Skip to main content

Full text of "Using GOST R 34.10-2012 and GOST R 34.11-2012 Algorithms with the Internet X.509 Public Key Infrastructure"

See other formats


Stream: Independent Submission 


RFC: 9215 

Category: Informational 

Published: March 2022 

ISSN: 2070-1721 

Authors: D.Baryshkov, Ed. V. Nikolaev A. Chelpanov 
Linaro Ltd. CryptoPro InfoTeCS JSC 


RFC 9215 

Using GOST R 34.10-2012 and GOST R 34.11-2012 
Algorithms with the Internet X.509 Public Key 
Infrastructure 


Abstract 


This document describes encoding formats, identifiers, and parameter formats for the GOSTR 
34.10-2012 and GOST R 34.11-2012 algorithms for use in the Internet X.509 Public Key 
Infrastructure (РКІ). 


This specification is developed to facilitate implementations that wish to support the GOST 
algorithms. This document does not imply IETF endorsement of the cryptographic algorithms 
used in this document. 


Status of This Memo 


This document is not an Internet Standards Track specification; it is published for informational 
purposes. 


This is a contribution to the RFC Series, independently of any other RFC stream. The RFC Editor 
has chosen to publish this document at its discretion and makes no statement about its value for 
implementation or deployment. Documents approved for publication by the RFC Editor are not 
candidates for any level of Internet Standard; see Section 2 of RFC 7841. 


Information about the current status of this document, any errata, and howto provide feedback 
on it may be obtained at https://www.rfc-editor.org/info/rfc9215. 


Copyright Notice 


Copyright (c) 2022 ТЕТЕ Trust and the persons identified as the document authors. АП rights 
reserved. 


Baryshkov, et al. Informational Page1 


КЕС9215 


This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF 
Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this 


PKIX: GOST R 34.10-2012, 34.11-2012 


March 2022 


document. Please review these documents carefully, as they describe your rights and restrictions 
with respect to this document. 


Table of Contents 


1. 


© o N Oo 


Introduction 


1.1. Requirements Language 


. Signature Algorithm Support 
. Hash Function Support 


. Subject Public Keys Information Fields 


4.1. Public Key Identifiers 
4.2. Public Key Parameters 
4.3. Public Key Encoding 
4.4. Key Usage Extension 


. Qualified Certificate Extensions 


5.1. Distinguished Name Additions 
5.2. Certificate Policies 
5.3. Subject Sign Tool 


5.4. Issuer Sign Tool 


. Historical Considerations 
. IANA Considerations 
. Security Considerations 


. References 


9.1. Normative References 


9.2. Informative References 


Appendix A. GostR3410-2012-PKISyntax 


Appendix B. GostR3410-2012-RuStrongCertsSyntax 


Appendix C. Public Key Parameters 


Baryshkov, et al. Informational 


Page 2 


КЕС9215 PKIX: GOST R 34.10-2012, 34.11-2012 March 2022 


Appendix D. Test Examples 
D.1. GOST R 34.10-2001 Test Parameters (256-Bit Private Key Length) 
D.1.1. Certificate Request 
D.1.2. Certificate 


D.1.3. Certificate Revocation List 


D.2. GOST R 34.10-2012 TC26-256-A Parameters (256-Bit Private Key Length) 
D.2.1. Certificate Request 
D.2.2. Certificate 


D.2.3. Certificate Revocation List 


D.3. GOST R 34.10-2012 Test Parameters (512-Bit Private Key Length) 
D.3.1. Certificate Request 
D.3.2. Certificate 


D.3.3. Certificate Revocation List 


Appendix E. GOST R 34.10-2012 Test Parameters (Curve Definition) 
E.1. Elliptic Curve Modulus 
E.2. Elliptic Curve Coefficients 
E.3. Elliptic Curve Points Group Order 
E.4. Order of Cyclic Subgroup of Elliptic Curve Points Group 


E.5. Elliptic Curve Point Coordinates 


Contributors 


Authors' Addresses 


1. Introduction 


This document describes the conventions for using the GOST R 34.10-2012 signature algorithm 
[GOSTR3410-2012] [RFC7091] and the GOST R 34.11-2012 hash function [GOSTR3411-2012] 
[RFC6986] in the Internet X.509 Public Key Infrastructure (PKI) [RFC5280]. 


This specification defines the contents of the signatureAlgorithm, signatureValue, signature, and 
subjectPublicKeyInfo fields within X.509 Certificates and Certificate Revocation Lists (CRLs). For 
each algorithm, the appropriate alternatives for the keyUsage certificate extension are provided. 


Baryshkov, et al. Informational Page3 


КЕС9215 PKIX: GOST R 34.10-2012, 34.11-2012 March 2022 


This specification is developed to facilitate implementations that wish to support the GOST 
algorithms. This document does not imply IETF endorsement of the cryptographic algorithms 
used in this document. 


1.1. Requirements Language 


The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", 
"RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be 
interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all 
capitals, as shown here. 


2. Signature Algorithm Support 


Conforming Certificate Authorities (CAs) MAY use the GOST R 34.10-2012 signature algorithm to 
sign certificates and CRLs. This signature algorithm MUST always be used with the GOSTR 
34.11-2012 hash function. It may use a key length of either 256 bits or 512 bits. 


The ASN.1 object identifier (OID) used to identify the GOST R 34.10-2012 signature algorithm with a 
256-bit key length and the GOST R 34.11-2012 hash function with a 256-bit hash code is: 


id-tc26-signwithdigest-gost3410-12-256 OBJECT IDENTIFIER ::- 
( iso(1) member-body(2) ru(643) rosstandart(7) tc26(1) 
algorithms(1) signwithdigest(3) gost3410-12-256(2) } 


The GOST R 34.10-2012 signature algorithm with a 256-bit key length generates a digital signature 
in the form of two 256-bit integers: г and s. Its octet string representation consists of 64 octets, 
where the first 32 octets contain the big-endian representation of s and the second 32 octets 
contain the big-endian representation ofr. 


The ASN.1 OID used to identify the GOST R 34.10-2012 signature algorithm with a 512-bit key length 
and the GOST R 34.11-2012 hash function with a 512-bit hash code is: 


id-tc26-signwithdigest-gost3410-12-512 OBJECT IDENTIFIER ::- 
( iso(1) member-body(2) ru(643) rosstandart(7) tc26(1) 
algorithms(1) signwithdigest(3) gost3410-12-512(3) } 


The GOST R 34.10-2012 signature algorithm with a 512-bit key length generates a digital signature 
in the form of two 512-bit integers: r and s. Its octet string representation consists of 128 octets, 
where the first 64 octets contain the big-endian representation of s and the second 64 octets 
contain the big-endian representation ofr. 


When either of these OIDs is used as the algorithm field іп an AlgorithmIdentifier structure, the 
encoding MUST omit the parameters field. 


Baryshkov, et al. Informational Page4 


КЕС9215 PKIX: GOST R 34.10-2012, 34.11-2012 March 2022 


The described definition of a signature value is directly usable in the Cryptographic Message 
Syntax (CMS) [RFC5652], where such values are represented as octet strings. However, signature 
values in certificates and CRLs [RFC5280] are represented as bit strings, and thus the octet string 
representation must be converted. 


To convert an octet string signature value to a bit string, the most significant bit of the first octet 
ofthe signature value SHALL become the first bit of the bit string, and so on through the least 
significant bit of the last octet of the signature value, which SHALL become the last bit of the bit 
string. 


3. Hash Function Support 


The ASN.1 OID used to identify the GOST R 34.11-2012 hash function with a 256-bit hash code is: 


id-tc26-gost3411-12-256 OBJECT IDENTIFIER ::- 
( iso(1) member-body(2) ru(643) rosstandart(7) tc26(1) 
algorithms(1) digest(2) 90513411-12-256(2)) 


The ASN.1 OID used to identify the GOST R 34.11-2012 hash function with a 512-bit hash code is: 


id-tc26-gost3411-12-512 OBJECT IDENTIFIER ::- 
( iso(1) member-body(2) ru(643) rosstandart(7) tc26(1) 
algorithms(1) digest(2) 90513411-12-512(3)) 


When either of these OIDs is used as the algorithm field іп an AlgorithmIdentifier structure, the 
encoding MUST omit the parameters field. 


