In cryptography, PKCS is a group of public-key cryptography standards devised and published by RSA Security Inc, starting in the early 1990s. The company published the standards to promote the use of the cryptography techniques to which they had patents, such as the RSA algorithm, the Schnorr signature algorithm and several others. The standards were not industry standards because the company retained control over them. However, in recent years some of the standards began to move into "standards track" processes of relevant standards organizations such as the IETF and PKIX working group.
|PKCS #1||2.1||RSA Cryptography Standard||See RFC 3447. Defines the mathematical properties and format of RSA public and private keys (ASN.1-encoded in clear-text), and the basic algorithms and encoding/padding schemes for performing RSA encryption, decryption, and producing and verifying signatures.|
|PKCS #2||-||Withdrawn||No longer active as of 2010. Covered RSA encryption of message digests; subsequently merged into PKCS #1.|
|PKCS #3||1.4||Diffie–Hellman Key Agreement Standard||A cryptographic protocol that allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel.|
|PKCS #4||-||Withdrawn||No longer active as of 2010. Covered RSA key syntax; subsequently merged into PKCS #1.|
|PKCS #5||2.0||Password-based Encryption Standard||See RFC 2898 and PBKDF2.|
|PKCS #6||1.5||Extended-Certificate Syntax Standard||Defines extensions to the old v1 X.509 certificate specification. Obsoleted by v3 of the same.|
|PKCS #7||1.5||Cryptographic Message Syntax Standard||See RFC 2315. Used to sign and/or encrypt messages under a PKI. Used also for certificate dissemination (for instance as a response to a PKCS#10 message). Formed the basis for S/MIME, which is as of 2010 based on RFC 5652, an updated Cryptographic Message Syntax Standard (CMS). Often used for single sign-on.|
|PKCS #8||1.2||Private-Key Information Syntax Standard||See RFC 5208. Used to carry private certificate keypairs (encrypted or unencrypted).|
|PKCS #9||2.0||Selected Attribute Types||See RFC 2985. Defines selected attribute types for use in PKCS #6 extended certificates, PKCS #7 digitally signed messages, PKCS #8 private-key information, and PKCS #10 certificate-signing requests.|
|PKCS #10||1.7||Certification Request Standard||See RFC 2986. Format of messages sent to a certification authority to request certification of a public key. See certificate signing request.|
|PKCS #11||2.20||Cryptographic Token Interface||Also known as "Cryptoki". An API defining a generic interface to cryptographic tokens (see also Hardware Security Module). Often used in single sign-on, Public-key cryptography and disk encryption systems.|
|PKCS #12||1.0||Personal Information Exchange Syntax Standard||Defines a file format commonly used to store private keys with accompanying public key certificates, protected with a password-based symmetric key. PFX is a predecessor to PKCS #12.
This container format can contain multiple embedded objects, such as multiple certificates. Usually protected/encrypted with a password. Usable as a format for the Java key store and to establish client authentication certificates in Mozilla Firefox. Usable by Apache Tomcat.
|PKCS #13||–||Elliptic Curve Cryptography Standard||(Under development as of 2012.)|
|PKCS #14||–||Pseudo-random Number Generation||(Under development as of 2012.)|
|PKCS #15||1.1||Cryptographic Token Information Format Standard||Defines a standard allowing users of cryptographic tokens to identify themselves to applications, independent of the application's Cryptoki implementation (PKCS #11) or other API. RSA has relinquished IC-card-related parts of this standard to ISO/IEC 7816-15.|
Other articles related to "pkcs":
... In cryptography, PKCS #12 defines an archive file format for storing many cryptography objects as a single file ... A PKCS #12 file may be encrypted and signed ... PKCS #12 is one of the family of standards called Public-Key Cryptography Standards (PKCS) published by RSA Laboratories ...
... Since PKCS #11 is a complex C API many wrappers exist that let the developer use the API from various languages ... NET (C# and VB.NET) and Visual Basic 6 wrapper for PKCS #11 API PyKCS11 - A wrapper for Python Another wrapper for Python Java 5.0 includes a wrapper for PKCS #11 ... SDeanComponents - Delphi wrapper for PKCS #11 API jacknji11 - Java wrapper using Java Native Access (JNA) ruby-pkcs11 - Ruby binding for PKCS #11 API pkcs11.net -.NET wrapper for PKCS #11 ...
... FreeOTFE - Disk encryption system (PKCS #11 can either be used to encrypt critical data block, or as keyfile storage) Mozilla Firefox, a web browser Mozilla Thunderbird ...
... DNA-PKcs is the catalytic subunit of a nuclear DNA-dependent serine/threonine protein kinase called DNA-PK ... On its own, DNA-PKcs is inactive and relies on Ku to direct it to DNA ends and trigger its kinase activity DNA-PKcs is required for the non-homologous end joining (NHEJ) pathway of DNA repair, which rejoins double ... DNA-PKcs knockout mice have severe combined immunodeficiency due to their V(D)J recombination defect ...