = 0x99C3DF265EA59350640BA69D1DE04418\\
         AF3FEA03EC0F85F2DD84E8BED4952774

   y = 0xE218631A69C47C122E2D516DA1C09E6B\\
         D19344D94389D1F16C0C4D4DCF96F578

D.2.1.  Certificate Request

   -----BEGIN CERTIFICATE REQUEST-----
   MIHKMHkCAQAwEjEQMA4GA1UEAxMHRXhhbXBsZTBeMBcGCCqFAwcBAQEBMAsGCSqF
   AwcBAgEBAQNDAARAdCeV1L7ohN3yhQ/sA+o/rxhE4B2dpgtkUJOlXibfw5l49ZbP
   TU0MbPHRiUPZRJPRa57AoW1RLS4SfMRpGmMY4qAAMAoGCCqFAwcBAQMCA0EAG9wq
   Exdnm2YjL2PqFv98ZMyqua2FX8bhgJFmHbedSBIdDh2lvjR8bxtSVseurCAK1krH
   em9bOg4Jcxjnrm7naQ==
   -----END CERTIFICATE REQUEST-----

     0 202: SEQUENCE {
     3 121:   SEQUENCE {
     5   1:     INTEGER 0
     8  18:     SEQUENCE {
    10  16:       SET {
    12  14:         SEQUENCE {
    14   3:           OBJECT IDENTIFIER commonName (2 5 4 3)
    19   7:           PrintableString 'Example'
          :           }
          :         }
          :       }
    28  94:     SEQUENCE {
    30  23:       SEQUENCE {
    32   8:         OBJECT IDENTIFIER '1 2 643 7 1 1 1 1'
    42  11:         SEQUENCE {
    44   9:           OBJECT IDENTIFIER '1 2 643 7 1 2 1 1 1'
          :           }
          :         }
    55  67:       BIT STRING, encapsulates {
    58  64:         OCTET STRING
          :           74 27 95 D4 BE E8 84 DD F2 85 0F EC 03 EA 3F AF
          :           18 44 E0 1D 9D A6 0B 64 50 93 A5 5E 26 DF C3 99
          :           78 F5 96 CF 4D 4D 0C 6C F1 D1 89 43 D9 44 93 D1
          :           6B 9E C0 A1 6D 51 2D 2E 12 7C C4 69 1A 63 18 E2
          :         }
          :       }
   124   0:     [0] {}
          :     }
   126  10:   SEQUENCE {
   128   8:     OBJECT IDENTIFIER '1 2 643 7 1 1 3 2'
          :     }
   138  65:   BIT STRING
          :     1B DC 2A 13 17 67 9B 66 23 2F 63 EA 16 FF 7C 64
          :     CC AA B9 AD 85 5F C6 E1 80 91 66 1D B7 9D 48 12
          :     1D 0E 1D A5 BE 34 7C 6F 1B 52 56 C7 AE AC 20 0A
          :     D6 4A C7 7A 6F 5B 3A 0E 09 73 18 E7 AE 6E E7 69
          :   }

D.2.2.  Certificate

   -----BEGIN CERTIFICATE-----
   MIIBJTCB06ADAgECAgEKMAoGCCqFAwcBAQMCMBIxEDAOBgNVBAMTB0V4YW1wbGUw
   IBcNMDEwMTAxMDAwMDAwWhgPMjA1MDEyMzEwMDAwMDBaMBIxEDAOBgNVBAMTB0V4
   YW1wbGUwXjAXBggqhQMHAQEBATALBgkqhQMHAQIBAQEDQwAEQHQnldS+6ITd8oUP
   7APqP68YROAdnaYLZFCTpV4m38OZePWWz01NDGzx0YlD2UST0WuewKFtUS0uEnzE
   aRpjGOKjEzARMA8GA1UdEwEB/wQFMAMBAf8wCgYIKoUDBwEBAwIDQQAUC02pEksJ
   yw1c6Sjuh0JzoxASlJLsDik2njt5EkhXjB0OHaW+NHxvG1JWx66sIArWSsd6b1s6
   DglzGOeubudp
   -----END CERTIFICATE-----