4. Subject Public Keys Information Fields 


4.1. Public Key Identifiers 
GOST R 34.10-2012 public keys with a 256-bit private key length are identified by the following OID: 


id-tc26-gost3410-12-256 OBJECT IDENTIFIER ::- 
( iso(1) member-body(2) ru(643) rosstandart(7) tc26(1) 
algorithms(1) sign(1) gost3410-12-256(1)) 


GOST R 34.10-2012 public keys with a 512-bit private key length are identified by the following OID: 


id-tc26-gost3410-12-512 OBJECT IDENTIFIER ::- 
( iso(1) member-body(2) ru(643) rosstandart(7) tc26(1) 
algorithms(1) sign(1) gost3410-12-512(2)) 


Baryshkov, et al. Informational Page 5 


КЕС9215 PKIX: GOST R 34.10-2012, 34.11-2012 March 2022 


4.2. Public Key Parameters 


When either of these identifiers appears as the algorithm field in the 
SubjectPublicKeyInfo.algorithm.algorithm field, the parameters field MUST have the following 
structure: 


GostR3410-2012-PublicKeyParameters ::- SEQUENCE 


publicKeyParamSet OBJECT IDENTIFIER, 
digestParamSet OBJECT IDENTIFIER OPTIONAL 


where: 


* publicKeyParamSet is the public key parameters identifier for GOST R 34.10-2012 
parameters (see Sections 5.1.1 and 5.2.1 of [RFC7836] or Appendix C) or GOST R 34.10-2001 
parameters (see Section 8.4 of [RFC4357]). 


* digestParamSet is the parameters identifier for the corresponding GOST R 34.11-2012 
parameters (see Section 3). 


The following values, when used as publicKeyParamSet, define test public key parameter sets 
and MUST NOT be used outside of testing scenarios: 


e id-GostR3410-2001-TestParamSet 
*id-tc26-gost-3410-2012-512-paramSetTest 


The digestParamSet field: 


* SHOULD be omitted if the GOST R 34.10-2012 signature algorithm is used with a 512-bit key 
length 


• MUST be present and must ре equal to id-tc26-digest-gost3411-12-256 if one of the 
following values is used as publicKeyParamSet: 
id-GostR3410-2001-TestParamSet 


id-GostR3410-2001-CryptoPro-A-ParamSet 
id-GostR3410-2001-CryptoPro-B-ParamSet 
id-GostR3410-2001-CryptoPro-C-ParamSet 
id-GostR3410-2001-CryptoPro-XchA-ParamSet 
id-GostR3410-2001-CryptoPro-XchB-ParamSet 


о 


о 


о 


о 


о 


о 


* SHOULD be omitted if publicKeyParamSet is equal to: 
о id-tc26-gost-3410-2012-256-paramSetA 


* MUST be omitted if one of the following values is used as publicKeyParamSet: 
o id-tc26-gost-3410-2012-256-paramSetB 


о id-tc26-gost-3410-2012-256-paramSetC 


Baryshkov, et al. Informational Page 6 


КЕС9215 PKIX: GOST R 34.10-2012, 34.11-2012 March 2022 


o id-tc26-gost-3410-2012-256-paramSetD 


4.3. Public Key Encoding 


The GOST R 34.10-2012 public key MUST be ASN.1 DER encoded as an OCTET STRING. This encoding 
SHALL be used as the content (i.e., the value) of the subjectPublicKey field (а BIT STRING) of the 
SubjectPublicKeyInfo structure. 


GostR3410-2012-256-PublicKey 
GostR3410-2012-512-PublicKey 


OCTET STRING (SIZE(64)) 
OCTET STRING (SIZE (128)) 


GostR3410-2012-256-PublicKey MUST contain 64 octets, where the first 32 octets contain the 
little-endian representation of the x coordinate of the public key and the second 32 octets contain 
the little-endian representation of the y coordinate of the public key. 


GostR3410-2012-512-PublicKey MUST contain 128 octets, where the first 64 octets contain the 
little-endian representation of the x coordinate of the public key and the second 64 octets contain 
the little-endian representation of the y coordinate of the public key. 


4.4. Key Usage Extension 


If the KeyUsage extension is present in a certificate with the GOST R 34.10-2012 public key, the 
following values MAY be present: 


e digitalSignature (0) 
* contentCommitment (1) 
* keyEncipherment (2) 

* dataEncipherment (3) 
* keyAgreement (4) 

* keyCertSign (5) 

e cRLSign (6) 

* encipherOnly (7) 

e decipherOnly (8) 


Note that contentCommitment was named nonRepudiation in previous versions of X.509. 


Ifthe key is going to be used for key agreement, the keyAgreement flag MUST be present in the 
KeyUsage extension, with the encipherOnly and decipherOnly flags being optional. However, 
the encipherOnly and decipherOnly flags MUST NOT be present simultaneously. 


5. Qualified Certificate Extensions 


This section defines additional OIDs for use in qualified certificates for checking digital 
signatures. 


Baryshkov, et al. Informational Page 7 


КЕС9215 PKIX: GOST R 34.10-2012, 34.11-2012 March 2022 


5.1. Distinguished Name Additions 


OGRN is the main state registration number of juridical entities. 
OGRN ::= NUMERIC STRING (SIZE(13)) 


The corresponding ОШ is 1.2.643.100.1. 


SNILS is the individual insurance account number. 
SNILS ::- NUMERIC STRING (SIZE(11)) 


The corresponding ОШ 15 1.2.643.100.3. 


INNLE is the individual taxpayer number (ITN) of the legal entity. 
INNLE ::= NUMERIC STRING (SIZE(10)) 


The corresponding ОШ is 1.2.643.100.4. 


OGRNIP is the main state registration number of individual entrepreneurs (sole traders). 
OGRNIP ::- NUMERIC STRING (SIZE(15)) 


The corresponding ОШ 15 1.2.643.100. 5. 


IdentificationKind represents the way the receiver of the certificate was identified by the CA. 


IdentificationKind ::- INTEGER 4 personal(0), remote-cert(1), 
remote-passport(2), remote-system(3) ) 


The corresponding ОШ is1.2.643.100.114. 


INN is the individualtaxpayer number (ITN). 
INN ::- NUMERIC STRING (SIZE(12)) 


The corresponding ОШ 15 1.2.643.3.131.1.1. 


Baryshkov, et al. Informational Page 8 


КЕС9215 PKIX: GOST R 34.10-2012, 34.11-2012 March 2022 


5.2. Certificate Policies 


The Russian national regulation body for cryptography defines several security levels of 
cryptographic tools. Depending on the class of cryptographic token used by the certificate owner, 
the following OIDs must be included in certificate policies. Certificates should include OIDs, 
starting from the lowest (KC1) up to the strongest applicable. 


*1.2.643.100.113.1- class KC1 
*1.2.643.100.113.2-class KC2 
*1.2.643.100.113.3- class KC3 
*1.2.643.100.113.4- class KB1 
*1.2.643.100.113.5-class KB2 
*1.2.643.100.113.6- class КАТ 


5.3. Subject Sign Tool 


To denote the token or software type used by the certificate owner, the following non-critical 
SubjectSignTool extension with OID 1.2.643.100.111 should be included. It is defined as 


SubjectSignTool ::= UTF8String(SIZE(1..200)) 


5.4. Issuer Sign Tool 


To denote the tools used to generate key pairs and tools used by the CA to sign certificates, the 
following non-critical IssuerSignTool extension with OID 1.2.643.100.112 should be 
included. It is defined as 


IssuerSignTool ::= SEQUENCE 4 
signTool UTF8String(SIZE(1..200)), 
cATool UTF8String(SIZE(1..200)), 


signToolCert UTF8String(SIZE(1..100)), 
cAToolCert UTF8String(SIZE(1..100)) } 


where: 


e signTool identifies tools used to create key pairs. 
e cATool identifies tools used by the CA. 


*signToolCert and cAToolCert contain the notice of the conformance of respective tools to 
Russian federal law on digital signatures. 


Baryshkov, et al. Informational Page 9 


КЕС9215 PKIX: GOST R 34.10-2012, 34.11-2012 March 2022 


6. Historical Considerations 


Note that, for a significant period of time, there were no documents describing GostR3410-2012- 
PublicKeyParameters.Several old implementations have used GostR3410-2001- 
PublicKeyParameters instead. These implementations will return an error if the 
digestParamSet field is not included in public key parameters. Thus, an implementation 
wishing to collaborate with old implementations might want to include digestParamSet equal 
toid-tc26-digest-gost3411-12-512 if one ofthe following values is used as 
publicKeyParamSet: 


*id-tc26-gost-3410-12-512-paramSetA 
*id-tc26-gost-3410-12-512-paramSetB 


Note that the usage of keyEncipherment and dataEncipherment values for the KeyUsage 
extension is not fully defined for the GOST R 34.10-2012 public keys, so they SHOULD be used with 
additional care. 


7. IANA Considerations 


This document has no IANA actions. 


8. Security Considerations 


It is RECOMMENDED that applications verify signature values and subject public keys to conform 
to the GOST R 34.10-2012 standard [GOSTR3410-2012] [RFC7091] prior to their use. 


It is RECOMMENDED that CAs and applications make sure that the private key for creating 
signatures is not used for more than its allowed validity period (typically 15 months for the GOST 
R 34.10-2012 algorithm). 


Test parameter sets (id-GostR3410-2001-TestParamSet and id-tc26- 
gost-3410-2012-512-paramSetTest) MUST NOT be used outside of testing scenarios. The use of 
parameter sets not described herein is NOT RECOMMENDED. When different parameters are used, 
itis RECOMMENDED that they be subjected to examination by an authorized agency with 
approved methods of cryptographic analysis. 


