<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.18 (Ruby 2.6.10) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lamps-private-key-stmt-attr-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.27.0 -->
  <front>
    <title abbrev="Statement of Private Key Possession">An Attribute for Statement of Possession of a Private Key</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-private-key-stmt-attr-00"/>
    <author initials="R." surname="Housley" fullname="Russ Housley">
      <organization abbrev="Vigil Security">Vigil Security, LLC</organization>
      <address>
        <postal>
          <city>Herndon, VA</city>
          <country>US</country>
        </postal>
        <email>housley@vigilsec.com</email>
      </address>
    </author>
    <date year="2025" month="February" day="15"/>
    <area>Security</area>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 59?>

<t>This document specifies an attribute for a statement of possession of a private key
by a certificate subject.  As part of X.509 certificate enrollment, a Certification
Authority (CA) typically demands proof that the subject possesses of the private key
that corresponds to the to-be-certified public key.  In some cases, a CA might accept
a signed statement from the certificate subject.  For example, when a certificate
subject needs separate certificates for signature and key establishment, a statement
that can be validated with the previously issued signature certificate for the same
subject might be adequate for subsequent issuance of the key establishment certificate.</t>
    </abstract>
  </front>
  <middle>
    <?line 70?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document specifies an attribute for a statement of possession of a private key
by a certificate subject.  As part of X.509 certificate <xref target="RFC5280"/> enrollment, a
Certification Authority (CA) typically demands proof that the subject possesses the
private key that corresponds to the to-be-certified public key.  In some cases, a CA
might accept a signed statement from the certificate subject.  For example, when a
certificate subject needs separate certificates for signature and key establishment,
a signed statement that can be validated with the previously issued signature
certificate for the same subject might be adequate for subsequent issuance of the
key establishment certificate.  Note that <xref target="RFC6955"/> offers some algorithms to
provide proof of possession for Diffie-Hellman private keys.  However, these
algorithms are not suitable for use with PKCS#10 <xref target="RFC2986"/>.  On the other hand,
the the attribute specified in this document is suitable for use with PKCS#10.</t>
      <t>In many situations a subject needs two certificates, one for digiatal signatures, and
a separate one for key establishment.  For example, a subject may need a signature
certificate that contains a ML-DSA public key and a key establishment certificate
that contains a ML-KEM public key.  For another example, a subject may need a signature
certificate that contains a ECDSA public key and a key establishment certificate
that contains a ECDH public key.</t>
      <t>In this situation, a CA might accept a signed statement that can be validated with the
previously issued signature certificate as adequate for subsequent issuance of
the key establishment certificate.</t>
      <t>When using the attribute defined in this document make a statement about the
possession of the key establishment private key, the process for a subject to
obtain two certificates is:</t>
      <ol spacing="normal" type="1"><li>
          <t>The subject generates the signature key pair.</t>
        </li>
        <li>
          <t>The subject composes a PKCS#10 Certificate Signing Request (CSR) in the usual
manner.  It includes a signature that is produced with the private key from
step 1.</t>
        </li>
        <li>
          <t>The subject sends the CSR to the CA, and it gets back a signature certificate.
The signature certificate includes a key usage of digitalSignature, 
nonRepudiation, or both <xref section="4.2.1.3" sectionFormat="of" target="RFC5280"/>.</t>
        </li>
        <li>
          <t>The subject generates the key establishment key pair.</t>
        </li>
        <li>
          <t>The subject composes a PKCS#10 CSR containing the key establishment public
key.  The CSR attributes include the attribute specified in <xref target="attr"/> of this
document.  The subject name matches the one from step 2.  The CSR includes a
signature that is produced with the private key from step 1.</t>
        </li>
        <li>
          <t>The subject sends the CSR to the CA, and it gets back a key establishment
certificate.  The key establishment certificate includes a key usage of
keyEncipherment or keyAgreement <xref section="4.2.1.3" sectionFormat="of" target="RFC5280"/>.</t>
        </li>
      </ol>
      <section anchor="asn1">
        <name>ASN.1</name>
        <t>The attribute defined in this document is generated using ASN.1 <xref target="X680"/>, using
the Distinguished Encoding Rules (DER) <xref target="X690"/>.</t>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="attr">
      <name>Attribute for Statement of Possession of a Private Key</name>
      <t>The attribute for statement of possession of a private key is included in a
certificate request to make the following statement:</t>
      <ul empty="true">
        <li>
          <t>"The subject of the signature certificate that is used to validate the
signature on this certificate request also has possession of the private key
that corresponds to the public key in the certificate request."</t>
        </li>
      </ul>
      <t>The CA <bcp14>MUST</bcp14> perform certification path validation for the signature
certificate as specified in <xref section="6" sectionFormat="of" target="RFC5280"/>.  If the certification
path is not valid, then the CA <bcp14>MUST</bcp14> reject the certificate request.</t>
      <t>The CA <bcp14>MUST</bcp14> validate the signature on the certificate request using the
public key from the signature certificate.  If the signature is not valid,
then the CA <bcp14>MUST</bcp14> reject the certificate request.</t>
      <t>The subject in the signature certificate <bcp14>SHOULD</bcp14> be the same as the subject name
in the certificate request.  If they are different, the certificate policy <bcp14>MUST</bcp14>
describe how the CA can determine that the two subject names identify the same
entity.  If the CA is unable to determine that the two subject names identify
the same entity, then the CA <bcp14>MUST</bcp14> reject the certificate request.</t>
      <t>If subject alternative names are present in the certificate request, they
<bcp14>SHOULD</bcp14> match subject alternative names in the signature certificate.  If the CA
is unable to determine that each of subject alternative names identifies
the same entity as is named in the signature certificate, then the CA <bcp14>MUST</bcp14>
reject the certificate request.</t>
      <t>The attribute for statement of possession of a private key has the following
structure:</t>
      <sourcecode type="asn.1"><![CDATA[
   id-at-privateKeyStatement OBJECT IDENTIFIER ::= 
     { 1 3 6 1 4 1 22112 2 1 }

