<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.0.40 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-turner-lamps-adding-sha3-to-pkix-01" category="std">

  <front>
    <title abbrev="SHA-3 for PKIX">SHA-3 Related Algorithms and Identifiers for PKIX</title>

    <author initials="S." surname="Turner" fullname="Sean Turner">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>

    <date />

    <area>Security</area>
    <workgroup>Network Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document describes the conventions for using the SHA-3 family of hash functions in the Internet X.509 PKI as one-way hash functions and with the ECDSA signature algorithm; the conventions for the associated ECDSA subject public keys are also described.  Digital signatures are used to sign certificates and CRLs (Certificate Revocation Lists).</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t><xref target="RFC3279"></xref>, <xref target="RFC4055"></xref>, <xref target="RFC5480"></xref>, and <xref target="I-D.ietf-curdle-pkix"></xref> defines the contents of the signatureAlgorithm, signatureValue, signature, and subjectPublicKeyInfo fields within Internet X.509 certificates and CRLs (Certificate Revocation Lists) <xref target="RFC5280"></xref> for a number of algorithms.  This document does the same for the SHA-3 family of one-way hash functions and their use with the ECDSA and RSA PKCS#1 v1.5 digital signature algorithms.</t>

<t>Familiarity with <xref target="RFC5280"></xref> is assumed.</t>

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be interpreted as described in <xref target="RFC2119"></xref>.</t>

</section>
<section anchor="algorithm-support" title="Algorithm Support">

<t>This section describes cryptographic algorithms which may be used with the Internet X.509 Certificate and CRL profile <xref target="RFC5280"></xref>.  This section describes one-way hash functions and digital signature algorithms which may be used to sign certificates and CRLs, and identifies OIDs (Object Identifiers) for public keys contained in a certificate.</t>

<section anchor="sha-3-one-way-hash-functions" title="SHA-3 One-way Hash Functions">

<t>The SHA-3 family of one-way hash functions is specified in <xref target="SHA3"></xref>.  In the SHA-3 family, four hash functions are defined: SHA3-224, SHA3-256, SHA3-384, and SHA3-512; two extendable-output functions, called SHAKE128 and SHAKE256, are also defined but are not addressed by this document.  The respective output lengths, in bits, of the SHA-3 hash functions are 224, 256, 384, and 512 and as of this document’s publication date correspond to 112, 128, 192, and 256 bits of security <xref target="RFC3766"></xref>.  The OIDs (Object Identifiers) for these four hash functions are as follows:</t>

<figure><artwork><![CDATA[
  id-sha3-224 OBJECT IDENTIFIER ::= {
    joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101)
    csor(3) nistAlgorithm(4) hashAlgs(2) 7
    }

  id-sha3-256 OBJECT IDENTIFIER ::= {
    joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101)
    csor(3) nistAlgorithm(4) hashAlgs(2) 8
    }

  id-sha3-384 OBJECT IDENTIFIER ::= {
    joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101)
    csor(3) nistAlgorithm(4) hashAlgs(2) 9
    }

  id-sha3-512 OBJECT IDENTIFIER ::= {
    joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101)
    csor(3) nistAlgorithm(4) hashAlgs(2) 10
    }
]]></artwork></figure>

<t>When using the id-sha3-224, id-sha3-s256, id-sha3-384, or id-sha3-512 algorithm identifiers, the parameters field MUST be absent; not NULL but absent.</t>

</section>
<section anchor="ecdsa-signature-algorithm-with-sha-3" title="ECDSA Signature Algorithm with SHA-3">

<t>The ECDSA (Elliptic Curve Digital Signature Algorithm) is defined in <xref target="DSS"></xref>.  When ECDSA is used in conjunction with one of the SHA-3 one-way hash functions the OID is, respectively:</t>

<figure><artwork><![CDATA[
  id-ecdsa-with-sha3-224 OBJECT IDENTIFIER ::= {
    joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101)
    csor(3) nistAlgorithm(4) sigAlgs(3) 9
    }

  id-ecdsa-with-sha3-256 OBJECT IDENTIFIER ::= {
    joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101)
    csor(3) nistAlgorithm(4) sigAlgs(3) 10
    }

  id-ecdsa-with-sha3-384 OBJECT IDENTIFIER ::= {
    joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) 
    csor(3) nistAlgorithm(4) sigAlgs(3) 11
    }

  id-ecdsa-with-sha3-512 OBJECT IDENTIFIER ::= {
    joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101)
    csor(3) nistAlgorithm(4) sigAlgs(3) 12
    }
]]></artwork></figure>