For security discussions concerning the use of algorithm parameters, see [ANS17] and the Security 
Considerations sections in [RFC4357] and [RFC7836]. 


9. References 


9.1. Normative References 


[RFC2119] 


Baryshkov, et al. Informational Page 10 


КЕС9215 PKIX: GOST R 34.10-2012, 34.11-2012 March 2022 


Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, 
RFC 2119, DOI 10.17487/RFC2119, March 1997, «https://www.rfc-editor.org/info/ 
rfc2119>. 


[RFC4357] Popov, V., Kurepkin, I., and S. Leontiev, "Additional Cryptographic Algorithms for 
Use with GOST 28147-89, GOST R 34.10-94, GOST R 34.10-2001, and GOST R 34.11-94 
Algorithms", RFC 4357, DOI 10.17487/RFC4357, January 2006, <https://www.rfc- 
editor.org/info/rfc4357>. 


[RFC5280] Cooper, D., Santesson, S., Farrell, S., Boeyen, S., Housley, R., and W. Polk, "Internet 
X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) 
Profile", RFC 5280, DOI 10.17487/RFC5280, May 2008, <https://www.rfc-editor.org/ 
info/rfc5280>. 


[RFC5652] Housley, R., "Cryptographic Message Syntax (CMS)", STD 70, RFC 5652, DOI 
10.17487/RFC5652, September 2009, <https://www.rfc-editor.org/info/rfc5652>. 


[RFC6986] Dolmatov, У., Ed. and A. Degtyarev, "GOST R 34.11-2012: Hash Function", RFC 6986, 
DOI 10.17487/RFC6986, August 2013, <https://www.rfc-editor.org/info/rfc6986>. 


[RFC7091] Dolmatov, У., Ed. and A. Degtyarev, "GOST R 34.10-2012: Digital Signature 
Algorithm", RFC 7091, DOI 10.17487/RFC7091, December 2013, <https://www.rfc- 
editor.org/info/rfc7091>. 


[RFC7836] Smyshlyaev, S., Ed. Alekseev, E., Oshkin, I., Popov, V., Leontiev, S., Podobaev, V., 
and D. Belyavsky, "Guidelines on the Cryptographic Algorithms to Accompany 
the Usage of Standards GOST R 34.10-2012 and GOST R 34.11-2012", RFC 7836, DOI 
10.17487/RFC7836, March 2016, <https://www.rfc-editor.org/info/rfc7836>. 


[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, 
RFC 8174, DOI 10.17487/RFC8174, Мау 2017, «https://www.rfc-editor.org/info/ 
rfc8174>. 


9.2. Informative References 


[ANS17] Alekseev, E.K., Nikolaev, V.D., and SV. Smyshlyaev, "On the security properties of 
Russian standardized elliptic curves", Mathematical Aspects of Cryptography, 
9:3, P. 5-32, DOI 10.4213/mvk260, 2018, <https://doi.org/10.4213/mvk260>. 


[GOSTR3410-2012] "Information technology. Cryptographic data security. Signature and 
verification processes of [electronic] digital signature", GOST R 34.10-2012, 
Federal Agency on Technical Regulating and Metrology, 2012. 


[GOSTR3411-2012] "Information technology. Cryptographic Data Security. Hashing function", 
GOST R 34.11-2012, Federal Agency on Technical Regulating and Metrology, 2012. 


Baryshkov, et al. Informational Page 11 


КЕС9215 PKIX: GOST R 34.10-2012, 34.11-2012 March 2022 


Appendix A. GostR3410-2012-PKISyntax 


Baryshkov, et al. Informational Page 12 


КЕС9215 PKIX: GOST R 34.10-2012, 34.11-2012 March 2022 


GostR3410-2012-PKISyntax 
( iso(1) member-body(2) ru(643) rosstandart(7) 
tc26(1) modules(@) gostR3410-2012-PKISyntax(2) ) 


DEFINITIONS ::- 
BEGIN 
-- EXPORTS All -- 


-- ASN.1 TC 26 root 
id-tc26 OBJECT IDENTIFIER ::- 
( iso(1) member-body(2) ru(643) rosstandart(7) tc26(1) ) 


-- Signature algorithm 
id-tc26-sign OBJECT IDENTIFIER ::- 
( id-tc26 algorithms(1) sign(1) ) 


-- Hash algorithm 
id-tc26-digest OBJECT IDENTIFIER ::- 
( id-tc26 algorithms(1) digest(2) ) 


-- Public key identifiers 
id-tc26-sign-constants OBJECT IDENTIFIER ::- 
( id-tc26 constants(2) sign(1) ) 


-- Public key algorithm GOST R 34.10-2012 / 256-bit identifiers 
id-tc26-gost-3410-2012-256-constants OBJECT IDENTIFIER ::- 
( id-tc26-sign-constants gost-3410-2012-256(1) ) 


-- Public key algorithm GOST R 34.10-2012 / 512-bit identifiers 
id-tc26-gost-3410-2012-512-constants OBJECT IDENTIFIER ::- 
( id-tc26-sign-constants gost-3410-2012-512(2) ) 


-- GOST R 34.10-2012 / 256-bit signature algorithm 
id-tc26-gost3410-12-256 OBJECT IDENTIFIER ::- 
( id-tc26-sign gost3410-12-256(1) ) 


-- GOST R 34.10-2012 / 512-bit signature algorithm 
id-tc26-gost3410-12-512 OBJECT IDENTIFIER ::- 
( id-tc26-sign gost3410-12-512(2) ) 


-- GOST R 34.11-2012 / 256-bit hash algorithm 
id-tc26-gost3411-12-256 OBJECT IDENTIFIER ::- 
( id-tc26-digest gost3411-12-256(2)) 


-- GOST R 34.11-2012 / 512-bit hash algorithm 
id-tc26-gost3411-12-512 OBJECT IDENTIFIER ::- 
( id-tc26-digest gost3411-12-512(3)) 


-- GOST R 34.10-2012 / GOST R 34.11-2012 sign/hash algorithm 
id-tc26-signwithdigest OBJECT IDENTIFIER ::- 
( id-tc26 algorithms(1) signwithdigest(3) ) 


-- Signature & hash algorithm GOST R 34.10-2012 / 256 bits 
-- with GOST R 34.11-2012 
id-tc26-signwithdigest-gost3410-12-256 OBJECT IDENTIFIER ::- 
( id-tc26-signwithdigest gost3410-12-256(2) ) 


Baryshkov, et al. Informational Page 13 


КЕС9215 PKIX: GOST R 34.10-2012, 34.11-2012 


-- Signature & hash algorithm GOST R 34.10-2012 / 512 bits 
-- with GOST R 34.11-2012 
id-tc26-signwithdigest-gost3410-12-512 OBJECT IDENTIFIER ::- 
( id-tc26-signwithdigest gost3410-12-512(3) ) 


-- GOST R 34.10-2012 / 256-bit signature algorithm 

-- parameters identifier: "Set A" 
id-tc26-gost-3410-2012-256-paramSetA OBJECT IDENTIFIER ::- 
( id-tc26-gost-3410-2012-256-constants paramSetA(1) ) 


-- GOST R 34.10-2012 / 256-bit signature algorithm 

-- parameters identifier: "Set B" 
id-tc26-gost-3410-2012-256-paramSetB OBJECT IDENTIFIER ::- 
( id-tc26-gost-3410-2012-256-constants paramSetB(2) ) 


-- GOST R 34.10-2012 / 256-bit signature algorithm 

-- parameters identifier: "Set C" 
id-tc26-gost-3410-2012-256-paramSetC OBJECT IDENTIFIER ::- 
( id-tc26-gost-3410-2012-256-constants paramSetC(3) ) 


-- GOST R 34.10-2012 / 256-bit signature algorithm 

-- parameters identifier: "Set D" 
id-tc26-gost-3410-2012-256-paramSetD OBJECT IDENTIFIER ::- 
( id-tc26-gost-3410-2012-256-constants paramSetD(4) ) 


-- GOST R 34.10-2012 / 512-bit signature algorithm 

-- parameters identifier: "Test set" 
id-tc26-gost-3410-2012-512-paramSetTest OBJECT IDENTIFIER 
( id-tc26-gost-3410-2012-512-constants paramSetTest(0) } 


-- GOST R 34.10-2012 / 512-bit signature algorithm 

-- parameters identifier: "Set A" 
id-tc26-gost-3410-2012-512-paramSetA OBJECT IDENTIFIER ::- 
( id-tc26-gost-3410-2012-512-constants paramSetA(1) ) 


-- GOST R 34.10-2012 / 512-bit signature algorithm 

-- parameters identifier: "Set B" 
id-tc26-gost-3410-2012-512-paramSetB OBJECT IDENTIFIER 
( id-tc26-gost-3410-2012-512-constants paramSetB(2) ) 