   privateKeyStatement ATTRIBUTE ::= {
     TYPE PrivateKeyStatement
     IDENTIFIED BY id-at-privateKeyStatement }

   PrivateKeyStatement ::= SEQUENCE {
     signer  IssuerAndSerialNumber,
     cert    Certificate OPTIONAL }

]]></sourcecode>
      <t>The components of the PrivateKeyStatement SEQUENCE have the following semantics:</t>
      <ul empty="true">
        <li>
          <dl>
            <dt>signer:</dt>
            <dd>
              <t>the issuer name and certificate serial number of the signature certificate.</t>
            </dd>
          </dl>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <dl>
            <dt>cert:</dt>
            <dd>
              <t>the signature certificate.  If the issuer of the key establishment certificate
will be the same as the issuer of the signature certificate, then this
component <bcp14>MAY</bcp14> be omitted.  When the signature certificate is omitted, the
signer is assuming that the CA has a mechanism to obtain all valid
certificates that it issued.</t>
            </dd>
          </dl>
        </li>
      </ul>
    </section>
    <section anchor="conventions-for-pkcs10">
      <name>Conventions for PKCS#10</name>
      <t>This section specifies the conventions for using the attribute for statement
of possession of a private key with PKCS#10 <xref target="RFC2986"/> when requesting a
key establishment certificate.</t>
      <t>The PKCS#10 CertificationRequest always has three components, as follows:</t>
      <ul empty="true">
        <li>
          <dl>
            <dt>certificationRequestInfo:</dt>
            <dd>
              <t>the subject name <bcp14>SHOULD</bcp14> be the same as the subject name in the signature certificate,
the subjectPKInfo <bcp14>MUST</bcp14> contain the public key for the key establishment algorithm,
and the attributes <bcp14>MUST</bcp14> include privateKeyStatement attribute as specified
in <xref target="attr"/> of this document.</t>
            </dd>
          </dl>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <dl>
            <dt>signatureAlgorithm:</dt>
            <dd>
              <t>the signature algorithm <bcp14>MUST</bcp14> be one that can be validated with the public key
in the signature certificate.</t>
            </dd>
          </dl>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <dl>
            <dt>signature:</dt>
            <dd>
              <t>the signature over certificationRequestInfo <bcp14>MUST</bcp14> validate with the public key
in the signature certificate, and certification path validation for the signature
certificate <bcp14>MUST</bcp14> be successful as specified in <xref section="6" sectionFormat="of" target="RFC5280"/>.</t>
            </dd>
          </dl>
        </li>
      </ul>
    </section>
    <section anchor="conventions-for-crmf">
      <name>Conventions for CRMF</name>
      <t>This section specifies the conventions for using the attribute for statement
of possession of a private key with the Certificate Request Message
Format (CRMF) <xref target="RFC4211"/> when requesting a key establisment certificate.</t>
      <t>The following ASN.1 types are defined for use with CRMF.  They have exactly
the same semantics and syntax as the attribute discussed above, but they
offer a similar naming convention to the Registration Controls in <xref target="RFC4211"/>.</t>
      <sourcecode type="asn.1"><![CDATA[
  regCtrl-privateKeyStatement ATTRIBUTE ::= privateKeyStatement

