| < draft-gutmann-testkeys-00.txt | draft-gutmann-testkeys-01.txt > | |||
|---|---|---|---|---|
| Network Working Group P. Gutmann | Network Working Group P. Gutmann | |||
| Internet-Draft University of Auckland | Internet-Draft University of Auckland | |||
| Intended status: Informational 20 February 2022 | Intended status: Informational C. Bonnell | |||
| Expires: 24 August 2022 | Expires: 22 September 2022 DigiCert | |||
| 21 March 2022 | ||||
| Standard PKC Test Keys | Standard PKC Test Keys | |||
| draft-gutmann-testkeys-00 | draft-gutmann-testkeys-01 | |||
| Abstract | Abstract | |||
| This document provides a set of standard PKC test keys that may be | This document provides a set of standard PKC test keys that may be | |||
| used wherever pre-generated keys and associated operations like | used wherever pre-generated keys and associated operations like | |||
| digitial signatures are required. Like the EICAR virus test file, | digitial signatures are required. Like the EICAR virus test file, | |||
| these widely-known test keys can be detected and recognised by | these widely-known test keys can be detected and recognised by | |||
| applications consuming them as being purely for testing purposes | applications consuming them as being purely for testing purposes | |||
| without assigning any security properties to them. | without assigning any security properties to them. | |||
| skipping to change at page 1, line 35 ¶ | skipping to change at page 1, line 36 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | Drafts is at https://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on 24 August 2022. | This Internet-Draft will expire on 22 September 2022. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2022 IETF Trust and the persons identified as the | Copyright (c) 2022 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents (https://trustee.ietf.org/ | Provisions Relating to IETF Documents (https://trustee.ietf.org/ | |||
| license-info) in effect on the date of publication of this document. | license-info) in effect on the date of publication of this document. | |||
| Please review these documents carefully, as they describe your rights | Please review these documents carefully, as they describe your rights | |||
| skipping to change at page 2, line 23 ¶ | skipping to change at page 2, line 32 ¶ | |||
| not be created outside the IETF Standards Process, except to format | not be created outside the IETF Standards Process, except to format | |||
| it for publication as an RFC or to translate it into languages other | it for publication as an RFC or to translate it into languages other | |||
| than English. | than English. | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | |||
| 1.1. Conventions Used in This Document . . . . . . . . . . . . 3 | 1.1. Conventions Used in This Document . . . . . . . . . . . . 3 | |||
| 2. Widely-known Test Keys . . . . . . . . . . . . . . . . . . . 3 | 2. Widely-known Test Keys . . . . . . . . . . . . . . . . . . . 3 | |||
| 2.1. RSA Keys . . . . . . . . . . . . . . . . . . . . . . . . 3 | 2.1. RSA Keys . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 2.2. DLP Keys . . . . . . . . . . . . . . . . . . . . . . . . 15 | 2.2. DLP Keys . . . . . . . . . . . . . . . . . . . . . . . . 18 | |||
| 2.3. ECDLP Keys . . . . . . . . . . . . . . . . . . . . . . . 24 | 2.3. ECDLP Keys . . . . . . . . . . . . . . . . . . . . . . . 28 | |||
| 3. Contributors/Acknowledgements . . . . . . . . . . . . . . . . 26 | 3. Contributors/Acknowledgements . . . . . . . . . . . . . . . . 32 | |||
| 4. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 26 | 4. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 32 | |||
| 5. Security Considerations . . . . . . . . . . . . . . . . . . . 26 | 5. Security Considerations . . . . . . . . . . . . . . . . . . . 32 | |||
| 6. Normative References . . . . . . . . . . . . . . . . . . . . 27 | 6. Normative References . . . . . . . . . . . . . . . . . . . . 32 | |||
| Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 27 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 32 | |||
| 1. Introduction | 1. Introduction | |||
| The widespread use of PKCs on the Internet has led to a proliferation | The widespread use of PKCs on the Internet has led to a proliferation | |||
| of publicly-known but not necessarily acknowledged keys used for | of publicly-known but not necessarily acknowledged keys used for | |||
| testing purposes or that ship preconfigured in applications. These | testing purposes or that ship preconfigured in applications. These | |||