-- GOST R 34.10-2012 / 512-bit signature algorithm 

-- parameters identifier: "Set C" 
id-tc26-gost-3410-2012-512-paramSetC OBJECT IDENTIFIER ::- 
( id-tc26-gost-3410-2012-512-constants paramSetC(3) ) 


-- Public key GOST R 34.10-2012 / 256 bits 
GostR3410-2012-256-PublicKey ::- OCTET STRING (SIZE (64)) 
-- Public key GOST R 34.10-2012 / 512 bits 
GostR3410-2012-512-PublicKey ::- OCTET STRING (SIZE (128)) 
-- Public key GOST R 34.10-2012 

GostR3410-2012-PublicKey ::- OCTET STRING (SIZE (64 | 128)) 


-- Public key parameters GOST R 34.10-2012 
GostR3410-2012-PublicKeyParameters ::- 
SEQUENCE { 
publicKeyParamSet OBJECT IDENTIFIER, 
digestParamSet OBJECT IDENTIFIER OPTIONAL 


Baryshkov, et al. Informational 


March 2022 


Page14 


КЕС9215 PKIX: GOST R 34.10-2012, 34.11-2012 March 2022 


END -- GostR3410-2012-PKISyntax 


Baryshkov, et al. Informational Page 15 


КЕС9215 PKIX: GOST R 34.10-2012, 34.11-2012 March 2022 


Appendix B. GostR3410-2012-RuStrongCertsSyntax 


Baryshkov, et al. Informational Page 16 


КЕС9215 PKIX: GOST R 34.10-2012, 34.11-2012 March 2022 


RuStrongCertsSyntax 
( iso(1) member-body(2) ru(643) rosstandart(7) 
tc26(1) modules(@) ruStrongCertsSyntax(6) ) 


DEFINITIONS ::- 
BEGIN 
-- EXPORTS All -- 


id-ca OBJECT IDENTIFIER ::- 
( iso(1) member-body(2) ru(643) ca(3) ) 


id-fss OBJECT IDENTIFIER ::- 
( iso(1) member-body(2) ru(643) fss(100) ) 


id-fns OBJECT IDENTIFIER ::- 
( id-ca fns(131) ) 


-- The main state registration number of juridical entities. 
OGRN ::- NumericString(SIZE (13)) 


id-OGRN OBJECT IDENTIFIER ::- 
( id-fss ogrn(1) ) 


-- The individual insurance account number. 
SNILS ::- NumericString(SIZE (11)) 


id-SNILS OBJECT IDENTIFIER ::- 
( id-fss snils(3) ) 
-- The main state registration number of 
-- individual entrepreneurs (sole traders). 
OGRNIP ::- NumericString(SIZE (15)) 


id-OGRNIP OBJECT IDENTIFIER ::- 
( id-fss ogrnip(5) ) 


id-class OBJECT IDENTIFIER ::- 
( id-fss class(113) } 


id-class-kc1 OBJECT IDENTIFIER ::- 
( id-class kc1(1) } 


id-class-kc2 OBJECT IDENTIFIER ::- 
( id-class kc2(2) ) 


id-class-kc3 OBJECT IDENTIFIER ::- 
( id-class kc3(3) ) 


id-class-kb1 OBJECT IDENTIFIER ::- 
( id-class kb1(4) } 


id-class-kb2 OBJECT IDENTIFIER ::- 
( id-class kb2(5) ) 


id-class-ka OBJECT IDENTIFIER ::- 
( id-class ka(6) ) 


Baryshkov, et al. Informational Page 17 


КЕС9215 PKIX: GOST R 34.10-2012, 34.11-2012 March 2022 


-- The individual taxpayer number (ITN). 
INN ::- NumericString(SIZE (12)) 


id-INN OBJECT IDENTIFIER ::- 
( id-fns ids(1) inn(1) ) 


-- The organization taxpayer number (OTN). 
INNLE ::- NumericString(SIZE (10)) 


id-INNLE OBJECT IDENTIFIER ::- 
( id-fss innle(4) ) 


-- The token or software type used by the certificate owner. 
SubjectSignTool ::= UTF8String(SIZE(1..200)) 


id-SubjectSignTool OBJECT IDENTIFIER ::- 
( id-fss subjectSignTool(111) ) 


-- The tools used to generate key pairs and tools used by 
-- the CA to sign certificates. 


IssuerSignTool ::= SEQUENCE 4 
signTool UTF8String(SIZE(1..200)), 
cATool UTF8String(SIZE(1..200)), 


signToolCert UTF8String(SIZE(1..100)), 
cAToolCert UTF8String(SIZE(1..100)) ) 


id-IssuerSignTool OBJECT IDENTIFIER ::- 
( id-fss issuerSignTool(112) ) 


-- The method of identifying the owner, when it applies/receives 

-- the certificate in the CA. 

IdentificationKind ::= INTEGER 4 personal(0), remote-cert(1), 
remote-passport(2), remote-system(3) ) 


id-IdentificationKind OBJECT IDENTIFIER ::- 
( id-fss identificationKind(114) ) 


END -- RuStrongCertsSyntax 


Appendix C. Public Key Parameters 


Неге we define three new OIDs for three existing public key parameter sets defined in [RFC4357]. 
These OIDs MUST be used with GOST R 34.10-2012 public keys only. 


id-tc26-gost-3410-2012-256-paramSetB OBJECT IDENTIFIER ::- 
( iso(1) member-body(2) ru(643) rosstandart(7) tc26(1) 
constants(2) sign-constants(1) gost-3410-12-256-constants(1) 
paramSetB(2)) 


The elliptic curve of this parameter set is the same as that of id-GostR3410-2001-CryptoPro- 
A-ParamSet (and id-GostR3410-2001-CryptoPro-XchA-ParamSet), which can be found in 
[RFC4357]. 


Baryshkov, et al. Informational Page 18 


КЕС9215 PKIX: GOST R 34.10-2012, 34.11-2012 March 2022 


id-tc26-gost-3410-2012-256-paramSetC OBJECT IDENTIFIER ::- 
( iso(1) member-body(2) ru(643) rosstandart(7) tc26(1) 
constants(2) sign-constants(1) gost-3410-12-256-constants(1) 
paramSetC(3)) 


The elliptic curve of this parameter set is the same as that of id-GostR3410-2001-CryptoPro- 
B-ParamSet, which can be found in [RFC4357]. 


id-tc26-gost-3410-2012-256-paramSetD OBJECT IDENTIFIER ::- 
( iso(1) member-body(2) ru(643) rosstandart(7) tc26(1) 
constants(2) sign-constants(1) gost-3410-12-256-constants(1) 
paramSetD(4)) 


The elliptic curve of this parameter set is the same as that of id-GostR3410-2001-CryptoPro- 
C-ParamSet (and id-GostR3410-2001-CryptoPro-XchB-ParamSet), which can be found in 
[RFC4357]. 


Appendix D. Test Examples 
D.1. GOST R 34.10-2001 Test Parameters (256-Bit Private Key Length) 
This example uses the curve defined in Section 7.1 of [RFC7091]. 


The private key is 


d = @x7A929ADE789BB9BE19ED359DD39A72C1 \ \ 
1B60961F49397EEE1D19CE9891EC3B28 


The public key is 


@x7F2B49E270DB6D98D8595BEC458B50C5\ \ 
8585BA1D4E9B788F6689DBD8E56FD80B 


х 
П 


@x26F1B489D6701DD185C8413A977B3CBB\ \ 
AF64D1C593D26627DFFB101A87FF77DA 


Baryshkov, et al. Informational Page 19 


КЕС9215 


PKIX: GOST R 34.10-2012, 34.11-2012 


D.1.1. Certificate Request 


(vA s 
129: 

15 
Ss 
165 
14 


3 
6 
9 
11 
13 
15 
20 


29 
31 
33 
43 
45 
54 


64 
67 


133 


135 
137 


147 


Baryshkov, et al. 