     0 293: SEQUENCE {
     4 211:   SEQUENCE {
     7   3:     [0] {
     9   1:       INTEGER 2
          :       }
    12   1:     INTEGER 10
    15  10:     SEQUENCE {
    17   8:       OBJECT IDENTIFIER '1 2 643 7 1 1 3 2'
          :       }
    27  18:     SEQUENCE {
    29  16:       SET {
    31  14:         SEQUENCE {
    33   3:           OBJECT IDENTIFIER commonName (2 5 4 3)
    38   7:           PrintableString 'Example'
          :           }
          :         }
          :       }
    47  32:     SEQUENCE {
    49  13:       UTCTime 01/01/2001 00:00:00 GMT
    64  15:       GeneralizedTime 31/12/2050 00:00:00 GMT
          :       }
    81  18:     SEQUENCE {
    83  16:       SET {
    85  14:         SEQUENCE {
    87   3:           OBJECT IDENTIFIER commonName (2 5 4 3)
    92   7:           PrintableString 'Example'
          :           }
          :         }
          :       }
   101  94:     SEQUENCE {
   103  23:       SEQUENCE {
   105   8:         OBJECT IDENTIFIER '1 2 643 7 1 1 1 1'
   115  11:         SEQUENCE {
   117   9:           OBJECT IDENTIFIER '1 2 643 7 1 2 1 1 1'
          :           }
          :         }
   128  67:       BIT STRING, encapsulates {
   131  64:         OCTET STRING
          :           74 27 95 D4 BE E8 84 DD F2 85 0F EC 03 EA 3F AF
          :           18 44 E0 1D 9D A6 0B 64 50 93 A5 5E 26 DF C3 99
          :           78 F5 96 CF 4D 4D 0C 6C F1 D1 89 43 D9 44 93 D1
          :           6B 9E C0 A1 6D 51 2D 2E 12 7C C4 69 1A 63 18 E2
          :         }
          :       }
   197  19:     [3] {
   199  17:       SEQUENCE {
   201  15:         SEQUENCE {
   203   3:           OBJECT IDENTIFIER basicConstraints (2 5 29 19)
   208   1:           BOOLEAN TRUE
   211   5:           OCTET STRING, encapsulates {
   213   3:             SEQUENCE {
   215   1:               BOOLEAN TRUE
          :               }
          :             }
          :           }
          :         }
          :       }
          :     }
   218  10:   SEQUENCE {
   220   8:     OBJECT IDENTIFIER '1 2 643 7 1 1 3 2'
          :     }
   230  65:   BIT STRING
          :     14 0B 4D A9 12 4B 09 CB 0D 5C E9 28 EE 87 42 73
          :     A3 10 12 94 92 EC 0E 29 36 9E 3B 79 12 48 57 8C
          :     1D 0E 1D A5 BE 34 7C 6F 1B 52 56 C7 AE AC 20 0A
          :     D6 4A C7 7A 6F 5B 3A 0E 09 73 18 E7 AE 6E E7 69
          :   }

D.2.3.  Certificate Revocation List

   -----BEGIN X509 CRL-----
   MIGSMEECAQEwCgYIKoUDBwEBAwIwEjEQMA4GA1UEAxMHRXhhbXBsZRcNMTQwMTAx
   MDAwMDAwWhcNMTQwMTAyMDAwMDAwWjAKBggqhQMHAQEDAgNBABS9aAh8O5A8eqKL
   B/6y571v4JY/VjJnNZ9c2Oq0UFmtHQ4dpb40fG8bUlbHrqwgCtZKx3pvWzoOCXMY
   565u52k=
   -----END X509 CRL-----

     0 146: SEQUENCE {
     3  65:   SEQUENCE {
     5   1:     INTEGER 1
     8  10:     SEQUENCE {
    10   8:       OBJECT IDENTIFIER '1 2 643 7 1 1 3 2'
          :       }
    20  18:     SEQUENCE {
    22  16:       SET {
    24  14:         SEQUENCE {
    26   3:           OBJECT IDENTIFIER commonName (2 5 4 3)
    31   7:           PrintableString 'Example'
          :           }
          :         }
          :       }
    40  13:     UTCTime 01/01/2014 00:00:00 GMT
    55  13:     UTCTime 02/01/2014 00:00:00 GMT
          :     }
    70  10:   SEQUENCE {
    72   8:     OBJECT IDENTIFIER '1 2 643 7 1 1 3 2'
          :     }
    82  65:   BIT STRING
          :     14 BD 68 08 7C 3B 90 3C 7A A2 8B 07 FE B2 E7 BD
          :     6F E0 96 3F 56 32 67 35 9F 5C D8 EA B4 50 59 AD
          :     1D 0E 1D A5 BE 34 7C 6F 1B 52 56 C7 AE AC 20 0A
          :     D6 4A C7 7A 6F 5B 3A 0E 09 73 18 E7 AE 6E E7 69
          :   }

D.3.  GOST R 34.10-2012 Test Parameters (512-Bit Private Key Length)

   This example uses the curve defined in Appendix E.

