• ITU-T Rec. X.509 (11/1988) – THE DIRECTORY – AUTHENTICATION FRAMEWORK
  • CONTENTS
  • 0 Introduction
  • 1 Scope and field of application
  • 2 References
  • 3 Definitions
  • 4 Notation and abbreviations
  • 5 Simple authentication procedure
  • 6 Basis of strong authentication
  • 7 Obtaining a user's public key
  • 8 Digital signatures
  • 9 Strong authentication procedures
    • 9.1 Overview
    • 9.2 One-way authentication
    • 9.3 Two-way authentication
    • 9.4 Three-way authentication
  • 10 Management of keys and certificates
    • 10.1 Generation of key pairs
    • 10.2 Management of certificates
  • ANNEX A – Security requirements
  • A.1 Threats
  • A.2 Security services
  • A.3 Security mechanisms
  • A.4 Threats protected against by the security services
  • A.5 Negotiation of security services and mechanisms
  • ANNEX B – An introduction to public key cryptography
  • ANNEX C – The RSA public key cryptosystem
  • C.1 Scope and field of application
  • C.2 References
  • C.3 Definitions
  • C.4 Symbols and abbreviations
  • C.5 Description
  • C.6 Security requirements
  • C.7 Public exponent
  • C.8 Conformance
  • ANNEX D – Hash functions
  • D.1 Requirements for hash functions
  • D.2 Description of a hash function
  • ANNEX E – Threats protected against by the strong authentication method
  • ANNEX F – Data confidentiality
  • F.1 Introduction
  • F.2 Data confidentiality by asymmetric encipherment
  • F.3 Data confidentiality by symmetric encipherment
  • ANNEX G – Authentication framework in ASN.1
  • ANNEX H – Reference Definition of algorithm object identifiers