@misc{rfc5758, series = {Request for Comments}, number = 5758, howpublished = {RFC 5758}, publisher = {RFC Editor}, doi = {10.17487/RFC5758}, url = {https://www.rfc-editor.org/info/rfc5758}, author = {Daniel R. L. Brown and Tim Polk and Stefan Santesson and Kathleen Moriarty and Quynh Dang}, title = {{Internet X.509 Public Key Infrastructure: Additional Algorithms and Identifiers for DSA and ECDSA}}, pagetotal = 8, year = 2010, month = jan, abstract = {This document updates RFC 3279 to specify algorithm identifiers and ASN.1 encoding rules for the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA) digital signatures when using SHA-224, SHA-256, SHA-384, or SHA-512 as the hashing algorithm. This specification applies to the Internet X.509 Public Key infrastructure (PKI) when digital signatures are used to sign certificates and certificate revocation lists (CRLs). This document also identifies all four SHA2 hash algorithms for use in the Internet X.509 PKI. {[}STANDARDS-TRACK{]}}, }