| keys provide no security, but since there's no record of them it's | keys provide no security, but since there's no record of them it's | |||
| often not known that they provide no security. In order to address | often not known that they provide no security. In order to address | |||
| this issue, this document provides a set of widely-known test keys | this issue, this document provides a set of widely-known test keys | |||
| that may be used wherever a preconfigured or sample key is required, | that may be used wherever a preconfigured or sample key is required, | |||
| skipping to change at page 3, line 21 ¶ | skipping to change at page 3, line 28 ¶ | |||
| capitals, as shown here. | capitals, as shown here. | |||
| 2. Widely-known Test Keys | 2. Widely-known Test Keys | |||
| This section provides the test keys for the algorithm groups in | This section provides the test keys for the algorithm groups in | |||
| various sizes in a C-like notation that may be directly used in | various sizes in a C-like notation that may be directly used in | |||
| crypto code written in C- like languages such as C, C++, Java, | crypto code written in C- like languages such as C, C++, Java, | |||
| JavaScript, Go, Swift, and Rust, covering the majority of languages | JavaScript, Go, Swift, and Rust, covering the majority of languages | |||
| likely to be used to implement crypto code. | likely to be used to implement crypto code. | |||
| Alongside the source-code format, they are also provided in encoded | ||||
| form, specifically the OpenSSL private-key format which many | ||||
| applications can process directly. | ||||
| Each element of the key is given in a form consisting of a count in | Each element of the key is given in a form consisting of a count in | |||
| bits followed by a byte string containing that key element in little- | bits followed by a byte string containing that key element in big- | |||
| endian form. For example for the RSA p value it might be: | endian form. For example for the RSA p value it might be: | |||
| Sample key component | Sample key component | |||
| /* p */ | /* p */ | |||
| 512, | 512, | |||
| { 0xCF, 0xDA, 0xF9, 0x99, 0x6F, 0x05, 0x95, 0x84, | { 0xCF, 0xDA, 0xF9, 0x99, 0x6F, 0x05, 0x95, 0x84, | |||
| 0x09, 0x90, 0xB3, 0xAB, 0x39, 0xB7, 0xDD, 0x1D, | 0x09, 0x90, 0xB3, 0xAB, 0x39, 0xB7, 0xDD, 0x1D, | |||
| [...] | [...] | |||
| 0xE1, 0x2C, 0x0D, 0xF7, 0x30, 0xE2, 0xB8, 0x09, | 0xE1, 0x2C, 0x0D, 0xF7, 0x30, 0xE2, 0xB8, 0x09, | |||
| 0x73, 0x50, 0x28, 0xF6, 0x55, 0x85, 0x57, 0x03 }, | 0x73, 0x50, 0x28, 0xF6, 0x55, 0x85, 0x57, 0x03 }, | |||
| where 0xCF is the least-significant byte of the RSA p value and 0x03 | where 0xCF is the most-significant byte of the RSA p value and 0x03 | |||
| is the most-significant byte of the value. | is the least-significant byte of the value. | |||
| 2.1. RSA Keys | 2.1. RSA Keys | |||
| The following widely-known test keys may be used for RSA. | The following widely-known test keys may be used for RSA. | |||
| RSA-1024 key | RSA-1024 key | |||
| /* n */ | /* n */ | |||
| 1024, | 1024, | |||
| { 0xB0, 0xD1, 0x83, 0x52, 0xA8, 0x8F, 0x53, 0xD5, | { 0xB0, 0xD1, 0x83, 0x52, 0xA8, 0x8F, 0x53, 0xD5, | |||
| skipping to change at page 5, line 37 ¶ | skipping to change at page 5, line 48 ¶ | |||
| 511, | 511, | |||
| { 0x41, 0x99, 0x79, 0x16, 0x16, 0x72, 0x21, 0x3E, | { 0x41, 0x99, 0x79, 0x16, 0x16, 0x72, 0x21, 0x3E, | |||
| 0x0A, 0xB7, 0xB9, 0x77, 0x37, 0xD9, 0x92, 0x89, | 0x0A, 0xB7, 0xB9, 0x77, 0x37, 0xD9, 0x92, 0x89, | |||
| 0x9E, 0x5C, 0x4D, 0x31, 0x06, 0xB8, 0x5E, 0x71, | 0x9E, 0x5C, 0x4D, 0x31, 0x06, 0xB8, 0x5E, 0x71, | |||
| 0x5D, 0x1B, 0x3A, 0xAE, 0x84, 0x29, 0x62, 0xD2, | 0x5D, 0x1B, 0x3A, 0xAE, 0x84, 0x29, 0x62, 0xD2, | |||
| 0x54, 0x4F, 0xB2, 0xAF, 0xA9, 0x80, 0x97, 0x4E, | 0x54, 0x4F, 0xB2, 0xAF, 0xA9, 0x80, 0x97, 0x4E, | |||
| 0x53, 0x85, 0x12, 0xBD, 0x0C, 0x27, 0xCF, 0x48, | 0x53, 0x85, 0x12, 0xBD, 0x0C, 0x27, 0xCF, 0x48, | |||
| 0xEA, 0x72, 0x17, 0xAA, 0xE0, 0x37, 0x74, 0x22, | 0xEA, 0x72, 0x17, 0xAA, 0xE0, 0x37, 0x74, 0x22, | |||
| 0xC8, 0x20, 0x3D, 0x27, 0xFD, 0x45, 0x96, 0xE5 } | 0xC8, 0x20, 0x3D, 0x27, 0xFD, 0x45, 0x96, 0xE5 } | |||
| RSA-1024 key in encoded form | ||||
| -----BEGIN RSA PRIVATE KEY----- | ||||
| MIICXQIBAAKBgQCw0YNSqI9T1VFvRsIOejZ9feiKz1SgGfbe9Xq5tEzt2yJCsbyg | ||||
| +xtcuCswNhdqY5A1ZN7G60HbL4/Hh/TlLhFJ4zNHVylz9mDDx3yp4IIcK2lb566d | ||||
| fTD0B5EQ9Iqub4twLUdLKQCBfyhmJJvsEqKxm4J4QWgI+Brh/Pm3d4piPwIDAQAB | ||||
| AoGASC6fj6TkLfMNdYHLQqG9kOlPfys4fstarpZD7X+fUBJ/H/7y5DzeZLGCYAIU | ||||
| +QeAHWv6TfZIQjReW7Qy00RFJdgwFlTFRCsKXhG5x+IB+jL0Grr08KbgPPDgy4Jm | ||||
| xirRHZVtU8lGbkiZX+omDIU28EHLNWL6rFEcTWao/tERspECQQDp2G5Nw0qYWn7H | ||||