-BEGIN CERTIFICATE REQUEST 
MIHTMIGBAgEAMBIXEDAOBgNVBAMTBOVAYW1wbGUwZ j Af BggqhQMHAQEBATATBgcq 
hQMCAiMABggqhQMHAQECAgNDAARACO9hv5djbiWaPeJtOHbqFhcVQiO0XsWinYkG3b 
c0JJK3/ad/-*HGhD73ydm0pPFOWSvuzx7lzpByIXRHXDWibTxJqAAMAoGCCqFAwcB 
AQMCA0EAaqqz j ) XUqqUXIAMBeZEi2FVIT1efTLuW1jzf3zrMQypBqijS8asUgoDN 
ntVv7aQZdAU1VKQnZ7g60EP90dwEkwz- 


-END CERTIFICATE REQUEST 


67: 
64: 


SEQUENCE { 
SEQUENCE { 
INTEGER 0 
SEQUENCE { 
SET ( 
SEQUENCE ( 


OBJECT IDENTIFIER commonName (2 5 4 3) 
'Example' 


PrintableString 


} 


} 
SEQUENCE { 
SEQUENCE { 


OBJECT IDENTIFIER '1 2 643 7 
SEQUENCE ( 
OBJECT IDENTIFIER '1 2 643 
OBJECT IDENTIFIER '1 2 643 
) 
) 
ВІТ STRING, encapsulates 4 
OCTET STRING 
өв 08 6F Е5 08 DB 89 66 ЗЕ 
C5 50 8B 45 EC 5B 59 p8 90 
РА И БЕЗВИ ТА ЕТО ЕВО DERZ 
ВВ ЗС 7В 97 ЗА 41 С8 85 01 
) 
ци {} 
SEQUENCE { 
OBJECT IDENTIFIER 12 643 7 1 1 
} 
BIT STRING 
6A АА B3 8E 35 D4 АА А5 17 94 03 
55 48 4F 57 9F 4C BB 96 D6 3C DF 
41 AA 28 D2 F1 AB 14 82 8@ CD 9E 
74 05 35 54 А4 27 67 B8 ЗА DO 43 
) 
Informational 


91 
сс 
Ер 
DC 


22 
43 
A4 
04 


BA 
49 
D1 
В4 


D8 
2A 
19 
93 


85 85 
2B 7F 
64 AF 
F1 26 


March 2022 


Page 20 


КЕС9215 PKIX: GOST R 34.10-2012, 34.11-2012 March 2022 


D.1.2. Certificate 


Baryshkov, et al. Informational Page 21 


КЕС9215 


205 
207 


Baryshkov, et al. 


PKIX: GOST R 34.10-2012, 34.11-2012 March 2022 


SBEGIN CERTIEICATE----- 
MIIBLTCB26ADAgECAgEKMAoGCCqFAwcBAQMCMBIXxEDAOBgNVBAMTBOVAYWTwbGUW 
IBcNMDEwMTAxMDAwMDAwWhgPMj A1MDEyMzEwMDAWMDBaMBIXxEDAOBgNVBAMTBOVA4 
YW1wbGUwZ j Af BggqhQMHAQEBATATBgcqhQMCAiMABggqhQMHAQECAgNDAARACOhv 
5djbiWaPeJtOHbqFhcVQiO0XsW1nYkG3bcOJJK3 /ad/-*HGhD73ydmOpPFOWSvuzx7 
lzpByIXRHXDWibTxJqMTMBEwDwYDVROTAQH/BAUWAWEB / ZAKBggqhQMHAQEDAgNB 
AE1T8BL+CBd2UH1Nm7gfAO/bTu/Uq406xLrPc1Fzz6gcQaoo@vGrFIKAzZ7Vb+2k 
GXQFNVSkJ2e40tBD/TncBJM- 

SEND CERTIFICATE----- 


67: 
64: 


19: 
ДЕЛЕ 


01: 
1 


SEQUENCE 4 
SEQUENCE { 
[0] 
ІМТЕСЕВ 2 


) 
INTEGER 10 
SEQUENCE ( 
OBJECT IDENTIFIER '12 643 7 1 1 3 2' 


) 
SEQUENCE 4 
SET 4 
SEQUENCE { 
OBJECT IDENTIFIER commonName (2 5 4 3) 
PrintableString 'Example' 


} 

SEQUENCE { 
UTCTime 01/01/2001 00:00:00 GMT 
GeneralizedTime 31/12/2050 00:00:00 GMT 


} 
SEQUENCE { 
БЕЛЕ 
SEQUENCE 4 
OBJECT IDENTIFIER commonName (2 5 4 3) 
PrintableString 'Example' 


} 


} 
SEQUENCE { 
SEQUENCE { 
OBJECT IDENTIFIER "12 643 7 1 1 1 1' 
SEQUENCE ( 
OBJECT IDENTIFIER '1 2 643 2 2 35 0 
OBJECT IDENTIFIER '1 2 643 7 1 1 2 2' 


} 


} 
BIT STRING, encapsulates 4 
OCTET STRING 
өв D8 6F Е5 08 DB 89 66 ЗЕ 78 9B ДЕ 1D BA 85 85 
C5 50 8B 45 EC 5B 59 08 90 6D DB 70 Е2 49 2B 7F 
DA 77 FF 87 ЛА 10 ЕВ DF 27 66 02 93 C5 01 64 AF 
BB 3C 7B 97 3A 41 C8 85 D1 1D 70 D6 89 B4 F1 26 
} 
} 
beet 
SEQUENCE { 


Informational Page 22 


КЕС9215 


209 
211 
216 
219 
221 
223 


226 
228 


238 


Baryshkov, et al. 


65: 


= © сл © (л 


SEQU 


OBJECT IDENTIFIER basicConstraints (2 5 29 19) 
BOOLEAN TRUE 


PKIX: GOST R 34.10-2012, 34.11-2012 


ENCE ( 


OCTET STRING, encapsulates 4 


) 
SEQUENCE ( 
OBJECT I 


} 

BIT STRING 
4D 53 F0 
DB 4E EF 
41 AA 28 
74 05 35 


SEQUENCE ( 
BOOLEAN 


DENTIFIER 


12 FE 08 
04 АВ 83 
D2 F1 AB 
54 A4 27 


TRUE 


2246499 72198 32725 


17 76 50 7D 4D 9B B8 ТЕ 00 EF 
BA CA BA CF 73 51 73 CF А8 1C 
14 82 80 CD 9E D5 6F ED A4 19 
67 B8 ЗА DO 43 FD 39 DC 04 93 


Informational 


March 2022 


Page 23 


КЕС9215 


PKIX: GOST R 34.10-2012, 34.11-2012 


D.1.3. Certificate Revocation List 


----- BEGIN X509 CRL----- 

MIGSMEECAQEwCgY IKoUDBwEBAwIwE jEQMA4GA1UEAxMHRXhhbXBsZRCNMTQwMTAx 
MDAwMDAwWhcNMTQwMTAyMDAwMDAwW;j AKBggqhQMHAQEDAgNBAEK /OSoUO-*vpV68-* 
RstQv19CIaADrTOXJ1PJSpw3ox0gQaoo0vGrFIKAzZ7Vb*2kGXQFNVSkJ2e40tBD 


/TncBJM= 


cce END X509 CRL----- 


0 146: SEQUENCE ( 
3 65: SEQUENCE ( 


5 ЛЕ 
8 10: 
10 8: 


20 18: 
2/2 2E: 
24 14: 
26 ЗЕ 
31 е 


48 13: 
55 13: 


ІМТЕСЕК 1 
SEQUENCE 4 
OBJECT IDENTIFIER "12 643 7 1 1 3 2' 


) 
SEQUENCE 4 
SET ( 
SEQUENCE ( 
OBJECT IDENTIFIER commonName (2 5 4 3) 
PrintableString 'Example' 


} 


} 
UTCTime 01/01/2014 00:00:00 GMT 
UTCTime 02/01/2014 00:00:00 GMT 


i ) 
70 10: SEQUENCE { 


72 8: 


OBJECT IDENTIFIER 12 643 7 1 1 3 2' 


} 
82 65: BIT STRING 


42 BF 39 2А 14 D3 ЕВ Е9 57 АҒ ЗЕ 46 СВ 50 BF 5F 
42 21 А0 03 AD 3D 17 27 53 C9 ДА 9C 37 АЗ 1D 20 
41 AA 28 D2 F1 AB 14 82 80 CD 9E D5 6F ED A4 19 
74 05 35 54 А4 27 67 ВВ ЗА DO 43 FD 39 DC 04 93 


March 2022 


D.2. GOST R 34.10-2012 TC26-256-A Parameters (256-Bit Private Key Length) 
This example uses the curve defined in Appendix A.2 of [RFC7836]. 


The private key is 


d = @x3A929ADE789BB9BE19ED359DD39A72C1 \ \ 
0B87C83F80BE18B85C041F4325B62EC1 


Baryshkov, et al. 