<t>When these algorithm identifiers appear as the algorithm field in an AlgorithmIdentifier, the encoding MUST omit the parameters field.  That is, the AlgorithmIdentifier SHALL be a SEQUENCE of one component: the OBJECT IDENTIFIER id-ecdsa-with-sha3-224, id-ecdsa-with-sha3-256, id-ecdsa-with-sha3-384, or id-ecdsa-with-sha3-512.</t>

<t>The ECParameters in the subjectPublicKeyInfo field of the issuer’s certificate SHALL apply to the verification of the signature.</t>

<t>When signing, the ECDSA algorithm generates two values.  These values are commonly referred to as r and s.  To easily transfer these two values as one signature, they MUST be ASN.1 encoded using the ECDSA-Sig-Value defined in <xref target="RFC3279"></xref> but repeated here for convenience:</t>

<figure><artwork><![CDATA[
  ECDSA-Sig-Value ::= SEQUENCE {
      r  INTEGER,
      s  INTEGER }
]]></artwork></figure>

</section>
<section anchor="ecdsa-public-keys" title="ECDSA Public Keys">

<t>The conventions for ECDSA public keys is as specified in <xref target="RFC5480"></xref>.</t>

</section>
</section>
<section anchor="security-considerations" title="Security Considerations">

<t>TBD</t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>IANA is kindly requested to register two OIDs in the SMI Security for PKIX Module Identifier registry for the ASN.1 modules found in Appendix A.1 and A.2.  The description is as follows:</t>

<t><list style="symbols">
  <t>id-mod-pkix1-sha3-2015</t>
  <t>id-mod-pkix1-sha3-1988</t>
</list></t>

<t>where the four digits at the end represent the ASN.1’s publication date.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference  anchor='RFC2119' target='http://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference  anchor='RFC3279' target='http://www.rfc-editor.org/info/rfc3279'>
<front>
<title>Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
<author initials='L.' surname='Bassham' fullname='L. Bassham'><organization /></author>
<author initials='W.' surname='Polk' fullname='W. Polk'><organization /></author>
<author initials='R.' surname='Housley' fullname='R. Housley'><organization /></author>
<date year='2002' month='April' />
<abstract><t>This document specifies algorithm identifiers and ASN.1 encoding formats for digital signatures and subject public keys used in the Internet X.509 Public Key Infrastructure (PKI).  Digital signatures are used to sign certificates and certificate revocation list (CRLs).  Certificates include the public key of the named subject.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3279'/>
<seriesInfo name='DOI' value='10.17487/RFC3279'/>
</reference>



<reference  anchor='RFC5280' target='http://www.rfc-editor.org/info/rfc5280'>
<front>
<title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
<author initials='D.' surname='Cooper' fullname='D. Cooper'><organization /></author>
<author initials='S.' surname='Santesson' fullname='S. Santesson'><organization /></author>
<author initials='S.' surname='Farrell' fullname='S. Farrell'><organization /></author>
<author initials='S.' surname='Boeyen' fullname='S. Boeyen'><organization /></author>
<author initials='R.' surname='Housley' fullname='R. Housley'><organization /></author>
<author initials='W.' surname='Polk' fullname='W. Polk'><organization /></author>
<date year='2008' month='May' />
<abstract><t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5280'/>
<seriesInfo name='DOI' value='10.17487/RFC5280'/>
</reference>



<reference  anchor='RFC5480' target='http://www.rfc-editor.org/info/rfc5480'>
<front>
<title>Elliptic Curve Cryptography Subject Public Key Information</title>
<author initials='S.' surname='Turner' fullname='S. Turner'><organization /></author>
<author initials='D.' surname='Brown' fullname='D. Brown'><organization /></author>
<author initials='K.' surname='Yiu' fullname='K. Yiu'><organization /></author>
<author initials='R.' surname='Housley' fullname='R. Housley'><organization /></author>
<author initials='T.' surname='Polk' fullname='T. Polk'><organization /></author>
<date year='2009' month='March' />
<abstract><t>This document specifies the syntax and semantics for the Subject Public Key Information field in certificates that support Elliptic Curve Cryptography.  This document updates Sections 2.3.5 and 5, and the ASN.1 module of &quot;Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile&quot;, RFC 3279.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5480'/>
<seriesInfo name='DOI' value='10.17487/RFC5480'/>
</reference>