| Wm9Up1zkUTnkUkCzhqtxHbeRvNmHGKE7ryGMJEk2RmgHVstQpsvuFY4lIUSZEjAc | ||||
| DUFJERhFAkEAwZH6O1ULORp8sHKDdidyleYcZU8L7y9Y3OXJYqELfddfBgFUZeVQ | ||||
| duRmJj7ryu0g0uurOTE+i8VnMg/ostxiswJBAOc64Dd8uLJWKa6uug+XPr91oi0n | ||||
| OFtM+xHrNK2jc+WmcSg3UJDnAI3uqMc5B+pERLq0Dc6hStehqHjUko3RnZECQEGZ | ||||
| eRYWciE+Cre5dzfZkomeXE0xBrhecV0bOq6EKWLSVE+yr6mAl05ThRK9DCfPSOpy | ||||
| F6rgN3QiyCA9J/1FluUCQQC5nX+PTU1FXx+6Ri2ZCi6EjEKMHr7gHcABhMinZYOt | ||||
| N59pra9UdVQw9jxCU9G7eMyb0jJkNACAuEwakX3gi27b | ||||
| -----END RSA PRIVATE KEY----- | ||||
| RSA-2048 key | RSA-2048 key | |||
| /* n */ | /* n */ | |||
| 2048, | 2048, | |||
| { 0xB0, 0xF9, 0xE8, 0x19, 0x43, 0xA7, 0xAE, 0x98, | { 0xB0, 0xF9, 0xE8, 0x19, 0x43, 0xA7, 0xAE, 0x98, | |||
| 0x92, 0xAA, 0xDE, 0x17, 0xCA, 0x7C, 0x40, 0xF8, | 0x92, 0xAA, 0xDE, 0x17, 0xCA, 0x7C, 0x40, 0xF8, | |||
| 0x74, 0x4F, 0xED, 0x2F, 0x81, 0x48, 0xE6, 0xC8, | 0x74, 0x4F, 0xED, 0x2F, 0x81, 0x48, 0xE6, 0xC8, | |||
| 0xEA, 0xA2, 0x7B, 0x7D, 0x00, 0x15, 0x48, 0xFB, | 0xEA, 0xA2, 0x7B, 0x7D, 0x00, 0x15, 0x48, 0xFB, | |||
| 0x51, 0x92, 0xAB, 0x28, 0xB5, 0x6C, 0x50, 0x60, | 0x51, 0x92, 0xAB, 0x28, 0xB5, 0x6C, 0x50, 0x60, | |||
| 0xB1, 0x18, 0xCC, 0xD1, 0x31, 0xE5, 0x94, 0x87, | 0xB1, 0x18, 0xCC, 0xD1, 0x31, 0xE5, 0x94, 0x87, | |||
| skipping to change at page 9, line 10 ¶ | skipping to change at page 9, line 42 ¶ | |||
| 0xA2, 0x34, 0xA5, 0x66, 0x8D, 0xED, 0x08, 0x01, | 0xA2, 0x34, 0xA5, 0x66, 0x8D, 0xED, 0x08, 0x01, | |||
| 0xB8, 0x59, 0xF3, 0x43, 0xF1, 0xCE, 0x93, 0x04, | 0xB8, 0x59, 0xF3, 0x43, 0xF1, 0xCE, 0x93, 0x04, | |||
| 0xE6, 0xFA, 0xA2, 0xB0, 0x02, 0xCA, 0xD9, 0xB7, | 0xE6, 0xFA, 0xA2, 0xB0, 0x02, 0xCA, 0xD9, 0xB7, | |||
| 0x8C, 0xDE, 0x5C, 0xDC, 0x2C, 0x1F, 0xB4, 0x17, | 0x8C, 0xDE, 0x5C, 0xDC, 0x2C, 0x1F, 0xB4, 0x17, | |||
| 0x1C, 0x42, 0x42, 0x16, 0x70, 0xA6, 0xAB, 0x0F, | 0x1C, 0x42, 0x42, 0x16, 0x70, 0xA6, 0xAB, 0x0F, | |||
| 0x50, 0xCC, 0x4A, 0x19, 0x4E, 0xB3, 0x6D, 0x1C, | 0x50, 0xCC, 0x4A, 0x19, 0x4E, 0xB3, 0x6D, 0x1C, | |||
| 0x91, 0xE9, 0x35, 0xBA, 0x01, 0xB9, 0x59, 0xD8, | 0x91, 0xE9, 0x35, 0xBA, 0x01, 0xB9, 0x59, 0xD8, | |||
| 0x72, 0x8B, 0x9E, 0x64, 0x42, 0x6B, 0x3F, 0xC3, | 0x72, 0x8B, 0x9E, 0x64, 0x42, 0x6B, 0x3F, 0xC3, | |||
| 0xA7, 0x50, 0x6D, 0xEB, 0x52, 0x39, 0xA8, 0xA7 } | 0xA7, 0x50, 0x6D, 0xEB, 0x52, 0x39, 0xA8, 0xA7 } | |||
| RSA-2048 key in encoded form | ||||
| -----BEGIN RSA PRIVATE KEY----- | ||||
| MIIEowIBAAKCAQEAsPnoGUOnrpiSqt4XynxA+HRP7S+BSObI6qJ7fQAVSPtRkqso | ||||
| tWxQYLEYzNEx5ZSHTGypibVsJylvCfuToDTfMul8b/CZjP2Ob0LdpYrNH6l5hvFE | ||||
| 89FU1nZQF15oVLOpUgA7wGiHuEVawrGfey92UE68mOyUVXGweJIVDdxqdMoPvNNU | ||||
| l86BU02vlBiESxOuox+dWmuVV7vfYZ79Toh/LUK43YvJh+rhv4nKuF7iHjVjBd9s | ||||
| B6iDjj70HFldzOQ9r8SRI+9NirupPTkF5AKNe6kUhKJ1luB7S27ZkvB3tSTT3P59 | ||||
| 3VVJvnzOjaA1z6Cz+4+eRvcysqhrRgFlwI9TEwIDAQABAoIBAEEYiyDP29vCzx/+ | ||||
| dS3LqnI5BjUuJhXUnc6AWX/PCgVAO+8A+gZRgvct7PtZb0sM6P9ZcLrweomlGezI | ||||
| FrL0/6xQaa8bBr/ve/a8155OgcjFo6fZEw3Dz7ra5fbSiPmu4/b/kvrg+Br1l77J | ||||
| aun6uUAs1f5B9wW+vbR7tzbT/mxaUeDiBzKpe15GwcvbJtdIVMa2YErtRjc1/5B2 | ||||
| BGVXyvlJv0SIlcIEMsHgnAFOp1ZgQ08aDzvilLq8XVMOahAhP1O2A3X8hKdXPyrx | ||||
| IVWE9bS9ptTo+eF6eNl+d7htpKGEZHUxinoQpWEBTv+iOoHsVunkEJ3vjLP3lyI/ | ||||
| fY0NQ1ECgYEA3RBXAjgvIys2gfU3keImF8e/TprLge1I2vbWmV2j6rZCg5r/AS0u | ||||
| pii5CvJ5/T5vfJPNgPBy8B/yRDs+6PJO1GmnlhOkG9JAIPkv0RBZvR0PMBtbp6nT | ||||
| Y3yo1lwamBVBfY6rc0sLTzosZh2aGoLzrHNMQFMGaauORzBFpY5lU50CgYEAzPHl | ||||
| u5DI6Xgep1vr8QvCUuEesCOgJg8Yh1UqVoY/SmQh6MYAv1I9bLGwrb3WW/7kqIoD | ||||
| fj0aQV5buVZI2loMomtU9KY5SFIsPV+JuUpy7/+VE01ZQM5FdY8wiYCQiVZYju9X | ||||
| Wz5LxMNoz+gT7pwlLCsC4N+R8aoBk404aF1gum8CgYAJ7VTq7Zj4TFV7Soa/T1eE | ||||
| k9y8a+kdoYk3BASpCHJ29M5R2KEA7YV9wrBklHTz8VzSTFTbKHEQ5W5csAhoL5Fo | ||||
| qoHzFFi3Qx7MHESQb9qHyolHEMNx6QdsHUn7rlEnaTTyrXh3ifQtD6C0yTmFXUIS | ||||
| CW9wKApOrnyKJ9nI0HcuZQKBgQCMtoV6e9VGX4AEfpuHvAAnMYQFgeBiYTkBKltQ | ||||
| XwozhH63uMMomUmtSG87Sz1TmrXadjAhy8gsG6I0pWaN7QgBuFnzQ/HOkwTm+qKw | ||||
| AsrZt4zeXNwsH7QXHEJCFnCmqw9QzEoZTrNtHJHpNboBuVnYcoueZEJrP8OnUG3r | ||||
| UjmopwKBgAqB2KYYMUqAOvYcBnEfLDmyZv9BTVNHbR2lKkMYqv5LlvDaBxVfilE0 | ||||
| 2riO4p6BaAdvzXjKeRrGNEKoHNBpOSfYCOM16NjL8hIZB1CaV3WbT5oY+jp7Mzd5 | ||||
| 7d56RZOE+ERK2uz/7JX9VSsM/LbH9pJibd4e8mikDS9ntciqOH/3 | ||||
| -----END RSA PRIVATE KEY----- | ||||
| RSA-4096 key | RSA-4096 key | |||
| /* n */ | /* n */ | |||
| 4096, | 4096, | |||
| { 0xB3, 0x8B, 0x49, 0x60, 0xE6, 0x3B, 0xE6, 0xA8, | { 0xB3, 0x8B, 0x49, 0x60, 0xE6, 0x3B, 0xE6, 0xA8, | |||
| 0xDB, 0xA8, 0x9A, 0x82, 0x97, 0x8E, 0xF1, 0xF6, | 0xDB, 0xA8, 0x9A, 0x82, 0x97, 0x8E, 0xF1, 0xF6, | |||
| 0x32, 0x44, 0xE5, 0x57, 0x7D, 0x8C, 0xF5, 0x86, | 0x32, 0x44, 0xE5, 0x57, 0x7D, 0x8C, 0xF5, 0x86, | |||