Informational 


Page 24 


КЕС9215 


PKIX: GOST R 34.10-2012, 34.11-2012 


The public key is 


х 
П 


@x99C3DF265EA59350640BA69D1DE04418\ \ 


AF3FEAO03ECOF85F2DD84E8BED4952774 


Q@xE218631A69C47C122E2D516DA1CO9E6B \ \ 


D19344D94389D1F16COCA4DADCF96F578 


D.2.1. Certificate Request 


-BEGIN CERTIFICATE REQUEST 
MIHKMHKCAQAwE j EQMA4GA1UEAxMHRXhhbXBsZTBeMBcGCCqFAwcBAQEBMAsGCSqF 
AwCBAgEBAQNDAARAdCeV1L70ohN3yhQ/sA-*o/rxhE4B2dpgtkUJOlXibfw5149ZbP 
TUOMbPHRiUPZRJPRa57A0W1RLSASfMRpGmMYA4qAAMAoGCCqFAwcBAQMCAOEAGO9wq 
Exdnm2Y jL2PqFv98ZMyqua2FX8bhgJFmHbedSBIdDh21vjR8bxtSVseurCAK1krH 


85 OF 
93 A5 
D1 89 
7C C4 


FF 
9D 
AC 
6E 


7C 
48 
20 
E7 


em9bOg4Jcxjnrm7naQ-- 
SEE END СЕКТІҒІСАТЕ REQUEST----- 
0 202: SEQUENCE 4 
СТР SEQUENCE { 
5 ДЕС ІМТЕСЕК 0 
8 18: SEQUENCE ( 
10 16: SET ( 
Пола SEQUENCE 4 
ЕЕ ЖБ OBJECT IDENTIFIER commonName (2 5 4 3) 
19 Te PrintableString 'Example' 
: ) 
: } 
28 94: SEQUENCE { 
30 23: SEQUENCE { 
32 8: OBJECT IDENTIFIER '1 2 643 7 
220 SEQUENCE ( 
44 9: OBJECT IDENTIFIER '1 2 643 
; } 
: ) 
55) (6: ВІТ STRING, encapsulates ( 
58 64: OCTET STRING 
: 74 27 95 04 ВЕ E8 84 DD F2 
: 18 44 Ед 1D 9D А6 ОВ 64 50 
= 78 F5 96 CF 4р 40 ВС 6C F1 
: CBO ESCORAIM OGD AS Т ОРЕОЕЯ 
З ) 
: ) 
124 0: [e] 0 
: ) 
126 10: SEQUENCE { 
128 8: OBJECT IDENTIFIER '1 2 643 7 1 
: ) 
138 65 ВІТ STRING 
Вер ZAR 131767 ЗОВ 66: 23; 2 63 
СС AA B9 AD 85 5F C6 E1 80 91 66 
1D ВЕ 1D A5 ВЕ 34 7C 6F 1B 52 56 
D6 4A C7 7A 6F 5B 3A 0E 09 73 18 
) 
Baryshkov, et al. Informational 


EA 
DF 
44 
63 


64 
12 
0A 
69 


3F AF 
C3 99 
93 D1 
18 E2 


March 2022 


Page 25 


КЕС9215 PKIX: GOST R 34.10-2012, 34.11-2012 March 2022 


D.2.2. Certificate 


Baryshkov, et al. Informational Page 26 


КЕС9215 PKIX: GOST R 34.10-2012, 34.11-2012 


спада BEGIN CERTIFICATE----- 
MIIBJTCB06ADAgECAgEKMAoGCCqFAwcBAQMCMBIxEDAOBgNVBAMTBOVAYW1wbGUw 
IBcNMDEwMTAxMDAwMDAwWhgPMj A1MDEyMzEwMDAwMDBaMBIXEDAOBgNVBAMTBOVA 
YW1wbGUwXj AXBggqhQMHAQEBATALBgkqhQMHAQIBAQEDQwAEQHQn1dS+6ITd80UP 
7APqP68YROAdnaYLZFCTpV4m380ZePWWzO1NDGzxO0Y1D2USTOWuewKF tUSOuEnzE 
aRpjGOKjEzARMA8GA1UdEWEB /WwQFMAMBAf8wCgYIKoUDBWEBAWIDQQAUCO2pEksJ 
yw1c6Sjuh@JzoxAS1JLsDik2nj t5EkhX j BOOHaW+NHxvG1JWx66sTArWSsd6b1s6 
DglzGOeubudp 

Eu END CERTIFICATE----- 


0 293: SEQUENCE ( 
4 211: SEQUENCE { 


7 3: [0] 
9 ЛЕ INTEGER 2 
: } 
12 ДЕ INTEGER 10 
15 10: SEQUENCE 4 
17 8: OBJECTS ӘЕМІНЕЛТЕРЕ МІР 264 ИЗ РИ 
: ) 
2 А Өр SEQUENCE 5 
29 16: SET 4 
И SEQUENCE 4 
33 oe OBJECT IDENTIFIER commonName (2 5 4 3) 
38 TE PrintableString 'Example' 
) 
< ) 
27553257 SEQUENCE ( 
49 13: UTCTime 01/01/2001 00:00:00 GMT 
64% Шығ GeneralizedTime 31/12/2050 00:00:00 GMT 
4 ) 
ӨЛІ ats SEQUENCE 5 
83 16: БЕЛЕ 
85 14: SEQUENCE 4 
87 3s OBJECT IDENTIFIER commonName (2 5 4 3) 
92 ps PrintableString 'Example' 
) 
: } 
101 94: SEQUENCE 4 
103 23: SEQUENCE 5 
105 9 ОВЈЕСЛТРЕМТЕТЕТЕВ У 2643 ТЕТ 
Uae ТИТЕ: SEQUENCE 5 
117 9: OBJECIMIDENTTIETER 12 64367162810 
: ) 
4 ) 
128 67: ВІТ STRING, encapsulates 4 
151004 OCTET STRING 
2 74 27 95 DA ВЕ Е8 84 DD F2 85 ОҒ ЕС 03 EA ЗЕ АҒ 
18 44 Ед 1р 9D Аб ОВ 64 50 93 А5 БЕ 26 DF СЗ 99 
78 F5 96 CF 4D 40 ВС 6C F1 D1 89 43 09 44 93 рт 
6В SE CO АЛ 60:51 20 2Е 12 ССА 69 ТА 63 18. E2 
) 
5 ) 
197 19: ТЕҢІЗІ 
199 17: SEQUENCE 5 
201 15: SEQUENCE 4 
Baryshkov, et al. Informational 


March 2022 


Page 27 


КЕС9215 


203 
208 
211 
243 
215 


218 
220 


230 


— 0001 © 


све 


PKIX: GOST R 34.10-2012, 34.11-2012 March 2022 


OBJECT IDENTIFIER basicConstraints (2 5 29 19) 
BOOLEAN TRUE 
OCTET STRING, encapsulates 4 
SEQUENCE ( 
BOOLEAN TRUE 


) 
SEQUENCE ( 
OBJECT IDENTIFIER "12 643 7 1 1 3 2' 


) 

BIT STRING 
14 ӨВ 4р A9 12 4B 09 СВ Өр 5C Е9 28 EE 87 42 73 
A3 10 12 94 92 EC 0E 29 36 9E 3B 79 12 48 57 8C 
1D OE 1D A5 BE 34 7C 6F 1B 52 56 C7 AE AC 20 0A 
D6 4A C7 7A 6F 5B ЗА ВЕ 09 73 18 E7 AE 6E E7 69 


D.2.3. Certificate Revocation List 


565u52k- 


0 146: 
651 
Пе 
10: 
8 


3 
5 
8 
10 


20 
22 
24 
26 
31 


40 
55 


70 
72 


82 


Baryshkov, et al. 


BEGIN X509 CRL----- 

MIGSMEECAQEwCgY IKoUDBwEBAwIwE jEQMA4GA1UEAxMHRXhhbXBsZRCNMTQwMTAx 
MDAwMDAwWhcNMTQwMTAyMDAwMDAwW;j AKBggqhQMHAQEDAgNBABS9aAh805A8eqKL 
B/6y571v4JY/Vj JnNZ9c20q0UFmtHQA4dpb40f G8bU1bHrqwgCtZKx3pvWzoOCXMY 


END X509 CRL----- 


1:87 
N6: 
14: 
Зе: 
Te 


SEQUENCE { 


SEQUENCE { 
INTEGER 1 
SEQUENCE { 
OBJECT IDENTIFIER '1 2 643 7 1 1 3 2' 


} 
SEQUENCE { 
SET { 
SEQUENCE { 
OBJECT IDENTIFIER commonName (2 5 4 3) 
PrintableString 'Example' 


} 
UTCTime 01/01/2014 00:00:00 GMT 
UTCTime 02/01/2014 00:00:00 GMT 


} 
SEQUENCE { 
OBJECT IDENTIFIER '1 2 643 7 1 1 3 2' 


} 

BIT STRING 
14 BD 68 08 7C 3B 90 3C 7A А2 8B 07 FE В2 E7 BD 
6F Ед 96 ЗЕ 56 32 67 35 9Ғ 5C D8 EA В4 50 59 AD 
1D OE 1D A5 BE 34 7C 6F 1B 52 56 C7 AE AC 20 0A 
D6 4A C7 7A 6F 5B ЗА ВЕ 09 73 18 E7 AE 6E E7 69 


Informational Page 28 


КЕС9215 PKIX: GOST R 34.10-2012, 34.11-2012 March 2022 


D.3. GOST R 34.10-2012 Test Parameters (512-Bit Private Key Length) 


This example uses the curve defined in Appendix E. 