<reference  anchor='RFC5912' target='http://www.rfc-editor.org/info/rfc5912'>
<front>
<title>New ASN.1 Modules for the Public Key Infrastructure Using X.509 (PKIX)</title>
<author initials='P.' surname='Hoffman' fullname='P. Hoffman'><organization /></author>
<author initials='J.' surname='Schaad' fullname='J. Schaad'><organization /></author>
<date year='2010' month='June' />
<abstract><t>The Public Key Infrastructure using X.509 (PKIX) certificate format, and many associated formats, are expressed using ASN.1.  The current ASN.1 modules conform to the 1988 version of ASN.1.  This document updates those ASN.1 modules to conform to the 2002 version of ASN.1. There are no bits-on-the-wire changes to any of the formats; this is simply a change to the syntax.  This document is not an Internet  Standards Track specification; it is published for informational  purposes.</t></abstract>
</front>
<seriesInfo name='RFC' value='5912'/>
<seriesInfo name='DOI' value='10.17487/RFC5912'/>
</reference>


<reference anchor="DSS" >
  <front>
    <title>Digital Signature Standard, version 4</title>
    <author >
      <organization>National Institute of Standards and Technology, U.S. Department of Commerce</organization>
    </author>
    <date year="2013"/>
  </front>
  <seriesInfo name="NIST" value="FIPS PUB 186-4"/>
</reference>
<reference anchor="SHA3" >
  <front>
    <title>SHA-3 Standard - Permutation-Based Hash and Extendable-Output Functions</title>
    <author >
      <organization>National Institute of Standards and Technology, U.S. Department of Commerce</organization>
    </author>
    <date year="2015" month="August"/>
  </front>
  <seriesInfo name="NIST" value="FIPS PUB 202"/>
</reference>


    </references>

    <references title='Informative References'>





<reference  anchor='RFC3766' target='http://www.rfc-editor.org/info/rfc3766'>
<front>
<title>Determining Strengths For Public Keys Used For Exchanging Symmetric Keys</title>
<author initials='H.' surname='Orman' fullname='H. Orman'><organization /></author>
<author initials='P.' surname='Hoffman' fullname='P. Hoffman'><organization /></author>
<date year='2004' month='April' />
<abstract><t>Implementors of systems that use public key cryptography to exchange symmetric keys need to make the public keys resistant to some predetermined level of attack.  That level of attack resistance is the strength of the system, and the symmetric keys that are exchanged must be at least as strong as the system strength requirements.  The three quantities, system strength, symmetric key strength, and public key strength, must be consistently matched for any network protocol usage.  While it is fairly easy to express the system strength requirements in terms of a symmetric key length and to choose a cipher that has a key length equal to or exceeding that requirement, it is harder to choose a public key that has a cryptographic strength meeting a symmetric key strength requirement.  This document explains how to determine the length of an asymmetric key as a function of a symmetric key strength requirement.  Some rules of thumb for estimating equivalent resistance to large-scale attacks on various algorithms are given.  The document also addresses how changing the sizes of the underlying large integers (moduli, group sizes, exponents, and so on) changes the time to use the algorithms for key exchange.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='86'/>
<seriesInfo name='RFC' value='3766'/>
<seriesInfo name='DOI' value='10.17487/RFC3766'/>
</reference>



<reference  anchor='RFC4055' target='http://www.rfc-editor.org/info/rfc4055'>
<front>
<title>Additional Algorithms and Identifiers for RSA Cryptography for use in the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
<author initials='J.' surname='Schaad' fullname='J. Schaad'><organization /></author>
<author initials='B.' surname='Kaliski' fullname='B. Kaliski'><organization /></author>
<author initials='R.' surname='Housley' fullname='R. Housley'><organization /></author>
<date year='2005' month='June' />
<abstract><t>This document supplements RFC 3279.  It describes the conventions for using the RSA Probabilistic Signature Scheme (RSASSA-PSS) signature algorithm, the RSA Encryption Scheme - Optimal Asymmetric Encryption Padding (RSAES-OAEP) key transport algorithm and additional one-way hash functions with the Public-Key Cryptography Standards (PKCS) #1 version 1.5 signature algorithm in the Internet X.509 Public Key Infrastructure (PKI).  Encoding formats, algorithm identifiers, and parameter formats are specified.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4055'/>
<seriesInfo name='DOI' value='10.17487/RFC4055'/>
</reference>