| 0x16, 0xD5, 0xCA, 0x57, 0x59, 0xD4, 0x9C, 0xC8, | 0x16, 0xD5, 0xCA, 0x57, 0x59, 0xD4, 0x9C, 0xC8, | |||
| 0xD9, 0x36, 0xC3, 0x38, 0xAA, 0x3C, 0xB9, 0xB1, | 0xD9, 0x36, 0xC3, 0x38, 0xAA, 0x3C, 0xB9, 0xB1, | |||
| 0x11, 0xC1, 0x49, 0x7E, 0x5B, 0x51, 0xAF, 0x69, | 0x11, 0xC1, 0x49, 0x7E, 0x5B, 0x51, 0xAF, 0x69, | |||
| skipping to change at page 15, line 31 ¶ | skipping to change at page 17, line 5 ¶ | |||
| 0x08, 0x2E, 0x7C, 0x1B, 0x41, 0xB3, 0xEE, 0x38, | 0x08, 0x2E, 0x7C, 0x1B, 0x41, 0xB3, 0xEE, 0x38, | |||
| 0x94, 0xE4, 0x2A, 0x8C, 0x17, 0x89, 0x71, 0xA4, | 0x94, 0xE4, 0x2A, 0x8C, 0x17, 0x89, 0x71, 0xA4, | |||
| 0x0F, 0x94, 0xAE, 0x9F, 0xB0, 0xF7, 0x03, 0xC9, | 0x0F, 0x94, 0xAE, 0x9F, 0xB0, 0xF7, 0x03, 0xC9, | |||
| 0xD4, 0xD0, 0x45, 0xCB, 0xEB, 0x2B, 0x82, 0x63, | 0xD4, 0xD0, 0x45, 0xCB, 0xEB, 0x2B, 0x82, 0x63, | |||
| 0x06, 0x2F, 0xDF, 0xD2, 0x6B, 0xD5, 0xB8, 0x69, | 0x06, 0x2F, 0xDF, 0xD2, 0x6B, 0xD5, 0xB8, 0x69, | |||
| 0x60, 0x62, 0x34, 0xE8, 0x9F, 0x2D, 0x96, 0xA5, | 0x60, 0x62, 0x34, 0xE8, 0x9F, 0x2D, 0x96, 0xA5, | |||
| 0xAB, 0x04, 0x7A, 0xFF, 0x79, 0x09, 0xDA, 0xCB, | 0xAB, 0x04, 0x7A, 0xFF, 0x79, 0x09, 0xDA, 0xCB, | |||
| 0x64, 0xD4, 0xFD, 0x3B, 0x35, 0x11, 0xD7, 0xF1, | 0x64, 0xD4, 0xFD, 0x3B, 0x35, 0x11, 0xD7, 0xF1, | |||
| 0xB9, 0x41, 0xA6, 0x64, 0xDF, 0x40, 0x6D, 0xB9 } | 0xB9, 0x41, 0xA6, 0x64, 0xDF, 0x40, 0x6D, 0xB9 } | |||
| RSA-4096 key in encoded form | ||||
| -----BEGIN RSA PRIVATE KEY----- | ||||
| MIIJKAIBAAKCAgEAs4tJYOY75qjbqJqCl47x9jJE5Vd9jPWGFtXKV1nUnMjZNsM4 | ||||
| qjy5sRHBSX5bUa9pLyYR5on3Z1SAwLD0w2VPQ6+F/oyK1zTgQqitoF/XZQjgC6D3 | ||||
| VsNEO76DPqfRANT7Nn7r1gvbZIZ3/H3rlCRNrRr47tHGWBLAPnxz9/NY6UG8ZkWP | ||||
| 97uXpJqYoRgH4CwaO5rTOlc64YDh/0Mq5VgMycq/q2AvMlvNoJfoe8em1040qH1g | ||||
| ikP+suT/8fS452hqmEddtRpuvQgXKldBd0kkiyFVyLkG4NVA6Mso9MAK3J/kdYoa | ||||
| w2SrOeThVSiYVEQVP+7GrUxTSLLjj/VQ9fpYM5eTNzDICIG/Ee7o/jhtW1EoSamD | ||||
| mUOr89lyIHaXuOwkEaJhnVXKBCM8WiztxvKG2CnQ6Dcge3ZSmqJEhyEmjcAVC7ew | ||||
| fnMxOnE+WJW6rzrf+mA5WMVn+FzyWx2AondWow0aUKHkaY7amhIrsKp6YPfNImyx | ||||
| Flz8+cqDCmBswPsUh/JJ5eDHHIhibFcSgIHedsEjhLbUSLZ/DnEjru90qIWWA3R1 | ||||
| VIPykKfeZkZeInsrFzGPikkFKwFF+6KDdyvCmltYEqzO46tigXAZ5UgH8oiXEre4 | ||||
| 8wO6X+FH+cLzQ0q3A8HZRnNDgqCjU/Tgy76iaku/Ic6eteedR1fX3gJ/IOUCAwEA | ||||
| AQKCAgBq0bC7fN8gkU/2lM6jewFL14aT6CSjS6QWS+XRaHmNOhW5dhZteimERqr3 | ||||
| nbyY8cKjsYOu5GCUUnszqVRGOC0beP9Afb9Q4H2YSyDZrIvK6afaY08kiJI89VDC | ||||
| Yzd+xjgbqRGIzI8f1LzoNMaG4b5xAf4eoCHgXm+P/Z1FZLt+M4TyV+qamjpTTUMH | ||||
| fPOalMKaubd4G1PFvFc49m47+tHI8N5uCJCr5mCFbjt8AUGrETVVFRrtyBxttL7t | ||||
| 5gpoawAYT0VaLTq7LmgR4c3qOVMLj66o+CQ2ecnfdpeMXgFYV6ylnZ/kpi0VCa5i | ||||
| av+OCt+VpOsBScq3Eu8+w9YCMopsUCG6GzW4WD2akEBVA/X6D0JMcoYj/IHT3Xv/ | ||||
| G/eMji69A6URLetliZhuSb0wBxrYQaPMqAdsz8eUYzCx/RwhKtPr032aTQqWlbgW | ||||
| igiJMn1SbxbRVjf6nb8EsLg92LXEBS3FOLbK6ckuyXAQei8e5NR6ZcyluVluQnSR | ||||
| m+fR7JDkUP5YWNwuAehOvZIH2Oog+jcUDonQENZQHyJhlxgE3nNoD+YcI1yPTmMf | ||||
| 8G297mZtu5r7/aO5ccMpDXve9cV4Wgcb6Urhigsu2K5nmrqmEIUoqF4xf4eomcWJ | ||||
| 9KitQpCmyh758U2NCnpm3HULabGcslgow+rwQiFcCarUqVToVQKCAQEA4EG98cm1 | ||||
| aaz16AItIRuHG18pIUGlif0PbctZR2scHaQBjdeh4Qg5MnRe88Zs9/8xPu1MsWgd | ||||
| 750pzD/oevetGenvNFZiycT05ucHqk6ZSWNMCGRxpVtnRsKu74dx7yGi7oq03sTC | ||||
| BDxwz7qJ5esvYuoHx0vUFmdpEqlYn7PtcCiPigPRkcWKiJbosg8e3pGAztMDWfdf | ||||
| SK/pfEbuWcknHnE3VUrXBVYXhI/TBBzWMEf2RiwOZuGDn2PGEtSjV/XldjVqqufG | ||||
| SsC/2dZe30svNNrb32kGIMiVykTZYdoFsTYrStXarLkP9YYzXs1+HXoWAMsas3Jp | ||||
| W27HcXYh276TVwKCAQEAzPVRKdO5JMg4p2zTadRunLgT/js5uvHrEBhH0x0JE1AD | ||||
| qy/COUMc2m6ZCIg96KBUbjUoN9TrlctB2O7BSmbNOMIkfoKjlDkpJ7v1cKhlXg8q | ||||
| wkPl+4dv0gtIdnOidy2pcMHfR6Mt6op15wlUcyKcaTyIajFtLOy/A1l7BMqeyr2j | ||||
| Nm4HZIgFmyRZb1326FaX2+YqsvjMcax/dDtkEm0B8rNhJxbsp2l15RTtTXijIpC+ | ||||
| CoLxRBSZK9GAPa3Jg93ydtLK4aCpA/keeL48C8r1jzzpjRI6pshfZVHFcAf+R3rI | ||||
| fgOLmpSsxiDeEiWBBTRKDPs3ZVBejn7IasCG9lVkIwKCAQAvfBwxN2nPb40+TD+s | ||||
| E/0ewZ6e6RyZRFlhAT7tTXPNnu2pUDB5ytj5owR8D9cBCCswTOUBZ693DktMcXfT | ||||
| meAwbYV2CpiuaqMExYSs/imdDYaK/GHIBruukwihtYddgDzUz9AOn5EJfpbQlYof | ||||
| ghYtlqqA+8Bz4f+wsOUQI/Qx3JTQP5C/khmMZI/vLB54OE0S/kFmamflp0IES6yq | ||||
| nFpJKuXxjIBNI/ak3iNraoO8A3DVWPzPsg7B0EmfsSDJPksRJaxpddxZ9chp4ueB | ||||
| 1pSvV2xZOQ7QIEj/ZGa3PogYBwVRukisbB9B+OGlwFNlAHXqQxdrSd2fO6zFjKMM | ||||
| uaTPAoIBAFdahwkor9Q5ccwJ2eFVJP+uhPbqDyTaTrFBZ/tWeLO+epHPfRwiun1u | ||||
| fdLhHmGzU8jU5xtEqFPjmWD4AXHQds8mD5/L1iQqaJwCxA0L+IgqNrMtdSvLAaGo | ||||
| JW42wpvA3mKsfplttvgroyyhEVkw+zDvF8UK49kt3gtza7cTFLKcOJ/OLWBviNQi | ||||
| neuVRNKpdXfHlZNJ7vjT6E6FsZUY2Ke0REgAwURo8lJ8pNdL/1uQDS81t9aoYNAI | ||||
| LnwbQbPuOJTkKowXiXGkD5Sun7D3A8nU0EXL6yuCYwYv39Jr1bhpYGI06J8tlqWr | ||||