The private key is 


d = 0x0BA6048AADAE241BA40936D47756D7C9NN 
3091A0E8514669700EE7508E508B1020V V 
72E8123B2200A0563322DAD2827E2714\\ 
A2636B7BFD18AADFC62967821FA18DD4 


The public key is 


@x115DC5BC96760C7B48598D8AB9E74@D4 \ \ 
C4A85A65BE33C1815B5C320C854621DD\\ 
5A515856D13314AF69BC5B924C8B4DDF \ \ 
F75C45415C1D9DD9DD33612CD530EFE1 


х 
П 


y = 0x37C7C90CDA40B0OF5621DC3AC1B751CFA0N^ 
E2634FA0503B3D52639F5D7FB72AFD61^^ 
EA199441D943FFE7F0C70A2759A3CDB8VN* 
4C114E1F9339FDF27F35ECA93677BEEC 


Baryshkov, et al. Informational Page 29 


КЕС9215 PKIX: GOST R 34.10-2012, 34.11-2012 March 2022 


D.3.1. Certificate Request 


Baryshkov, et al. Informational Page 30 


КЕС9215 


с642 


193 


195 
197 


207 


Baryshkov, et al. 


PKIX: GOST R 34.10-2012, 34.11-2012 


-BEGIN CERTIFICATE REQUEST----- 

MIIBTzCBvAIBADASMRAwDgYDVQQDEwdFeGFtcGx1MIGgMBcGCCqFAwcBAQECMAsG 
CSqFAwcBAgECAAOBhAAEgYDh7zDVLGEz3dmdHVXxBRVz3302LTJJbvGmvFDPRVIhR 
WtOhRoUMMlxbgcEzvmVaqMTUQOe5io1ZSHsMdpa8xVOR7L53NqnsNX/y/ TmTHOAR 
TLjNo1knCsfw5/9D2UGUGeph/Sq3f12fY11901CgT2PioM9Rt8E63CFWDwvUDMnH 
N6AAMAoGCCqFAwcBAQMDAA4GBAEM7HWzKCIHXx5XN-7sWqixoOCmkBbnZEn4hJg/J1q 
wF2HvyTibEUnilwhkqdbqUmTq9YHTn/xvwP9L10Xr6HZRVgvhvpgoIEJGiPdeV4e 
PGie5RKj yC7g3MJkPHj ugPys@1SSVYSGsg8cnsGXyQaZhQJgyTvLzZxcMxfhk@Th 


339: 
188: 
Ts 
18: 
16: 
14 


129: 


SEQUENCE 4 
SEQUENCE 4 
ІМТЕСЕК 0 
SEQUENCE 4 
SET 4 
SEQUENCE 4 
OBJECT IDENTIFIER commonName (2 5 4 3) 
PrintableString 'Example' 


) 
) 
SEQUENCE ( 
SEQUENCE ( 
OBJECT IDENTIFIER '1 2 643 7 1 1 1 2' 
SEQUENCE ( 
OBJECT IDENTIFIER '12 643 7 1 2 12 8" 


} 


} 
BIT STRING, encapsulates { 

OCTET STRING 
ЕП "ЕЕ ЗЙИрЫ>2 261 333 DDSD9.29DSTD$E5CiE АТ 45956 
DF 4D 8B 4C 92 5B BC 69 AF 14 33 D1 56 58 51 
DD 21 46 85 0C 32 5C 5B 81 C1 33 ВЕ 65 5A А8 
D4 40 E7 B9 8A 8D 59 48 7B 0C 76 96 BC C5 5D 
ЕС ВЕ 77 36 А9 ЕСРЭБТЛЕ ЕФ “Ере 39593 MIE TAEI 
B8 CD АЗ 59 27 OA C7 Е Е7 FF 43 09 41 94 19 
61 FD 2A B7 7F 5D 9Ғ 63 52 30 ЗВ 50 А0 4Е 63 
Ад СЕ 51 B7 C1 ЗА DC 21 56 OF ВВ 04 ВС C9 C7 


} 
} 
[0] {} 
} 


SEQUENCE { 
OBJECT IDENTIFIER '1 2 643 7 1 1 3 3' 


} 
BIT STRING 

43 3B 1D 6C EA 0A 51 F1 E5 73 7E B1 6A A2 C6 83 
82 9A 40 5B 9D 91 27 E2 12 60 FC 9D 6A C0 5D 87 
BF 24 E2 6C 45 27 8A 5C 21 92 A7 5B A9 49 93 AB 
06 07 ДЕ 7F F1 BF ӨЗ FD 2Ғ 53 97 AF АТ 09 45 58 
2F 86 FA 60 A0 81 09 1A 23 DD 79 5E 1E 3C 68 9E 
E5 12 АЗ C8 2E Ед DC C2 64 ЗС 78 ЕЕ A8 FC АС рз 
54 92 55 84 86 B2 OF 1C 9E C1 97 C9 06 99 85 02 
60 C9 3B CB CD 9C 5C 33 17 E1 93 44 E1 73 AE 36 


Informational 


F7 
5A 
C4 
11 
АС 
ЕА 
Е2 
37. 


March 2022 


Page 31 


КЕС9215 PKIX: GOST R 34.10-2012, 34.11-2012 March 2022 


D.3.2. Certificate 


Baryshkov, et al. Informational Page 32 


КЕС9215 PKIX: GOST R 34.10-2012, 34.11-2012 


See BEGIN CERTIFICATE----- 
MIIBqjCCARagAwIBAgIBCzAKBggqhQMHAQEDAzASMRAwDgYDVQQDEwdF eGF t cGx1 
MCAXDTAXMDEwWMT AWMDAWMF oYDzIwNTAxM jMxMDAWMDAWWj ASMRAwDgYDVQQDEwdF 
eGFtcGx1MIGgMBcGCCqFAwcBAQECMASGCSqF AwcBAgECAAOBhAAEgYDh7zDVLGEz 
3dmdHVxBRVz3302LTJJbvGmvFDPRVLhRWt@hROUMM1xbgcEzvmVaqMTUQ0e5i01Z 
SHsMdpa8xVOR7L53NqnsNX/y/TmTHOARTL jNo1knCsfw5/9D2UGUGeph/Sq3f12f 
Y11901CgT2PioM9Rt8bE63CFWDwvUDMnHN6MTMBEwDwYDVROTAOH / BAUWAWEB / ZAK 
BggqhQMHAQEDAWOBgQBBVwPYkvG18/aMQ1MYmn7iB7gLVjHvnU1Smk1rVCws+hWq 
LqzxH@cP3n2VSFaQPDX9 ј 5Ve8wDZXHdTSnJKDu5wL4b6YKCBCRoj3X1leHjxonuUS 
o8gu4NzCZDx47qj8rNNUKIWEhrIPHJ7B18kGmYUCYMk7y82cXDMX4ZNE4XOuNg== 
Базе END CERTIFICATE----- 


0 426: SEQUENCE ( 
4 278: SEQUENCE ( 


8 3: [e] 
10 16 ІМТЕСЕВ 2 
Е ) 
13 ПЕ ІМТЕСЕК 11 
16 10: SEQUENCE 4 
18 8: OBJECTREDENTILELER ЛІ 25 ОЛЗ З ЕЗ: 
; ) 
28 18: SEQUENCE 5 
30 16: SET 4 
32 T4: SEQUENCE { 
ske LES OBJECT IDENTIFIER commonName (2 5 4 3) 
39 ie PrintableString 'Example' 
} 
з ) 
48 32: SEQUENCE 5 
50 13: UTCTime 01/01/2001 00:00:00 GMT 
655 GeneralizedTime 31/12/2050 00:00:00 GMT 
: ) 
82 18: SEQUENCE { 
84 16: SET ( 
86 14: SEQUENCE ( 
88 ЗЕ OBJECT IDENTIFIER commonName (2 5 4 3) 
93 VE PrintableString 'Example' 
) 
; ) 
102 160: SEQUENCE { 
NOS 52365 SEQUENCE 5 
107 8: OBJEGTSCEDENITIEEIDERSSS2450499 72019191125 
TAE - AES SEQUENCE 4 
119 9: OBJECT IDENTIFIER 12 643 7 1 2 1 2 @' 
} 
} 
138 132: BIT STRING, encapsulates 4 
134 128: OCTET STRING 
: ЕЛ ЕЕ За В5 2 6332 DDE DOSODS IDÉES CRIS ESC 
DF 4D 8B 4C 92 5B BC 69 AF 14 33 D1 56 58 51 
DD 21 46 85 0C 32 5C 5B 81 C1 33 BE 65 5A А8 
D4 40 E7 B9 8A 8D 59 48 7B 0C 76 96 BC C5 5D 
ЕС ВЕ 77 36 А9 ЕС 35 ИБЛЕФ ЕВ 39:93 ПЕТДЕСЛЯ 
B8 CD АЗ 59 27 OA C7 F0 E7 FF 43 09 41 94 19 
61 FD 2A B7 7F 5D 9Ғ 63 52 Зр ЗВ 50 АӨ ДЕ 63 
Baryshkov, et al. Informational 


E7 
5A 
C4 
iil 
АС 
ЕА 
Е2 


Магсһ 2022 


Page 33 


RFC 9215 
265 19: 
267 17: 
269 15: 
271 gc 
276 1: 
279 Ds: 
281 3: 
283 1: 
286 10: 
288 8: 
298 129: 


Baryshkov, et al. 