<reference anchor='I-D.ietf-curdle-pkix'>
<front>
<title>Algorithm Identifiers for Ed25519, Ed25519ph, Ed448, Ed448ph, X25519 and X448 for use in the Internet X.509 Public Key Infrastructure</title>

<author initials='S' surname='Josefsson' fullname='Simon Josefsson'>
    <organization />
</author>

<author initials='J' surname='Schaad' fullname='Jim Schaad'>
    <organization />
</author>

<date month='November' day='23' year='2016' />

<abstract><t>This document specifies algorithm identifiers and ASN.1 encoding formats for Elliptic Curve constructs using the Curve25519 and Curve448 curves.  The signature algorithms covered are Ed25519, Ed25519ph, Ed448 and Ed448ph.  The key agreement algorithm covered are X25519 and X448.  The encoding for Public Key, Private Key and EdDSA digital signature structures is provided.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-curdle-pkix-03' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-curdle-pkix-03.txt' />
</reference>




    </references>


<section anchor="asn1-module" title="2015 ASN.1 Module">

<figure><artwork><![CDATA[
PKIXAlgsForSHA3-2015 { iso(1) identified-organization(3) dod(6)
  internet(1) security(5) mechanisms(5) pkix(7) id-mod(0)
  id-mod-pkix1-sha3-2015(TBD) }

DEFINITIONS EXPLICIT TAGS ::=

BEGIN

-- EXPORTS ALL;

IMPORTS

PUBLIC-KEY, SIGNATURE-ALGORITHM, DIGEST-ALGORITHM, SMIME-CAPS
FROM AlgorithmInformation-2009 -- in [RFC5912]
  { iso(1) identified-organization(3) dod(6) internet(1) security(5)
    mechanisms(5) pkix(7) id-mod(0)
    id-mod-algorithmInformation-02(58) }

pk-ec, id-ecPublicKey, ECPoint, ECDSA-Sig-Value
FROM PKIXAlgs-2009 -- in [RFC5912]
   { iso(1) identified-organization(3) dod(6) internet(1) security(5)
     mechanisms(5) pkix(7) id-mod(0)
     id-mod-pkix1-algorithms2008-02(56) }

;

--
-- Message Digest Algorithms (mda-)
--

HashAlgs DIGEST-ALGORITHM ::= {
   ...,
   -- This expands HashAlgs from [RFC5912]
   mda-sha3-256 |
   mda-sha3-384 |
   mda-sha3-512
  }

-- SHA3-256

mda-sha3-256 DIGEST-ALGORITHM ::= {
  IDENTIFIER id-sha3-256
  PARAMS ARE absent
  }

id-sha3-256 OBJECT IDENTIFIER ::= {
  joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101)
  csor(3) nistAlgorithm(4) hashAlgs(2) 8
  }

-- SHA3-384

mda-sha3-384 DIGEST-ALGORITHM ::= {
  IDENTIFIER id-sha3-384
  PARAMS ARE absent
  }

id-sha3-384 OBJECT IDENTIFIER ::= {
  joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101)
  csor(3) nistAlgorithm(4) hashAlgs(2) 9
  }

-- SHA3-512

mda-sha3-512 DIGEST-ALGORITHM ::= {
  IDENTIFIER id-sha3-512 
  PARAMS ARE absent
  }

id-sha3-512 OBJECT IDENTIFIER ::= {
  joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101)
  csor(3) nistAlgorithm(4) hashAlgs(2) 10
  }

--
-- Public Key (pk-) Algorithms
--

-- See [RFC5912].

