Cryptographic Token Interface Standard

PKCS#11


References

AES KEYWRAPAES Key Wrap Specification (Draft) http://csrc.nist.gov/groups/ST/toolkit/documents/kms/key-wrap.pdf.
ANSI CANSI/ISO. American National Standard for Programming Languages - C. 1990.
ANSI X9.31Accredited Standards Committee X9. Digital Signatures Using Reversible Public Key Cryptography for the Financial Services Industry (rDSA). 1998.
ANSI X9.42Accredited Standards Committee X9. Public Key Cryptography for the Financial Services Industry: Agreement of Symmetric Keys Using Discrete Logarithm Cryptography. 2003.
ANSI X9.62Accredited Standards Committee X9. Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA). 1998.
ANSI X9.63Accredited Standards Committee X9. Public Key Cryptography for the Financial Services Industry: Key Agreement and Key Transport Using Elliptic Curve Cryptography. 2001.
ARIANational Security Research Institute, Korea, "Block Cipher Algorithm ARIA", URL: http://www.nsri.re.kr/ARIA/index-e.html.
CC/PPW3C. Composite Capability/Preference Profiles (CC/PP): Structure and Vocabularies. World Wide Web Consortium, January 2004. URL: http://www.w3.org/TR/CCPP-struct-vocab/
CDPDAmeritech Mobile Communications et al. Cellular Digital Packet Data System Specifications: Part 406: Airlink Security. 1993.
CT-KIPRSA Laboratories. Cryptographic Token Key Initialization Protocol. Version 1.0, December 2005. URL: ftp://ftp.rsasecurity.com/pub/otps/ct-kip/ct-kip-v1-0.pdf.
FIPS PUB 113NIST. FIPS 113: Computer Data Authentication. May 30, 1985. URL: http://csrc.nist.gov/publications/fips/index.html
FIPS PUB 180-2NIST. FIPS 180-2: Secure Hash Standard. August 1, 2002. URL: http://csrc.nist.gov/publications/fips/index.html
FIPS PUB 186-2NIST. FIPS 186-2: Digital Signature Standard. January 27, 2000. URL: http://csrc.nist.gov/publications/fips/index.html
FIPS PUB 197NIST. FIPS 197: Advanced Encryption Standard (AES). November 26, 2001. URL: http://csrc.nist.gov/publications/fips/index.html
FIPS PUB 74NIST. FIPS 74: Guidelines for Implementing and Using the NBS Data Encryption Standard. April 1, 1981. URL: http://csrc.nist.gov/publications/fips/index.html
FIPS PUB 81NIST. FIPS 81: DES Modes of Operation. December 1980. URL: http://csrc.nist.gov/publications/fips/index.html
FORTEZZA CIPGNSA, Workstation Security Products. FORTEZZA Cryptologic Interface Programmers Guide, Revision 1.52. November 1995.
GCMMcGrew, D. and J. Viega, "The Galois/Counter Mode of Operation (GCM)," J Submission to NIST, January 2004. URL: http://csrc.nist.gov/CryptoToolkit/modes/proposedmodes/gcm/gcm-spec.pdf.
GCS-APIX/Open Company Ltd. Generic Cryptographic Service API (GCS-API), Base - Draft 2. February 14, 1995.
GOST 28147-89 "Information Processing Systems. Cryptographic Protection. Cryptographic Algorithm", GOST 28147-89, Gosudarstvennyi Standard of USSR, Government Committee of the USSR for Standards, 1989. (In Russian).
GOST R 34.10-2001 "Information Technology. Cryptographic Data Security. Formation and Verification Processes of [Electronic] Digital Signature", GOST R 34.10-2001, Gosudarstvennyi Standard of the Russian Federation, Government Committee of the Russian Federation for Standards, 2001. (In Russian).
GOST R 34.11-94 "Information Technology. Cryptographic Data Security. Hashing function", GOST R 34.11-94, Gosudarstvennyi Standard of the Russian Federation, Government Committee of the Russian Federation for Standards, 1994. (In Russian).
ISO/IEC 7816-1ISO. Information Technology " Identification Cards " Integrated Circuit(s) with Contacts " Part 1: Physical Characteristics. 1998.
ISO/IEC 7816-4ISO. Information Technology " Identification Cards " Integrated Circuit(s) with Contacts " Part 4: Interindustry Commands for Interchange. 1995.
ISO/IEC 8824-1ISO. Information Technology-- Abstract Syntax Notation One (ASN.1): Specification of Basic Notation. 2002.