   The private key is

   d = 0x0BA6048AADAE241BA40936D47756D7C9\\
         3091A0E8514669700EE7508E508B1020\\
         72E8123B2200A0563322DAD2827E2714\\
         A2636B7BFD18AADFC62967821FA18DD4

   The public key is

   x = 0x115DC5BC96760C7B48598D8AB9E740D4\\
         C4A85A65BE33C1815B5C320C854621DD\\
         5A515856D13314AF69BC5B924C8B4DDF\\
         F75C45415C1D9DD9DD33612CD530EFE1

   y = 0x37C7C90CD40B0F5621DC3AC1B751CFA0\\
         E2634FA0503B3D52639F5D7FB72AFD61\\
         EA199441D943FFE7F0C70A2759A3CDB8\\
         4C114E1F9339FDF27F35ECA93677BEEC

D.3.1.  Certificate Request

   -----BEGIN CERTIFICATE REQUEST-----
   MIIBTzCBvAIBADASMRAwDgYDVQQDEwdFeGFtcGxlMIGgMBcGCCqFAwcBAQECMAsG
   CSqFAwcBAgECAAOBhAAEgYDh7zDVLGEz3dmdHVxBRVz3302LTJJbvGmvFDPRVlhR
   Wt0hRoUMMlxbgcEzvmVaqMTUQOe5io1ZSHsMdpa8xV0R7L53NqnsNX/y/TmTH04R
   TLjNo1knCsfw5/9D2UGUGeph/Sq3f12fY1I9O1CgT2PioM9Rt8E63CFWDwvUDMnH
   N6AAMAoGCCqFAwcBAQMDA4GBAEM7HWzkClHx5XN+sWqixoOCmkBbnZEn4hJg/J1q
   wF2HvyTibEUnilwhkqdbqUmTq9YHTn/xvwP9L1OXr6HZRVgvhvpgoIEJGiPdeV4e
   PGie5RKjyC7g3MJkPHjuqPys01SSVYSGsg8cnsGXyQaZhQJgyTvLzZxcMxfhk0Th
   c642
   -----END CERTIFICATE REQUEST-----

     0 335: SEQUENCE {
     4 188:   SEQUENCE {
     7   1:     INTEGER 0
    10  18:     SEQUENCE {
    12  16:       SET {
    14  14:         SEQUENCE {
    16   3:           OBJECT IDENTIFIER commonName (2 5 4 3)
    21   7:           PrintableString 'Example'
          :           }
          :         }
          :       }
    30 160:     SEQUENCE {
    33  23:       SEQUENCE {
    35   8:         OBJECT IDENTIFIER '1 2 643 7 1 1 1 2'
    45  11:         SEQUENCE {
    47   9:           OBJECT IDENTIFIER '1 2 643 7 1 2 1 2 0'
          :           }
          :         }
    58 132:       BIT STRING, encapsulates {
    62 128:         OCTET STRING
          :           E1 EF 30 D5 2C 61 33 DD D9 9D 1D 5C 41 45 5C F7
          :           DF 4D 8B 4C 92 5B BC 69 AF 14 33 D1 56 58 51 5A
          :           DD 21 46 85 0C 32 5C 5B 81 C1 33 BE 65 5A A8 C4
          :           D4 40 E7 B9 8A 8D 59 48 7B 0C 76 96 BC C5 5D 11
          :           EC BE 77 36 A9 EC 35 7F F2 FD 39 93 1F 4E 11 4C
          :           B8 CD A3 59 27 0A C7 F0 E7 FF 43 D9 41 94 19 EA
          :           61 FD 2A B7 7F 5D 9F 63 52 3D 3B 50 A0 4F 63 E2
          :           A0 CF 51 B7 C1 3A DC 21 56 0F 0B D4 0C C9 C7 37
          :         }
          :       }
   193   0:     [0] {}
          :     }
   195  10:   SEQUENCE {
   197   8:     OBJECT IDENTIFIER '1 2 643 7 1 1 3 3'
          :     }
   207 129:   BIT STRING
          :     43 3B 1D 6C E4 0A 51 F1 E5 73 7E B1 6A A2 C6 83
          :     82 9A 40 5B 9D 91 27 E2 12 60 FC 9D 6A C0 5D 87
          :     BF 24 E2 6C 45 27 8A 5C 21 92 A7 5B A9 49 93 AB
          :     D6 07 4E 7F F1 BF 03 FD 2F 53 97 AF A1 D9 45 58
          :     2F 86 FA 60 A0 81 09 1A 23 DD 79 5E 1E 3C 68 9E
          :     E5 12 A3 C8 2E E0 DC C2 64 3C 78 EE A8 FC AC D3
          :     54 92 55 84 86 B2 0F 1C 9E C1 97 C9 06 99 85 02
          :     60 C9 3B CB CD 9C 5C 33 17 E1 93 44 E1 73 AE 36
          :   }