| BHr/eQnay2TU/Ts1EdfxuUGmZN9AbbkCggEBANEMkY2p8m2pTf87CSQ8jMPUOQJt | ||||
| 5iuenzesYLvXqVLLB4SUvXN+zDplDJPELtf2SQIHrplrPNH/H01jnWHd0ecSjVY8 | ||||
| HBbIs52U1d5ek3/mWji4GeRp+Iw84CUh4q2p40bmob1RJ8e9sh2ixhHjX2yJ591m | ||||
| oGbLIz75a60a05mUDK0FWt9cWHn4MKgIPKbWwFhYwmYDCjO/tK2DtcySny9soh5Q | ||||
| KVQriuvna2lE4YY+OUc7btmtkmp9v+LHKOI8dPabsOBU8Z8UbOGeHSNrZTQwpx3E | ||||
| p0riDg0UEzFmoYrfbvf+2VzEZDX/TJYjK9VkA8w5+xat8iS0/euKuvSRMb8= | ||||
| -----END RSA PRIVATE KEY----- | ||||
| 2.2. DLP Keys | 2.2. DLP Keys | |||
| The following widely-known test keys may be used for DLP-based | The following widely-known test keys may be used for DLP-based | |||
| algorithms such as DSA, DH, and Elgamal. | algorithms such as DSA, DH, and Elgamal. | |||
| DLP-1024 key | DLP-1024 key | |||
| /* p */ | /* p */ | |||
| 1018, | 1018, | |||
| { 0x03, 0x0C, 0xDF, 0xC3, 0x8F, 0xC3, 0xE4, 0x21, | { 0x03, 0x0C, 0xDF, 0xC3, 0x8F, 0xC3, 0xE4, 0x21, | |||
| skipping to change at page 17, line 8 ¶ | skipping to change at page 19, line 35 ¶ | |||
| 0x31, 0x8A, 0x0A, 0x79, 0x1F, 0x1D, 0x0D, 0xD4, | 0x31, 0x8A, 0x0A, 0x79, 0x1F, 0x1D, 0x0D, 0xD4, | |||
| 0xF6, 0x8A, 0xFA, 0xE3, 0x35, 0xAA, 0x5D, 0xBE, | 0xF6, 0x8A, 0xFA, 0xE3, 0x35, 0xAA, 0x5D, 0xBE, | |||
| 0xA3, 0xF2, 0xF6, 0xD6, 0xDD, 0x73, 0x09, 0x26, | 0xA3, 0xF2, 0xF6, 0xD6, 0xDD, 0x73, 0x09, 0x26, | |||
| 0x24, 0x7F, 0xDC, 0x4D, 0x1B, 0x82, 0xDF, 0x8C, | 0x24, 0x7F, 0xDC, 0x4D, 0x1B, 0x82, 0xDF, 0x8C, | |||
| 0x2D, 0x87, 0xAE, 0x8D, 0x36, 0xAD, 0xB9, 0xDD, | 0x2D, 0x87, 0xAE, 0x8D, 0x36, 0xAD, 0xB9, 0xDD, | |||
| 0x25, 0x13, 0x57, 0x8E, 0x8B, 0x99, 0xAA, 0x6A, | 0x25, 0x13, 0x57, 0x8E, 0x8B, 0x99, 0xAA, 0x6A, | |||
| 0x0E, 0xDF, 0x67, 0x5F, 0xFC, 0x2F, 0xDE, 0xB6, | 0x0E, 0xDF, 0x67, 0x5F, 0xFC, 0x2F, 0xDE, 0xB6, | |||
| 0x4B, 0x26, 0xE5, 0xBE, 0xD8, 0x53, 0x2D, 0xFD, | 0x4B, 0x26, 0xE5, 0xBE, 0xD8, 0x53, 0x2D, 0xFD, | |||
| 0x98, 0x11, 0x0F, 0xCF, 0xC9, 0xED, 0xF9, 0x38 } | 0x98, 0x11, 0x0F, 0xCF, 0xC9, 0xED, 0xF9, 0x38 } | |||
| DLP-1024 key in encoded form | ||||
| -----BEGIN DSA PRIVATE KEY----- | ||||
| MIIBuQIBAAKBgAMM38OPw+QhJ5CwpB5FtOTogN6Kv9Ouygsjj7bNcwzDGHaTNtWx | ||||
| gLKAKgG+S8GrhPzi/0ibUMLSnekewOZbYGT9DeU36rocbN0n3DAwSB6LuWCqi4rv | ||||
| kzUw5rHMUWC7+q+FD/ZXgRIzfVMDTkFj3GUDvfiJJYEUH6uCVbbZcnuzAhUA7EG5 | ||||
| wGIdW9yvEdUZj3IIiC5lu98CgYABZIesz82VUFHgbhxb70UsEmPHXSs2UE+0J1c1 | ||||
| woMyC2Oskcb0AgkyUxyrBLHNcv3yneJOJxeXp90hl2dpMfkzHR9Z7uW6LH1UrhNc | ||||
| f3lBN9jYDrYpKI4mijvr0h8WpAPx1drYPBxHgBejzSZvG6SbiQ3AiSEuciYdo2ev | ||||
| gDsCUAKBgAIguULCXETaUrDRdoLqxDbqfoHsn3bhBXUyqmfq3QStuP1hgboLJfKE | ||||
| 2qqqBfPIQDTUF9N7bgpjMYoKeR8dDdT2ivrjNapdvqPy9tbdcwkmJH/cTRuC34wt | ||||
| h66NNq253SUTV46LmapqDt9nX/wv3rZLJuW+2FMt/ZgRD8/J7fk4AhQR7Zl4WoE6 | ||||
| Gw6W7NONf5vOnr/W+g== | ||||
| -----END DSA PRIVATE KEY----- | ||||
| DLP-2048 key | DLP-2048 key | |||
| /* p */ | /* p */ | |||
| 2042, | 2042, | |||
| { 0x03, 0x2D, 0xD5, 0x53, 0x7D, 0x33, 0x7A, 0x91, | { 0x03, 0x2D, 0xD5, 0x53, 0x7D, 0x33, 0x7A, 0x91, | |||
| 0x34, 0x37, 0xD3, 0x5E, 0xA3, 0x43, 0x3D, 0xB0, | 0x34, 0x37, 0xD3, 0x5E, 0xA3, 0x43, 0x3D, 0xB0, | |||
| 0xE7, 0xB7, 0x21, 0x29, 0x8F, 0xBA, 0x87, 0x27, | 0xE7, 0xB7, 0x21, 0x29, 0x8F, 0xBA, 0x87, 0x27, | |||
| 0xF2, 0xF9, 0xBE, 0x85, 0x6D, 0x6A, 0x14, 0x6B, | 0xF2, 0xF9, 0xBE, 0x85, 0x6D, 0x6A, 0x14, 0x6B, | |||
| 0x92, 0x98, 0x8D, 0x50, 0x82, 0xF2, 0xC5, 0x72, | 0x92, 0x98, 0x8D, 0x50, 0x82, 0xF2, 0xC5, 0x72, | |||
| 0xB7, 0x70, 0x37, 0x63, 0xE8, 0x24, 0x54, 0xA7, | 0xB7, 0x70, 0x37, 0x63, 0xE8, 0x24, 0x54, 0xA7, | |||
| skipping to change at page 19, line 30 ¶ | skipping to change at page 22, line 25 ¶ | |||
| 0x12, 0x12, 0x21, 0xA4, 0x60, 0xF9, 0x80, 0xC5, | 0x12, 0x12, 0x21, 0xA4, 0x60, 0xF9, 0x80, 0xC5, | |||
| 0x4F, 0x80, 0x1D, 0x7D, 0x6D, 0x21, 0x9D, 0xF2, | 0x4F, 0x80, 0x1D, 0x7D, 0x6D, 0x21, 0x9D, 0xF2, | |||
| 0xA1, 0xDB, 0xEA, 0x3C, 0x8A, 0x03, 0xA0, 0x9F, | 0xA1, 0xDB, 0xEA, 0x3C, 0x8A, 0x03, 0xA0, 0x9F, | |||
| 0x6B, 0xE9, 0x1B, 0xB6, 0x29, 0x6D, 0x79, 0x1A, | 0x6B, 0xE9, 0x1B, 0xB6, 0x29, 0x6D, 0x79, 0x1A, | |||
| 0x2A, 0x83, 0x80, 0xE8, 0x9D, 0x0C, 0xDD, 0x26, | 0x2A, 0x83, 0x80, 0xE8, 0x9D, 0x0C, 0xDD, 0x26, | |||
| 0xF7, 0x66, 0x3E, 0x06, 0x9A, 0x83, 0x31, 0x49, | 0xF7, 0x66, 0x3E, 0x06, 0x9A, 0x83, 0x31, 0x49, | |||
| 0xAD, 0x44, 0x2B, 0x2C, 0x13, 0x98, 0x87, 0x71, | 0xAD, 0x44, 0x2B, 0x2C, 0x13, 0x98, 0x87, 0x71, | |||
| 0xF6, 0x54, 0xB8, 0x1F, 0x50, 0xE0, 0xD7, 0x26, | 0xF6, 0x54, 0xB8, 0x1F, 0x50, 0xE0, 0xD7, 0x26, | |||
| 0x42, 0x47, 0xD6, 0x78, 0xEA, 0xEB, 0xB0, 0xF9 } | 0x42, 0x47, 0xD6, 0x78, 0xEA, 0xEB, 0xB0, 0xF9 } | |||
| DLP-2048 key in encoded form | ||||
| -----BEGIN DSA PRIVATE KEY----- | ||||