ISO/IEC 8825-1ISO. Information Technology"ASN.1 Encoding Rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER), and Distinguished Encoding Rules (DER). 2002.
ISO/IEC 9594-1ISO. Information Technology " Open Systems Interconnection " The Directory: Overview of Concepts, Models and Services. 2001.
ISO/IEC 9594-8ISO. Information Technology " Open Systems Interconnection " The Directory: Public-key and Attribute Certificate Frameworks. 2001.
ISO/IEC 9796-2ISO. Information Technology " Security Techniques " Digital Signature Scheme Giving Message Recovery " Part 2: Integer factorization based mechanisms. 2002.
Java MIDPJava Community Process. Mobile Information Device Profile for Java 2 Micro Edition. November 2002. URL: http://jcp.org/jsr/detail/118.jsp
MeT-PTDMeT. MeT PTD Definition - Personal Trusted Device Definition, Version 1.0, February 2003. URL: http://www.mobiletransaction.org
NIST AESCTSNational Institute for Standards and Technology, Proposal To Extend CBC Mode By "Ciphertext Stealing" . URL: http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/ciphertext%20stealing% 20proposal.pdf
NIST sp800-38aNational Institute for Standards and Technology, ''Recommendation for Block Cipher Modes of Operation, NIST SP 800-38A. URL: http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf
NIST sp800-38bNational Institute for Standards and Technology, ''Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentications, Special Publication 800-38B. URL: http://csrc.nist.gov/publications/nistpubs/800-38B/SP_800-38B.pdf
PCMCIAPersonal Computer Memory Card International Association. PC Card Standard, Release 2.1,. July 1993.
PKCS #1RSA Laboratories. RSA Cryptography Standard. v2.1, June 14, 2002.
PKCS #11-BRSA Laboratories. PKCS #11 Base Functionality, April 2009.
PKCS #11-CRSA Laboratories. PKCS #11: Conformance Profile Specification, October 2000.
PKCS #11-PRSA Laboratories. PKCS #11 Profiles for mobile devices, June 2003.
PKCS #12RSA Laboratories. Personal Information Exchange Syntax Standard. v1.0, June 1999.
PKCS #3RSA Laboratories. Diffie-Hellman Key-Agreement Standard. v1.4, November 1993.
PKCS #5RSA Laboratories. Password-Based Encryption Standard. v2.0, March 25, 1999
PKCS #7RSA Laboratories. Cryptographic Message Syntax Standard. v1.5, November 1993
PKCS #8RSA Laboratories. Private-Key Information Syntax Standard. v1.2, November 1993.
RFC 1319B. Kaliski. RFC 1319: The MD2 Message-Digest Algorithm. RSA Laboratories, April 1992. URL: http://ietf.org/rfc/rfc1319.txt
RFC 1321R. Rivest. RFC 1321: The MD5 Message-Digest Algorithm. MIT Laboratory for Computer Science and RSA Data Security, Inc., April 1992. URL: http://ietf.org/rfc/rfc1321.txt
RFC 1421J. Linn. RFC 1421: Privacy Enhancement for Internet Electronic Mail: Part I: Message Encryption and Authentication Procedures. IAB IRTF PSRG, IETF PEM WG, February 1993. URL: http://ietf.org/rfc/rfc1421.txt
RFC 2045Freed, N., and N. Borenstein. RFC 2045: Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies. November 1996. URL: http://ietf.org/rfc/rfc2045.txt
RFC 2104Krawczyk, H., Bellare, M., and R. Canetti, "HMAC: Keyed-Hashing for Message Authentication", February 1997.
RFC 2246T. Dierks & C. Allen. RFC 2246: The TLS Protocol Version 1.0. Certicom, January 1999. URL: http://ietf.org/rfc/rfc2246.txt
RFC 2279F. Yergeau. RFC 2279: UTF-8, a transformation format of ISO 10646 Alis Technologies, January 1998. URL: http://ietf.org/rfc/rfc2279.txt
RFC 2534Masinter, L., Wing, D., Mutz, A., and K. Holtman. RFC 2534: Media Features for Display, Print, and Fax. March 1999. URL: http://ietf.org/rfc/rfc2534.txt
RFC 2630R. Housley. RFC 2630: Cryptographic Message Syntax. June 1999. URL: http://ietf.org/rfc/rfc2630.txt
RFC 2743J. Linn. RFC 2743: Generic Security Service Application Program Interface Version 2, Update 1. RSA Laboratories, January 2000. URL: http://ietf.org/rfc/rfc2743.txt
RFC 2744J. Wray. RFC 2744: Generic Security Services API Version 2: C-bindings. Iris Associates, January 2000. URL: http://ietf.org/rfc/rfc2744.txt
RFC 2865Rigney et al, "Remote Authentication Dial In User Service (RADIUS)", IETF RFC2865, June 2000. URL: http://ietf.org/rfc/rfc2865.txt.