D.3.2.  Certificate

   -----BEGIN CERTIFICATE-----
   MIIBqjCCARagAwIBAgIBCzAKBggqhQMHAQEDAzASMRAwDgYDVQQDEwdFeGFtcGxl
   MCAXDTAxMDEwMTAwMDAwMFoYDzIwNTAxMjMxMDAwMDAwWjASMRAwDgYDVQQDEwdF
   eGFtcGxlMIGgMBcGCCqFAwcBAQECMAsGCSqFAwcBAgECAAOBhAAEgYDh7zDVLGEz
   3dmdHVxBRVz3302LTJJbvGmvFDPRVlhRWt0hRoUMMlxbgcEzvmVaqMTUQOe5io1Z
   SHsMdpa8xV0R7L53NqnsNX/y/TmTH04RTLjNo1knCsfw5/9D2UGUGeph/Sq3f12f
   Y1I9O1CgT2PioM9Rt8E63CFWDwvUDMnHN6MTMBEwDwYDVR0TAQH/BAUwAwEB/zAK
   BggqhQMHAQEDAwOBgQBBVwPYkvGl8/aMQ1MYmn7iB7gLVjHvnUlSmk1rVCws+hWq
   LqzxH0cP3n2VSFaQPDX9j5Ve8wDZXHdTSnJKDu5wL4b6YKCBCRoj3XleHjxonuUS
   o8gu4NzCZDx47qj8rNNUklWEhrIPHJ7Bl8kGmYUCYMk7y82cXDMX4ZNE4XOuNg==
   -----END CERTIFICATE-----

