Changes

Jump to: navigation, search

CA:MD5and1024

159 bytes added, 17:34, 6 October 2010
Dates for Phasing out MD5-based signatures and 1024-bit moduli
* '''December 31, 2010''' – CAs should stop issuing intermediate and end-entity certificates from roots with RSA key sizes smaller than 2048 bits. All CAs should stop issuing intermediate and end-entity certificates with RSA key size smaller than 2048 bits under any root.
** [http://csrc.nist.gov/publications/PubsDrafts.html#SP-800-131 DRAFT Recommendation for the Transitioning of Cryptographic Algorithms and Key Sizes:] Key lengths providing 80 bits of security using approved digital signature algorithms are allowed for '''legacy''' use after 2010.
*** This means that CAs should only consider issuing a 1024-bit certificate if it is requested and justified by the subscriber for specific reasons, such as interoperability.*** The CA must assess the risk involved in issuing such a certificate for legacy use/interoperability, and determine if they are willing to accept the risk, as well as any possible liability. The subject and relying parties also need to determine if they will accept any risks and liabilities. ** All certificates with RSA key size smaller than 2048 bits must expire by the end of 2013. *** Under no circumstances should any party expect continued support for RSA key size smaller than 2048 bits past December 31, 2013. This date could get moved up substantially if necessary to keep our users safe. We recommend all parties involved in secure transactions on the web move away from 1024-bit moduli as soon as possible. *** All certificates with RSA key size smaller than 2048 bits must expire by the end of 2013.
** CAs who continue to issue certificates with RSA key size smaller than 2048 bits must use randomness in the serial number or in one of the fields in the DN.
Confirm, administrator
5,526
edits

Navigation menu