ITU-T Rec. X.509 (11/1988) – THE DIRECTORY – AUTHENTICATION FRAMEWORK
CONTENTS
0 Introduction
1 Scope and field of application
2 References
3 Definitions
4 Notation and abbreviations
5 Simple authentication procedure
6 Basis of strong authentication
7 Obtaining a user's public key
8 Digital signatures
9 Strong authentication procedures
9.1 Overview
9.2 One-way authentication
9.3 Two-way authentication
9.4 Three-way authentication
10 Management of keys and certificates
10.1 Generation of key pairs
10.2 Management of certificates
ANNEX A – Security requirements
A.1 Threats
A.2 Security services
A.3 Security mechanisms
A.4 Threats protected against by the security services
A.5 Negotiation of security services and mechanisms
ANNEX B – An introduction to public key cryptography
ANNEX C – The RSA public key cryptosystem
C.1 Scope and field of application
C.2 References
C.3 Definitions
C.4 Symbols and abbreviations
C.5 Description
C.6 Security requirements
C.7 Public exponent
C.8 Conformance
ANNEX D – Hash functions
D.1 Requirements for hash functions
D.2 Description of a hash function
ANNEX E – Threats protected against by the strong authentication method
ANNEX F – Data confidentiality
F.1 Introduction
F.2 Data confidentiality by asymmetric encipherment
F.3 Data confidentiality by symmetric encipherment
ANNEX G – Authentication framework in ASN.1
ANNEX H – Reference Definition of algorithm object identifiers