--
-- Signature Algorithms (sa-)
--

SignatureAlgs SIGNATURE-ALGORITHM ::= {
  ...,
  -- This expands SignatureAlgorithms from [RFC5912]
  sa-ecdsaWithSHA3-256 |
  sa-ecdsaWithSHA3-384 |
  sa-ecdsaWithSHA3-512
  }

-- ECDSA with SHA3-256

sa-ecdsaWithSHA3-256 SIGNATURE-ALGORITHM ::= {
   IDENTIFIER id-ecdsa-with-SHA3-256
   VALUE ECDSA-Sig-Value
   PARAMS TYPE NULL ARE absent
   HASHES { mda-sha3-256 }
   PUBLIC-KEYS { pk-ec }
   SMIME-CAPS { IDENTIFIED BY id-ecdsa-with-SHA3-256 }
   }

id-ecdsa-with-sha3-256 OBJECT IDENTIFIER ::= {
  joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101)
  csor(3) nistAlgorithm(4) sigAlgs(3) 10
  }

-- ECDSA with SHA3-384

sa-ecdsaWithSHA3-384 SIGNATURE-ALGORITHM ::= {
   IDENTIFIER id-ecdsa-with-SHA3-384
   VALUE ECDSA-Sig-Value
   PARAMS TYPE NULL ARE absent
   HASHES { mda-sha3-384 }
   PUBLIC-KEYS { pk-ec }
   SMIME-CAPS { IDENTIFIED BY id-ecdsa-with-SHA3-384 }
   }

id-ecdsa-with-sha3-384 OBJECT IDENTIFIER ::= {
  joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101)
  csor(3) nistAlgorithm(4) sigAlgs(3) 11
  }

-- ECDSA with SHA3-512

sa-ecdsaWithSHA3-512 SIGNATURE-ALGORITHM ::= {
   IDENTIFIER id-ecdsa-with-SHA3-512
   VALUE ECDSA-Sig-Value
   PARAMS TYPE NULL ARE absent
   HASHES { mda-sha3-512 }
   PUBLIC-KEYS { pk-ec }
   SMIME-CAPS { IDENTIFIED BY id-ecdsa-with-SHA3-512 }
   }

id-ecdsa-with-sha3-512 OBJECT IDENTIFIER ::= {
  joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101)
  csor(3) nistAlgorithm(4) sigAlgs(3) 12
  }

--
-- SMIME Capabilities (sa-)
--

SMimeCaps SMIME-CAPS ::= {
  ...,
  -- The expands SMimeCaps from [RFC5912]
  sa-ecdsaWithSHA3-256.&smimeCaps |
  sa-ecdsaWithSHA3-384.&smimeCaps |
  sa-ecdsaWithSHA3-512.&smimeCaps
  }


END
]]></artwork></figure>

</section>
<section anchor="asn1-module-1" title="1988 ASN.1 Module">

<figure><artwork><![CDATA[
PKIXAlgsForSHA3-1988 { iso(1) identified-organization(3) dod(6)
  internet(1) security(5) mechanisms(5) pkix(7) id-mod(0)
  id-mod-pkix1-sha3-1988(TBD) }

DEFINITIONS EXPLICIT TAGS ::=

BEGIN

-- EXPORTS ALL;

-- IMPORTS NONE;

--
-- Message Digest Algorithms
--

-- SHA3-256
-- Parameters are absent

id-sha3-256 OBJECT IDENTIFIER ::= {
  joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101)
  csor(3) nistAlgorithm(4) hashAlgs(2) 8
  }

-- SHA3-384
-- Parameters are absent

id-sha3-384 OBJECT IDENTIFIER ::= {
  joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101)
  csor(3) nistAlgorithm(4) hashAlgs(2) 9
  }

-- SHA3-512
-- Parameters are absent

id-sha3-512 OBJECT IDENTIFIER ::= {
  joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101)
  csor(3) nistAlgorithm(4) hashAlgs(2) 10
  }

--
-- ECDSA Keys, Signatures, and Curves
--

-- OID for ECDSA signatures with SHA3-256

id-ecdsa-with-sha3-256 OBJECT IDENTIFIER ::= {
  joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101)
  csor(3) nistAlgorithm(4) sigAlgs(3) 10
  }

-- OID for ECDSA signatures with SHA3-384

id-ecdsa-with-sha3-384 OBJECT IDENTIFIER ::= {
  joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101)
  csor(3) nistAlgorithm(4) sigAlgs(3) 11
  }

-- OID for ECDSA signatures with SHA3-512

id-ecdsa-with-sha3-512 OBJECT IDENTIFIER ::= {
  joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101)
  csor(3) nistAlgorithm(4) sigAlgs(3) 12
  }

-- See [RFC5480] for ECDSA-Sig-Value, which is the format for
-- the value of an ECDSA signature value.

-- See [RFC5480] for ECDSA Keys and Curves. 

END
]]></artwork></figure>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