| MIIDTAIBAAKCAQADLdVTfTN6kTQ3016jQz2w57chKY+6hyfy+b6FbWoUa5KYjVCC | ||||
| 8sVyt3A3Y+gkVKekoiWbKazpsLybS02YXWqcjLYw5OCfSAefG+gHaXHekmhWcLlM | ||||
| yWh93CM7MK8ilLAwprSX9kb5ThwX6DqQTCwbaEQQzgSP2c1kBaFKpowrj3+L0G6f | ||||
| ZMS7acy/vIBWrkFKiy411iBc3vsqJKN5uKEWF1CV/1f/YVUShobZm44fJERjEnHw | ||||
| nDNPNyJFL+kmP8M0nm8zB6Z1T/2J1EMnOH39QBigKupu9MY2p2nnzrc3GRlySahB | ||||
| owvgxL6OyxB/OALcRYP44BKU1StiE2e9DBlTAh0BlQmy7ag7CIJzGz/onC72nbjY | ||||
| NhI0XRpmpYO5EQKCAQAArF0SDkbSutaHiEfM6HCmntytyGyFnEm6963kHtk2jsI7 | ||||
| ZFT7YOrarMZkKm/dMiuZqxR1gbIb6+BilOOCC8VW+lQRsxw3OzmmfVGKVHcTQVxn | ||||
| rO8YvGupTJVgDLW9qDyErVjlSR0mJh7U5TWtsi41sGzCtMidotxj4p7aBvATgHJG | ||||
| VYky6fLci5Mua4S0B/VxUJ0G95Qw6V1GstAmFCiEF5mYhqZxRe10agyowERBA/UD | ||||
| 5rvnRWHDrNGa5XqCZ6G8PEkwg7sWxZeorJmB+3BFhxf7ZJykYdRwtLNePphk+hpZ | ||||
| m8Aeb+mTClH1ebCEAXQluNChAj+u3dxX0c5WJRzaAoIBAAIwN7LZyZ51P9J5v/ze | ||||
| 6ZKcm6HeqpcLA3KvczXlUCE3QpnzYQJ8jWXVevtNPM0rRyS1Pwnr4oy/SZ9rT4Yz | ||||
| SRmLJLKrDUzstsT9fmctSyrKnTnjriD47Nf9dxB85Upm3e6XROSM+N1rqaUox1Hw | ||||
| CMZvGSogTsf5OHaRAXmxMR2XW0klxWmQKfvRFKXnkBkKTTiblI+PV2qORaVr4NT9 | ||||
| bOpjHF9TfvkYWY4wUi+TZFBmGMBFhMpv0HUSEiGkYPmAxU+AHX1tIZ3yodvqPIoD | ||||
| oJ9r6Ru2KW15GiqDgOidDN0m92Y+BpqDMUmtRCssE5iHcfZUuB9Q4NcmQkfWeOrr | ||||
| sPkCHGQFvN6092gpAiPOXbUqijDCitx4AtloHty0NOU= | ||||
| -----END DSA PRIVATE KEY----- | ||||
| DLP-4096 key | DLP-4096 key | |||
| /* p */ | /* p */ | |||
| 4086, | 4086, | |||
| { 0x31, 0xD2, 0x55, 0x5F, 0xB2, 0xE8, 0x89, 0xF3, | { 0x31, 0xD2, 0x55, 0x5F, 0xB2, 0xE8, 0x89, 0xF3, | |||
| 0x20, 0x83, 0x78, 0x79, 0x5A, 0xF4, 0x88, 0x5B, | 0x20, 0x83, 0x78, 0x79, 0x5A, 0xF4, 0x88, 0x5B, | |||
| 0x62, 0xD0, 0x13, 0x58, 0xBD, 0xF1, 0x17, 0xC0, | 0x62, 0xD0, 0x13, 0x58, 0xBD, 0xF1, 0x17, 0xC0, | |||
| 0xB8, 0xAD, 0x4D, 0x22, 0xBE, 0x62, 0xCC, 0x93, | 0xB8, 0xAD, 0x4D, 0x22, 0xBE, 0x62, 0xCC, 0x93, | |||
| 0x34, 0x5B, 0x6E, 0xA8, 0xFC, 0x54, 0x0B, 0x56, | 0x34, 0x5B, 0x6E, 0xA8, 0xFC, 0x54, 0x0B, 0x56, | |||
| 0x8F, 0x50, 0x95, 0xBB, 0xA0, 0x90, 0x3E, 0xC5, | 0x8F, 0x50, 0x95, 0xBB, 0xA0, 0x90, 0x3E, 0xC5, | |||
| skipping to change at page 24, line 6 ¶ | skipping to change at page 27, line 27 ¶ | |||
| 0x80, 0x93, 0x65, 0x74, 0x94, 0x01, 0x5E, 0x05, | 0x80, 0x93, 0x65, 0x74, 0x94, 0x01, 0x5E, 0x05, | |||
| 0x17, 0x78, 0x96, 0xF1, 0x29, 0xFD, 0xFF, 0xB5, | 0x17, 0x78, 0x96, 0xF1, 0x29, 0xFD, 0xFF, 0xB5, | |||
| 0xFF, 0x4A, 0xF5, 0x7C, 0x64, 0xD1, 0x51, 0xEC, | 0xFF, 0x4A, 0xF5, 0x7C, 0x64, 0xD1, 0x51, 0xEC, | |||
| 0xEC, 0x8E, 0x74, 0x7B, 0x72, 0x67, 0xFA, 0x2D, | 0xEC, 0x8E, 0x74, 0x7B, 0x72, 0x67, 0xFA, 0x2D, | |||
| 0x8C, 0xF5, 0x97, 0x5E, 0x84, 0xC2, 0xEF, 0xAC, | 0x8C, 0xF5, 0x97, 0x5E, 0x84, 0xC2, 0xEF, 0xAC, | |||
| 0x18, 0xDF, 0x16, 0xF2, 0xD8, 0x98, 0x0C, 0xE4, | 0x18, 0xDF, 0x16, 0xF2, 0xD8, 0x98, 0x0C, 0xE4, | |||
| 0x09, 0xC0, 0x3A, 0x1B, 0xC2, 0xB9, 0x5B, 0x34, | 0x09, 0xC0, 0x3A, 0x1B, 0xC2, 0xB9, 0x5B, 0x34, | |||
| 0x34, 0x18, 0x98, 0xC6, 0xA5, 0xC6, 0x28, 0x54, | 0x34, 0x18, 0x98, 0xC6, 0xA5, 0xC6, 0x28, 0x54, | |||
| 0xB8, 0x53, 0x33, 0xE1, 0x4A, 0xA8, 0xE9 } | 0xB8, 0x53, 0x33, 0xE1, 0x4A, 0xA8, 0xE9 } | |||
| DLP-4096 key in encoded form | ||||
| -----BEGIN DSA PRIVATE KEY----- | ||||
| MIIGXgIBAAKCAf8x0lVfsuiJ8yCDeHla9IhbYtATWL3xF8C4rU0ivmLMkzRbbqj8 | ||||
| VAtWj1CVu6CQPsXu2MauUl2ap+SZefCObE7b9WqTKQmga20eB1eVP5BbVVKZMV9C | ||||
| SPVLge9fBU2Ngk4SrquCSywvTF7eBGAw3DsWwoBZVoXKOMbnE9guTRv80z2H3iaV | ||||
| S6AFvEIXdzmyDx5GE4B57eWRZM5nI+NR5LL81Q1uq7RdqI+kzVYkiupEqi5BuP8o | ||||
| vTeIAIwu70vhkKCrXX2APJq+18e3dLUPqDgN1/4rPYSFo9iA71HVa0Efc+ZZ554L | ||||
| /zIUU1c+xQ2d1NCuyjCdOeQ4hieVA++UmFHj1Nxxq/OniGO5dcEGJMtRc0zbWCo6 | ||||
| SMbXCEeDboCLDiJIuPqKjFWjV+gwVNZIssyluKOxaJGtUjVukoca9ZmlbpDJNDOl | ||||
| SlL9QuK+ZRXIzsNzlAcMJsrFyowmHS1QIYhruUxOmfp40lN8yvWhksnCr3egeDNF | ||||
| HxItqeb9e4OSEp7kmlYHXxo3BQBMBr02f7/LmgdKAuFlJSct+dMzy5GbW2EUB/f3 | ||||
| pNnhHtKFpHWV6nQMv6Fr0vu4CtKl5jYER4CLHsUHWLhW9tykJdk2tJ7qW36qQHmj | ||||
| FT3tMhJ2TQAG8Ak2KEuW1ovJdP2vd7ZFeDY4xR6xGIqRcqA33knaSBqbAicB/zA2 | ||||
| Bok/U75BEvlgGPmcz7lngn5JQDaYL68kBtJdi8xSSNsryxMCggH/GYkDGxK4g11m | ||||
| XJ9CMQUkoGSe7EwsSrqsrV1UjOD69T7KOGeq5hh9X2PA9mtW6ACtXQlYjKQlvOa9 | ||||
| M5drusloY9HCbk9IJ2cFY/ucpRZcPJ8UHS59d6YRlVVNnOajJbk0Kl8K3gB+7Wnz | ||||
| LHhnjF8wLK+XYvzA1iLSv6X/cktZSSEcZi7T2BQer6u2KGXC8qZEpdw0DyQPc2FT | ||||
| PGVkzZ4ztljBOXHs2mYuHHm1iH6iRh41pror0CCA+OXGyL57+7ls9B8H1b3JZQC1 | ||||
| bFNLcDaZVo9wC5rV7/we6L4vcDlQrNO4jCQ/gqLp9QHjh4ROd6qQLcDX2W6+TkvI | ||||
| s6sJZKwosVTNFTWkBlVAgzmOC+asmyb/mvTCzalVF1EVL71Mwtfxmp5/QaVuu+88 | ||||
| 1R32sQhIBhWo8+2Zn+x/DzxTh1UncHSzqA1LaoRxJuG53+I4lvWxl1ODmxin5mk+ | ||||
| n7E9EVijq69OBGJ965YS2VlNMyYa5ZNn/8rew7Wv/8vf7UULU4vI2I0pjt0nszbo | ||||