ге: 


} 
} 
] { 


SEQUENCE { 


Ай CF 51 B7 C1 3A DC 21 56 OF OB D4 0C C9 C7 37 


PKIX: GOST R 34.10-2012, 34.11-2012 


SEQUENCE ( 


OBJECT IDENTIFIER basicConstraints (2 5 29 19) 
BOOLEAN TRUE 


OCTET STRING, 


) 
SEQUENCE ( 
OBJECT IDENTIFIER 


) 
ВІТ STRING 


41 
07 
15 
Ер 
2Ғ 
ЕБ 
54 
60 


57 
В8 
АА 
8F 
86 
12 
92 
C9 


03 
OB 
2Е 
95 
ҒА 
АЗ 
55 
3B 


SEQUENCE 4 


encapsulates 4 


BOOLEAN TRUE 


D8 
56 
AC 
5E 
60 
C8 
84 
CB 


92 
31 
F1 
F3 
AQ 
2E 
86 
CD 


F1 
EF 
1F 
да 
81 
EO 
B2 
9C 


'1 


A5 
9D 
47 
D9 
09 
DC 
OF 
5C 


Informational 


2 643711 


ЕЗ 
49 
OF 
5C 
1A 
C2 
1C 
33 


F6 
52 
DE 
77 
23 
64 
9E 
17 


8C 
9A 
7D 
53 
DD 
3C 
C1 
E1 


43 
40 
95 
4A 
79 
78 
97 
93 


9A 
2C 
90 
QE 
3C 
FC 
99 
73 


7Е 
2C 
3C 
EE 
68 
AC 
85 
AE 


E2 
FA 
35 
70 
9E 
D3 
02 
36 


March 2022 


Page34 


КЕС9215 


PKIX: GOST R 34.10-2012, 34.11-2012 


D.3.3. Certificate Revocation List 


Om 2 1и 
65:2 
1 
10: 
8: 


3 
5 
8 
10 


20 
22 
24 
26 
31 


Appendix E. GOST К 34.10-2012 Test Parameters (Curve 


BEGIN X509 CRL----- 

MIHTMEECAQEwCgY IKoUDBwE BAwMwE | EQMA4GA1UEAxMHRXhhbXBsZRCNMTQwMTAx 
MDAWMDAWWhcNMTQwMTAyMDAWMDAwWj AKBggqhQMHAQEDAWOBgQA6E/t67NtVY072 
E3z8XdZGkXMuv7NpCh/Ax+ik7uoIMH1kjU3AmGxGqHs/vkx69C6jQ1nHIZVMo5/z 
q77ZBR9NLA4b6YKCBCRoj3X1eHjxonuUSo8gu4NzCZDx47qj 8rNNUKIWEhrIPHJ7B 
18kGmYUCYMk7y82cXDMX4ZNE4XOuNg== 

END X509 CRL----- 


18: 
16: 
14: 
SE 
е 


SEQUENCE 4 
SEQUENCE 4 
ІМТЕСЕК 1 
SEQUENCE 4 
OBJECT IDENTIFIER '12 643 7 1 1 3 3' 


} 
SEQUENCE 4 
SET { 
SEQUENCE 4 
OBJECT IDENTIFIER commonName (2 5 4 3) 
PrintableString 'Example' 


} 


) 
UTCTime 01/01/2014 00:00:00 GMT 
UTCTime 02/01/2014 00:00:00 GMT 


) 
SEQUENCE ( 
OBJECT IDENTIFIER '12 643 7 1 1 3 3' 


} 
BIT STRING 

3A 13 FB 7A EC DB 55 60 EE F6 13 7C FC 5D D6 46 
91 73 2Е BF ВЗ 69 0A ТЕ CO C7 ЕЗ A4 EE EA 08 30 
7D 64 8D 40 СӨ 98 6C 46 АЗ 7B ЗЕ BE 4C 7A F4 2E 
АЗ 43 59 C7 95 95 4C АЗ 9F ҒЗ АВ BE 09 05 ТЕ 40 
2F 86 FA 60 A0 81 09 1A 23 DD 79 5E 1E 3C 68 9E 
E5 12 АЗ C8 2E Ед DC C2 64 ЗС 78 ЕЕ A8 FC АС D3 
54 92 55 84 86 B2 OF 1C 9E C1 97 C9 06 99 85 02 
60 C9 3B CB CD 9C 5C 33 17 E1 93 44 E1 73 AE 36 


Definition) 


The following parameters must be used for digital signature generation and verification. 


E.1. Elliptic Curve Modulus 


The following value is assigned to parameter p in this example: 


Baryshkov, et al. 


Informational 


March 2022 


Page 35 


КЕС9215 


PKIX: GOST R 34.10-2012, 34.11-2012 


36239861022290036359077887536838743060213209255346786050N^ 
86546150450856166624002482588482022271496854025090823603VN 
058735163734263822371964987228582907372403 


0x4531ACD1FE0023C7550D267B6B2FEE80922B14B2FFB90F04DAEB7CVN 
09B5D2D15DF1D852741AF4704A40458047E80E4546D35B8336FAC22N^ 
4DD81664BBF528BE6373 


E.2. Elliptic Curve Coefficients 


Parameters a and b take the following values in this example: 


0x7 


15186550692108285345089500347140431549287475277402064361^N^ 
94018823352809982443793732829756914785974674866041605397\\ 
883677596626326413990136959047435811826396 


Ox1CFF0806A31116DA29D8CFA54E57EB748BC5F377E49400FDD788B6^N 
49ECA1AC4361834013B2AD7322480A89CA58E0CF74BC9E540C2ADDVN^ 
6897FAD0A3084F302ADC 


E.3. Elliptic Curve Points Group Order 


Parameter m takes the following value in this example: 


36239861022290036359077887536838743060213209255346786050N^ 
86546150450856166623969164898305032863068499961404079437NN 
936585455865192212970734808812618120619743 


0x4531ACD1FE0023C7550D267B6B2FEE80922B14B2FFB90F04DAEB7CVN 
09B5D2D15DA82F2D7ECB1DBAC719905C5EECCA23F1D86E25EDBE23N^ 
C595D644AAF187E6E6DF 


E.4. Order of Cyclic Subgroup of Elliptic Curve Points Group 


Parameter q takes the following value in this example: 


Baryshkov, et al. Informational 


March 2022 


Page 36 


КЕС9215 


PKIX: GOST R 34.10-2012, 34.11-2012 


36239861022290036359077887536838743060213209255346786050N^ 
86546150450856166623969164898305032863068499961404079437VNN 
936585455865192212970734808812618120619743 


0x4531ACD1FE0023C7550D267B6B2FEE80922B14B2FFB90F04DAEB7CVN 
89B5D2D15DA82F2D7ECB1DBAC719905C5EECC423F 1D86E25EDBE23\ \ 
C595D644AAF187E6E6DF 


E.5. Elliptic Curve Point Coordinates 


Point P coordinates take the following values in this example: 


19283569440670228493993094012431375989977866354595079743NV 
57075491307766592685835441065557681003184874819658004903N^ 
212332884252335830250729527632383493573274 


0x24D19CC64572bEE30F396BF6EBBFD7A6C5213B3B3D7057CC825F910VN 
93A468CD762FD60611262CD838DC6B60AA7EEE804E28BC849977FACNN 
33B4B530F1B120248A9A 


22887286933719728599700121555294784163535623273295061803VN^ 
14497425931102860301572814141997072271708807066593850650N^ 
334152381857347798885864807605098724013854 


0x2BB312A43BD2CE6E0D020613C857ACDDCFBF061E91E5F2C3F32447NN 
C259F39B2C83AB156D77F1496BF7EB3351E1EEA4EA43DC1A18B91B24N^ 
640B6DBB92CB1ADD371E 


Contributors 


Semen Pianov 
InfoTeCS JSC 
Email: Semen.Pianov@infotecs.ru 


Ekaterina Karelina 
InfoTeCS JSC 
Email: Ekaterina.Karelina@infotecs.ru 


Dmitry Belyavsky 
Cryptocom 
Email: beldmit@gmail.com 


Baryshkov, et al. Informational 


March 2022 


Page 37 


КЕС9215 PKIX: GOST R 34.10-2012, 34.11-2012 March 2022 


Authors' Addresses 


Dmitry Baryshkov (EDITOR) 
Linaro Ltd. 

Harston Mill Royston Rd 
Harston, Cambridge 

CB227GG 

United Kingdom 

Email: dbaryshkov@gmail.com 


Vasily Nikolaev 

CryptoPro 

18, Suschevsky val 

Moscow 

127018 

Russian Federation 

Phone: +7 (495) 995-48-20 
Email: nikolaev@cryptopro.ru 


Alexander Chelpanov 
InfoTeCS JSC 
Email: Aleksandr.Chelpanov@infotecs.ru 


Baryshkov, et al. Informational Page 38