     0 426: SEQUENCE {
     4 278:   SEQUENCE {
     8   3:     [0] {
    10   1:       INTEGER 2
          :       }
    13   1:     INTEGER 11
    16  10:     SEQUENCE {
    18   8:       OBJECT IDENTIFIER '1 2 643 7 1 1 3 3'
          :       }
    28  18:     SEQUENCE {
    30  16:       SET {
    32  14:         SEQUENCE {
    34   3:           OBJECT IDENTIFIER commonName (2 5 4 3)
    39   7:           PrintableString 'Example'
          :           }
          :         }
          :       }
    48  32:     SEQUENCE {
    50  13:       UTCTime 01/01/2001 00:00:00 GMT
    65  15:       GeneralizedTime 31/12/2050 00:00:00 GMT
          :       }
    82  18:     SEQUENCE {
    84  16:       SET {
    86  14:         SEQUENCE {
    88   3:           OBJECT IDENTIFIER commonName (2 5 4 3)
    93   7:           PrintableString 'Example'
          :           }
          :         }
          :       }
   102 160:     SEQUENCE {
   105  23:       SEQUENCE {
   107   8:         OBJECT IDENTIFIER '1 2 643 7 1 1 1 2'
   117  11:         SEQUENCE {
   119   9:           OBJECT IDENTIFIER '1 2 643 7 1 2 1 2 0'
          :           }
          :         }
   130 132:       BIT STRING, encapsulates {
   134 128:         OCTET STRING
          :           E1 EF 30 D5 2C 61 33 DD D9 9D 1D 5C 41 45 5C F7
          :           DF 4D 8B 4C 92 5B BC 69 AF 14 33 D1 56 58 51 5A
          :           DD 21 46 85 0C 32 5C 5B 81 C1 33 BE 65 5A A8 C4
          :           D4 40 E7 B9 8A 8D 59 48 7B 0C 76 96 BC C5 5D 11
          :           EC BE 77 36 A9 EC 35 7F F2 FD 39 93 1F 4E 11 4C
          :           B8 CD A3 59 27 0A C7 F0 E7 FF 43 D9 41 94 19 EA
          :           61 FD 2A B7 7F 5D 9F 63 52 3D 3B 50 A0 4F 63 E2
          :           A0 CF 51 B7 C1 3A DC 21 56 0F 0B D4 0C C9 C7 37
          :         }
          :       }
   265  19:     [3] {
   267  17:       SEQUENCE {
   269  15:         SEQUENCE {
   271   3:           OBJECT IDENTIFIER basicConstraints (2 5 29 19)
   276   1:           BOOLEAN TRUE
   279   5:           OCTET STRING, encapsulates {
   281   3:             SEQUENCE {
   283   1:               BOOLEAN TRUE
          :               }
          :             }
          :           }
          :         }
          :       }
          :     }
   286  10:   SEQUENCE {
   288   8:     OBJECT IDENTIFIER '1 2 643 7 1 1 3 3'
          :     }
   298 129:   BIT STRING
          :     41 57 03 D8 92 F1 A5 F3 F6 8C 43 53 18 9A 7E E2
          :     07 B8 0B 56 31 EF 9D 49 52 9A 4D 6B 54 2C 2C FA
          :     15 AA 2E AC F1 1F 47 0F DE 7D 95 48 56 90 3C 35
          :     FD 8F 95 5E F3 00 D9 5C 77 53 4A 72 4A 0E EE 70
          :     2F 86 FA 60 A0 81 09 1A 23 DD 79 5E 1E 3C 68 9E
          :     E5 12 A3 C8 2E E0 DC C2 64 3C 78 EE A8 FC AC D3
          :     54 92 55 84 86 B2 0F 1C 9E C1 97 C9 06 99 85 02
          :     60 C9 3B CB CD 9C 5C 33 17 E1 93 44 E1 73 AE 36
          :   }

D.3.3.  Certificate Revocation List

   -----BEGIN X509 CRL-----
   MIHTMEECAQEwCgYIKoUDBwEBAwMwEjEQMA4GA1UEAxMHRXhhbXBsZRcNMTQwMTAx
   MDAwMDAwWhcNMTQwMTAyMDAwMDAwWjAKBggqhQMHAQEDAwOBgQA6E/t67NtVYO72
   E3z8XdZGkXMuv7NpCh/Ax+ik7uoIMH1kjU3AmGxGqHs/vkx69C6jQ1nHlZVMo5/z
   q77ZBR9NL4b6YKCBCRoj3XleHjxonuUSo8gu4NzCZDx47qj8rNNUklWEhrIPHJ7B
   l8kGmYUCYMk7y82cXDMX4ZNE4XOuNg==
   -----END X509 CRL-----

     0 211: SEQUENCE {
     3  65:   SEQUENCE {
     5   1:     INTEGER 1
     8  10:     SEQUENCE {
    10   8:       OBJECT IDENTIFIER '1 2 643 7 1 1 3 3'
          :       }
    20  18:     SEQUENCE {
    22  16:       SET {
    24  14:         SEQUENCE {
    26   3:           OBJECT IDENTIFIER commonName (2 5 4 3)
    31   7:           PrintableString 'Example'
          :           }
          :         }
          :       }
    40  13:     UTCTime 01/01/2014 00:00:00 GMT
    55  13:     UTCTime 02/01/2014 00:00:00 GMT
          :     }
    70  10:   SEQUENCE {
    72   8:     OBJECT IDENTIFIER '1 2 643 7 1 1 3 3'
          :     }
    82 129:   BIT STRING
          :     3A 13 FB 7A EC DB 55 60 EE F6 13 7C FC 5D D6 46
          :     91 73 2E BF B3 69 0A 1F C0 C7 E8 A4 EE EA 08 30
          :     7D 64 8D 4D C0 98 6C 46 A8 7B 3F BE 4C 7A F4 2E
          :     A3 43 59 C7 95 95 4C A3 9F F3 AB BE D9 05 1F 4D
          :     2F 86 FA 60 A0 81 09 1A 23 DD 79 5E 1E 3C 68 9E
          :     E5 12 A3 C8 2E E0 DC C2 64 3C 78 EE A8 FC AC D3
          :     54 92 55 84 86 B2 0F 1C 9E C1 97 C9 06 99 85 02
          :     60 C9 3B CB CD 9C 5C 33 17 E1 93 44 E1 73 AE 36
          :   }

Appendix E.  GOST R 34.10-2012 Test Parameters (Curve Definition)

   The following parameters must be used for digital signature
   generation and verification.