| 9e5tRh9XQDu0bbwEttkAx0hyjeePaI/NmpApTuqV585IKjmwYugE/Mtu99E1lLk1 | ||||
| DsIPtQKoTE4wlsWQqiljeHkNgZ7CxQ3V9Ub14+TZaewz2kVSFNegXKr4h7Xomwnm | ||||
| ss8NVkPDhUgBiod7WhdyQCtLKfNciwKCAf8qSRFzGGURS4psb45AfVXDmrcQu0XK | ||||
| upTmsYWH0o+cbGlMAZoJsm9EjCozVaVnsaDIYYIuGcb63oxDqmHDvzm2leKidFUv | ||||
| 6Fx2W4oe940bQpfvTDE/6NvyIhEwxe6R+ePTu/KcxHsbq68XnLqL1FupYdcKtr16 | ||||
| oHX7KhUzFPw7LDuJhm5oLHqVjTt4h/DX2PQN9V5uUV0fu4h3jq+O8ejzEZp0mIBm | ||||
| fKjsxGv6ELrEZ0t3uU6w6Sp2psCBWdH0BrZoX+hbQajYBJORivUpmhxqET3i+XQn | ||||
| zYfEuigqZV1qTucVAS4MdQzDseXA8ivIKtI+tMDs9ICst9cxIVfbt+DlI3jp/0bu | ||||
| 7wSvR08sTFXf/895i5A/SepD0GDvI+19Y4l7yy/xOasNgF/3hYfM5vHyzjkHu9pa | ||||
| ZznPYkcsohGFGNr+kHxL6ojcrjkBBzq2zGClYMmk1jMeKfiK/rmZpkrk28e/AiKp | ||||
| 1Bk6IOgbQDDzKOOpy3ySYgSYR0/LZNrhu9eeSpwEdkde8PmrXomuTVqun4dgIfoL | ||||
| soIXzyeNOunt3BxXvl4X3A2UjgL8Bf7fdAcF2NzcnUuc5oCTZXSUAV4FF3iW8Sn9 | ||||
| /7X/SvV8ZNFR7OyOdHtyZ/otjPWXXoTC76wY3xby2JgM5AnAOhvCuVs0NBiYxqXG | ||||
| KFS4UzPhSqjpAicBp3cRuJ1FUycpAboJWn/8FJyMBbAv3QQNyZiXEVvOw+YU8lV/ | ||||
| nAw= | ||||
| -----END DSA PRIVATE KEY----- | ||||
| 2.3. ECDLP Keys | 2.3. ECDLP Keys | |||
| The following widely-known test keys may be used for ECDLP-based | The following widely-known test keys may be used for ECDLP-based | |||
| algorithms such as ECDA and ECDH. | algorithms such as ECDSA and ECDH. | |||
| P256 key | P256 key | |||
| /* qx */ | /* qx */ | |||
| 256, | 256, | |||
| { 0x42, 0x25, 0x48, 0xF8, 0x8F, 0xB7, 0x82, 0xFF, | { 0x42, 0x25, 0x48, 0xF8, 0x8F, 0xB7, 0x82, 0xFF, | |||
| 0xB5, 0xEC, 0xA3, 0x74, 0x44, 0x52, 0xC7, 0x2A, | 0xB5, 0xEC, 0xA3, 0x74, 0x44, 0x52, 0xC7, 0x2A, | |||
| 0x1E, 0x55, 0x8F, 0xBD, 0x6F, 0x73, 0xBE, 0x5E, | 0x1E, 0x55, 0x8F, 0xBD, 0x6F, 0x73, 0xBE, 0x5E, | |||
| 0x48, 0xE9, 0x32, 0x32, 0xCC, 0x45, 0xC5, 0xB1 }, | 0x48, 0xE9, 0x32, 0x32, 0xCC, 0x45, 0xC5, 0xB1 }, | |||
| /* qy */ | /* qy */ | |||
| 256, | 256, | |||
| { 0x6C, 0x4C, 0xD1, 0x0C, 0x4C, 0xB8, 0xD5, 0xB8, | { 0x6C, 0x4C, 0xD1, 0x0C, 0x4C, 0xB8, 0xD5, 0xB8, | |||
| 0xA1, 0x71, 0x39, 0xE9, 0x48, 0x82, 0xC8, 0x99, | 0xA1, 0x71, 0x39, 0xE9, 0x48, 0x82, 0xC8, 0x99, | |||
| 0x25, 0x72, 0x99, 0x34, 0x25, 0xF4, 0x14, 0x19, | 0x25, 0x72, 0x99, 0x34, 0x25, 0xF4, 0x14, 0x19, | |||
| 0xAB, 0x7E, 0x90, 0xA4, 0x2A, 0x49, 0x42, 0x72 }, | 0xAB, 0x7E, 0x90, 0xA4, 0x2A, 0x49, 0x42, 0x72 }, | |||
| /* d */ | /* d */ | |||
| 256, | 256, | |||
| { 0xE6, 0xCB, 0x5B, 0xDD, 0x80, 0xAA, 0x45, 0xAE, | { 0xE6, 0xCB, 0x5B, 0xDD, 0x80, 0xAA, 0x45, 0xAE, | |||
| 0x9C, 0x95, 0xE8, 0xC1, 0x54, 0x76, 0x67, 0x9F, | 0x9C, 0x95, 0xE8, 0xC1, 0x54, 0x76, 0x67, 0x9F, | |||
| 0xFE, 0xC9, 0x53, 0xC1, 0x68, 0x51, 0xE7, 0x11, | 0xFE, 0xC9, 0x53, 0xC1, 0x68, 0x51, 0xE7, 0x11, | |||
| 0xE7, 0x43, 0x93, 0x95, 0x89, 0xC6, 0x4F, 0xC1 } | 0xE7, 0x43, 0x93, 0x95, 0x89, 0xC6, 0x4F, 0xC1 } | |||
| P256 key in encoded form | ||||
| -----BEGIN EC PRIVATE KEY----- | ||||
| MHcCAQEEIObLW92AqkWunJXowVR2Z5/+yVPBaFHnEedDk5WJxk/BoAoGCCqGSM49 | ||||
| AwEHoUQDQgAEQiVI+I+3gv+17KN0RFLHKh5Vj71vc75eSOkyMsxFxbFsTNEMTLjV | ||||
| uKFxOelIgsiZJXKZNCX0FBmrfpCkKklCcg== | ||||
| -----END EC PRIVATE KEY----- | ||||
| P384 key | P384 key | |||
| /* qx */ | /* qx */ | |||
| 384, | 384, | |||
| { 0x5B, 0x09, 0x01, 0xB8, 0x85, 0x23, 0x29, 0x6E, | { 0x5B, 0x09, 0x01, 0xB8, 0x85, 0x23, 0x29, 0x6E, | |||
| 0xB9, 0x19, 0xD5, 0x0F, 0xFA, 0x1A, 0x9C, 0xB3, | 0xB9, 0x19, 0xD5, 0x0F, 0xFA, 0x1A, 0x9C, 0xB3, | |||
| 0x74, 0xBC, 0x4D, 0x40, 0x95, 0x86, 0x28, 0x2B, | 0x74, 0xBC, 0x4D, 0x40, 0x95, 0x86, 0x28, 0x2B, | |||
| 0xFE, 0xCA, 0x11, 0xB1, 0xD9, 0x5A, 0xDB, 0xB5, | 0xFE, 0xCA, 0x11, 0xB1, 0xD9, 0x5A, 0xDB, 0xB5, | |||
| 0x47, 0x34, 0xAF, 0x57, 0x0B, 0xF8, 0x2B, 0x72, | 0x47, 0x34, 0xAF, 0x57, 0x0B, 0xF8, 0x2B, 0x72, | |||
| 0x28, 0xCF, 0x22, 0x6B, 0xCF, 0x4C, 0x25, 0xDD }, | 0x28, 0xCF, 0x22, 0x6B, 0xCF, 0x4C, 0x25, 0xDD }, | |||
| /* qy */ | /* qy */ | |||
| skipping to change at page 25, line 29 ¶ | skipping to change at page 30, line 29 ¶ | |||
| 0xF9, 0x91, 0x9E, 0x84, 0x24, 0xF3, 0x7E, 0xC8 }, | 0xF9, 0x91, 0x9E, 0x84, 0x24, 0xF3, 0x7E, 0xC8 }, | |||
| /* d */ | /* d */ | |||
| 384, | 384, | |||
| { 0xE2, 0x56, 0x33, 0x28, 0xDF, 0xAB, 0xF6, 0x81, | { 0xE2, 0x56, 0x33, 0x28, 0xDF, 0xAB, 0xF6, 0x81, | |||
| 0x88, 0x60, 0x6B, 0x91, 0x32, 0x42, 0x81, 0xC1, | 0x88, 0x60, 0x6B, 0x91, 0x32, 0x42, 0x81, 0xC1, | |||
| 0xD5, 0x8A, 0x44, 0x56, 0x43, 0x1B, 0x09, 0xD5, | 0xD5, 0x8A, 0x44, 0x56, 0x43, 0x1B, 0x09, 0xD5, | |||
| 0x10, 0xB3, 0x5F, 0xEC, 0xC9, 0xF3, 0x07, 0xCA, | 0x10, 0xB3, 0x5F, 0xEC, 0xC9, 0xF3, 0x07, 0xCA, | |||
| 0x18, 0x22, 0x84, 0x6F, 0xA2, 0x67, 0x13, 0x71, | 0x18, 0x22, 0x84, 0x6F, 0xA2, 0x67, 0x13, 0x71, | |||
