- Title
- Cryptographic Algorithms Profile
- Description
- The Cryptographic Algorithms Profile specifies the use of public standards for cryptographic algorithm interoperability to protect IT systems.
Taxonomy
Standards
Guidance
The following algorithms and parameters are to be used to support specific functions
-
’’’ Root CA Certificates
-
Digest Algorithm SHA-256 or SHA-384 (Root CA certificates, which were signed using SHA-1 before 1 January 2016, may be used until 1 January 2025)
-
RSA modulus size (bits) 3072 or 4096
-
ECC Curve NIST P-256 or P-384
-
’’’ Subordinate CA Certificates
-
Digest Algorithm SHA-256 or SHA-384
-
RSA modulus size (bits) 2048, 3072 or 4096
-
ECC Curve NIST P-256 or P-384
-
’’’ Subscriber Certificates
-
Digest Algorithm SHA-256 or SHA-384
-
RSA modulus size (bits) 2048, 3072 or 4096
-
ECC Curve NIST P-256 or P-384
For further guidance on the implementation the AC/322-N(2020)0077 iTIF Certificate Profiles Version 1.2.2 shall also be considered.
Even more guidance
- A digital certificate service provider shall choose which combination of algorithm and keylength chain to build. The service portfolio may contain several parallel solutions.
- You shall not mix key-algorithms in one CA/sub-CA chain.
- A digital certificate service consumer shall support the full spectrum of possible combinations in algorithm and keylength.
- During a mission instantiation, the service designer shall verify service consumer capabilities with regard to supported algorithms.
-