E.1.  Elliptic Curve Modulus

   The following value is assigned to parameter p in this example:

   p = 36239861022290036359077887536838743060213209255346786050\\
       86546150450856166624002482588482022271496854025090823603\\
       058735163734263822371964987228582907372403

   p = 0x4531ACD1FE0023C7550D267B6B2FEE80922B14B2FFB90F04D4EB7C\\
         09B5D2D15DF1D852741AF4704A0458047E80E4546D35B8336FAC22\\
         4DD81664BBF528BE6373

E.2.  Elliptic Curve Coefficients

   Parameters a and b take the following values in this example:

   a = 7

   a = 0x7

   b = 15186550692108285345089500347140431549287475277402064361\\
       94018823352809982443793732829756914785974674866041605397\\
       883677596626326413990136959047435811826396

   b = 0x1CFF0806A31116DA29D8CFA54E57EB748BC5F377E49400FDD788B6\\
         49ECA1AC4361834013B2AD7322480A89CA58E0CF74BC9E540C2ADD\\
         6897FAD0A3084F302ADC

E.3.  Elliptic Curve Points Group Order

   Parameter m takes the following value in this example:

   m = 36239861022290036359077887536838743060213209255346786050\\
       86546150450856166623969164898305032863068499961404079437\\
       936585455865192212970734808812618120619743

   m = 0x4531ACD1FE0023C7550D267B6B2FEE80922B14B2FFB90F04D4EB7C\\
         09B5D2D15DA82F2D7ECB1DBAC719905C5EECC423F1D86E25EDBE23\\
         C595D644AAF187E6E6DF

E.4.  Order of Cyclic Subgroup of Elliptic Curve Points Group

   Parameter q takes the following value in this example:

   q = 36239861022290036359077887536838743060213209255346786050\\
       86546150450856166623969164898305032863068499961404079437\\
       936585455865192212970734808812618120619743

   q = 0x4531ACD1FE0023C7550D267B6B2FEE80922B14B2FFB90F04D4EB7C\\
         09B5D2D15DA82F2D7ECB1DBAC719905C5EECC423F1D86E25EDBE23\\
         C595D644AAF187E6E6DF

E.5.  Elliptic Curve Point Coordinates

   Point P coordinates take the following values in this example:

   x = 19283569440670228493993094012431375989977866354595079743\\
       57075491307766592685835441065557681003184874819658004903\\
       212332884252335830250729527632383493573274

   x = 0x24D19CC64572EE30F396BF6EBBFD7A6C5213B3B3D7057CC825F910\\
         93A68CD762FD60611262CD838DC6B60AA7EEE804E28BC849977FAC\\
         33B4B530F1B120248A9A

   y = 22887286933719728599700121555294784163535623273295061803\\
       14497425931102860301572814141997072271708807066593850650\\
       334152381857347798885864807605098724013854

   y = 0x2BB312A43BD2CE6E0D020613C857ACDDCFBF061E91E5F2C3F32447\\
         C259F39B2C83AB156D77F1496BF7EB3351E1EE4E43DC1A18B91B24\\
         640B6DBB92CB1ADD371E

Contributors

   Semen Pianov
   InfoTeCS JSC
   Email: Semen.Pianov@infotecs.ru


   Ekaterina Karelina
   InfoTeCS JSC
   Email: Ekaterina.Karelina@infotecs.ru


   Dmitry Belyavsky
   Cryptocom
   Email: beldmit@gmail.com


Authors' Addresses

   Dmitry Baryshkov (editor)
   Linaro Ltd.
   Harston Mill Royston Rd
   Harston, Cambridge
   CB22 7GG
   United Kingdom
   Email: dbaryshkov@gmail.com


   Vasily Nikolaev
   CryptoPro
   18, Suschevsky val
   Moscow
   127018
   Russian Federation
   Phone: +7 (495) 995-48-20
   Email: nikolaev@cryptopro.ru


   Alexander Chelpanov
   InfoTeCS JSC
   Email: Aleksandr.Chelpanov@infotecs.ru