| 0xA9, 0xA8, 0x1B, 0xAC, 0x0E, 0x35, 0x74, 0x9D } | 0xA9, 0xA8, 0x1B, 0xAC, 0x0E, 0x35, 0x74, 0x9D } | |||
| P384 key in encoded form | ||||
| -----BEGIN EC PRIVATE KEY----- | ||||
| MIGkAgEBBDDiVjMo36v2gYhga5EyQoHB1YpEVkMbCdUQs1/syfMHyhgihG+iZxNx | ||||
| qagbrA41dJ2gBwYFK4EEACKhZANiAARbCQG4hSMpbrkZ1Q/6GpyzdLxNQJWGKCv+ | ||||
| yhGx2VrbtUc0r1cL+CtyKM8ia89MJd28/jsaOtOUMO/3Y+HWjS4VHZFyC3eVtY2m | ||||
| s0Y5YTqPubWo2kjGdHEX+ZGehCTzfsg= | ||||
| -----END EC PRIVATE KEY----- | ||||
| P521 key | P521 key | |||
| /* qx */ | /* qx */ | |||
| 521, | 521, | |||
| { 0x01, 0xD0, 0xFD, 0x72, 0x57, 0xA8, 0x4C, 0x74, | { 0x01, 0xD0, 0xFD, 0x72, 0x57, 0xA8, 0x4C, 0x74, | |||
| 0x7F, 0x56, 0x25, 0x75, 0xC0, 0x73, 0x85, 0xDB, | 0x7F, 0x56, 0x25, 0x75, 0xC0, 0x73, 0x85, 0xDB, | |||
| 0xEB, 0xF2, 0xF5, 0x2B, 0xEA, 0x58, 0x08, 0x3D, | 0xEB, 0xF2, 0xF5, 0x2B, 0xEA, 0x58, 0x08, 0x3D, | |||
| 0xB8, 0x2F, 0xDD, 0x15, 0x31, 0xD8, 0xAA, 0xE3, | 0xB8, 0x2F, 0xDD, 0x15, 0x31, 0xD8, 0xAA, 0xE3, | |||
| 0xCC, 0x87, 0x5F, 0xF0, 0x2F, 0xF7, 0xFA, 0x2D, | 0xCC, 0x87, 0x5F, 0xF0, 0x2F, 0xF7, 0xFA, 0x2D, | |||
| 0xA2, 0x60, 0xD8, 0xEB, 0x62, 0xD6, 0xD2, 0xF5, | 0xA2, 0x60, 0xD8, 0xEB, 0x62, 0xD6, 0xD2, 0xF5, | |||
| 0xD6, 0x49, 0x27, 0x8E, 0x32, 0x17, 0x36, 0xA0, | 0xD6, 0x49, 0x27, 0x8E, 0x32, 0x17, 0x36, 0xA0, | |||
| skipping to change at page 26, line 38 ¶ | skipping to change at page 31, line 38 ¶ | |||
| { 0x01, 0xD9, 0x24, 0xDC, 0xCA, 0x0A, 0x88, 0x7F, | { 0x01, 0xD9, 0x24, 0xDC, 0xCA, 0x0A, 0x88, 0x7F, | |||
| 0x8D, 0x99, 0x76, 0x7A, 0x37, 0xD8, 0x74, 0xE6, | 0x8D, 0x99, 0x76, 0x7A, 0x37, 0xD8, 0x74, 0xE6, | |||
| 0x37, 0xA1, 0x2C, 0xCB, 0x47, 0x7D, 0x6E, 0x08, | 0x37, 0xA1, 0x2C, 0xCB, 0x47, 0x7D, 0x6E, 0x08, | |||
| 0x66, 0x53, 0x56, 0x69, 0x4D, 0x68, 0xB7, 0x65, | 0x66, 0x53, 0x56, 0x69, 0x4D, 0x68, 0xB7, 0x65, | |||
| 0x5E, 0x50, 0x69, 0x63, 0x8F, 0xDE, 0x7B, 0x45, | 0x5E, 0x50, 0x69, 0x63, 0x8F, 0xDE, 0x7B, 0x45, | |||
| 0xC8, 0x54, 0x01, 0x3D, 0xC7, 0x7A, 0x35, 0xB1, | 0xC8, 0x54, 0x01, 0x3D, 0xC7, 0x7A, 0x35, 0xB1, | |||
| 0x86, 0x55, 0xB8, 0x4C, 0x96, 0x6A, 0x60, 0x22, | 0x86, 0x55, 0xB8, 0x4C, 0x96, 0x6A, 0x60, 0x22, | |||
| 0x0D, 0x40, 0xF9, 0x1E, 0xD9, 0xF5, 0x14, 0x58, | 0x0D, 0x40, 0xF9, 0x1E, 0xD9, 0xF5, 0x14, 0x58, | |||
| 0x02, 0xEA } | 0x02, 0xEA } | |||
| P521 key in encoded form | ||||
| -----BEGIN EC PRIVATE KEY----- | ||||
| MIHcAgEBBEIB2STcygqIf42Zdno32HTmN6Esy0d9bghmU1ZpTWi3ZV5QaWOP3ntF | ||||
| yFQBPcd6NbGGVbhMlmpgIg1A+R7Z9RRYAuqgBwYFK4EEACOhgYkDgYYABAHQ/XJX | ||||
| qEx0f1YldcBzhdvr8vUr6lgIPbgv3RUx2KrjzIdf8C/3+i2iYNjrYtbS9dZJJ44y | ||||
| FzagYoy7swMItuYY2wD2KtIExkYDWbyBiriWG/Dw/A7FquikKBc85W8A3psVfB5c | ||||
| gsZPVi/K3vxKTCj200LPPvYW/ILTO3KFySHyvzb92A== | ||||
| -----END EC PRIVATE KEY----- | ||||
| 3. Contributors/Acknowledgements | 3. Contributors/Acknowledgements | |||
| 4. IANA Considerations | 4. IANA Considerations | |||
| 5. Security Considerations | 5. Security Considerations | |||
| The intent of publishing known keys in this form is that they may be | The intent of publishing known keys in this form is that they may be | |||
| easily recognised as being test keys when encountered. It should go | easily recognised as being test keys when encountered. It should go | |||
| without saying that these keys should never be used or relied upon in | without saying that these keys should never be used or relied upon in | |||
| production environments. | production environments. | |||
| skipping to change at page 27, line 17 ¶ | skipping to change at page 32, line 28 ¶ | |||
| 6. Normative References | 6. Normative References | |||
| [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
| Requirement Levels", BCP 14, RFC 2119, March 1997, | Requirement Levels", BCP 14, RFC 2119, March 1997, | |||
| <http://www.ietf.org/rfc/rfc2119.txt>. | <http://www.ietf.org/rfc/rfc2119.txt>. | |||
| [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | |||
| 2119 Key Words", RFC 8174, May 2017, | 2119 Key Words", RFC 8174, May 2017, | |||
| <http://www.ietf.org/rfc/rfc8174.txt>. | <http://www.ietf.org/rfc/rfc8174.txt>. | |||
| Author's Address | Authors' Addresses | |||
| Peter Gutmann | Peter Gutmann | |||
| University of Auckland | University of Auckland | |||
| Department of Computer Science | Department of Computer Science | |||
| Auckland | Auckland | |||
| New Zealand | New Zealand | |||
| Email: pgut001@cs.auckland.ac.nz | Email: pgut001@cs.auckland.ac.nz | |||
| Corey Bonnell | ||||
| DigiCert | ||||
| Email: corey.bonnell@digicert.com | ||||
| End of changes. 20 change blocks. | ||||
| 17 lines changed or deleted | 223 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||