RFC 3394Advanced Encryption Standard (AES) Key Wrap Algorithm: http://www.ietf.org/rfc/rfc3394.txt.
RFC 3610Whiting, D., Housley, R., and N. Ferguson, "Counter with CBC-MAC (CCM)", IETF RFC 3610, September 2003. URL: http://www.ietf.org/rfc/rfc3610.txt
RFC 3686Housley, "Using Advanced Encryption Standard (AES) Counter Mode With IPsec Encapsulating Security Payload (ESP)," IETF RFC 3686, January 2004. URL: http://ietf.org/rfc/rfc3686.txt.
RFC 3717Matsui, et al, "A Description of the Camellia Encryption Algorithm," IETF RFC 3717, April 2004. URL: http://ietf.org/rfc/rfc3713.txt.
RFC 3748Aboba et al, "Extensible Authentication Protocol (EAP)", IETF RFC 3748, June 2004. URL: http://ietf.org/rfc/rfc3748.txt.
RFC 3874 Smit et al, "A 224-bit One-way Hash Function: SHA-224," IETF RFC 3874, June 2004. URL: http://ietf.org/rfc/rfc3874.txt.
RFC 4269South Korean Information Security Agency (KISA) "The SEED Encryption Algorithm", December 2005. ftp://ftp.rfc-editor.org/in-notes/rfc4269.txt
RFC 4309Housley, R., "Using Advanced Encryption Standard (AES) CCM Mode with IPsec Encapsulating Security Payload (ESP)," IETF RFC 4309, December 2005. URL: http://ietf.org/rfc/rfc4309.txt
RFC 4357V. Popov, I. Kurepkin, S. Leontiev "Additional Cryptographic Algorithms for Use with GOST 28147-89, GOST R 34.10-94, GOST R 34.10-2001, and GOST R 34.11-94 Algorithms", January 2006.
RFC 4490S. Leontiev, Ed. G. Chudov, Ed. "Using the GOST 28147-89, GOST R 34.11-94,GOST R 34.10-94, and GOST R 34.10-2001 Algorithms with Cryptographic Message Syntax (CMS)", May 2006.
RFC 4491S. Leontiev, Ed., D. Shefanovski, Ed., "Using the GOST R 34.10-94, GOST R 34.10-2001, and GOST R 34.11-94 Algorithms with the Internet X.509 Public Key Infrastructure Certificate and CRL Profile", May 2006.
RFC 4493J. Song et al. RFC 4493: The AES-CMAC Algorithm. June 2006. URL: http://www.ietf.org/rfc/rfc4493.txt
SEC 1Standards for Efficient Cryptography Group (SECG). Standards for Efficient Cryptography (SEC) 1: Elliptic Curve Cryptography. Version 1.0, September 20, 2000.
SEC 2Standards for Efficient Cryptography Group (SECG). Standards for Efficient Cryptography (SEC) 2: Recommended Elliptic Curve Domain Parameters. Version 1.0, September 20, 2000.
TLSIETF. RFC 2246: The TLS Protocol Version 1.0 . January 1999. URL: http://ietf.org/rfc/rfc2246.txt
WIMWAP. Wireless Identity Module. " WAP-260-WIM-20010712-a. July 2001. URL: http://www.wapforum.org/
WPKIWAP. Wireless PKI. " WAP-217-WPKI-20010424-a. April 2001. URL: http://www.wapforum.org/
WTLSWAP. Wireless Transport Layer Security Version " WAP-261-WTLS-20010406-a. April 2001. URL: http://www.wapforum.org/.
X.500ITU-T. Information Technology " Open Systems Interconnection " The Directory: Overview of Concepts, Models and Services. February 2001.X.509ITU-T. Information Technology — Open Systems Interconnection — The Directory: Public-key and Attribute Certificate Frameworks. March 2000.
X.680ITU-T. Information Technology — Abstract Syntax Notation One (ASN.1): Specification of Basic Notation. July 2002.
X.690ITU-T. Information Technology " ASN.1 Encoding Rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER), and Distinguished Encoding Rules (DER). July 2002.

RSA Security Inc. Public-Key Cryptography Standards - PKCS#11 - v230