  id-regCtrl-privateKeyStatement OBJECT IDENTIFIER ::=
    id-at-privateKeyStatement
 
]]></sourcecode>
      <t>The CRMF CertificationRequest always has three components, as follows:</t>
      <ul empty="true">
        <li>
          <dl>
            <dt>certReq:</dt>
            <dd>
              <t>the certTemplate <bcp14>MUST</bcp14> include the subject and the publicKey components. The
same subject name <bcp14>SHOULD</bcp14> match the subject name in the signature certificate, and
publicKey <bcp14>MUST</bcp14> contain the public key for the key establishment algorithm.</t>
            </dd>
          </dl>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <dl>
            <dt>popo:</dt>
            <dd>
              <t>the ProofOfPossession <bcp14>MUST</bcp14> use the signature CHOICE,
the poposkInput <bcp14>MUST</bcp14> be present, POPOSigningKeyInput.authInfo <bcp14>MUST</bcp14> use
the sender CHOICE, the sender <bcp14>SHOULD</bcp14> be set to the subject name that appears in
the signature certificate, the publicKey <bcp14>MUST</bcp14> contain a copy of the public
key from the certTemplate, the algorithmIdentifier <bcp14>MUST</bcp14> identify a signture
algorithm that can be validated with the public key in the signature certificate,
signature over the poposkInput <bcp14>MUST</bcp14> validate with the public key in the signature
certificate, and certification path validation for the signature certificate
<bcp14>MUST</bcp14> be successful as specified in <xref section="6" sectionFormat="of" target="RFC5280"/>.</t>
            </dd>
          </dl>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <dl>
            <dt>regInfo:</dt>
            <dd>
              <t>the attributes <bcp14>MUST</bcp14> include privateKeyStatement attribute as specified
in <xref target="attr"/> of this document.</t>
            </dd>
          </dl>
        </li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The subject is signing privateKeyStatement attribute to tell the CA that it has
possession of the key establishment private key.  This is being done instead of
providing some other form of proof of possession.  If the subject has lost control
of the signature private key, then the signed privateKeyStatement attribute
could be generated by some other party.  Timely revocation of the compromised
signature certificate is the only protection against such loss of control.</t>
      <t>The signature key pair and the key establishment key pair are expected to have
roughly the same security strength.  To ensure that the signature on the statement
is not the weakest part of the certificate enrollment, the signature key pair <bcp14>SHOULD</bcp14>
be at least as strong as the key establishment key pair.</t>
      <t>If a CA allows subject in the key establishment certificate to be different than
the subject name in the signature certificate, then certificate policy <bcp14>MUST</bcp14>
describe how to determine that the two subject names identify the same entity.
Likewise, if a CA allows subject alternative names in the key establishment
certificate that are not present in the signature certificate, then certificate
policy <bcp14>MUST</bcp14> describe how to determine that the subject alternative names identify
the same entity as is named in the signature certificate.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>For the ASN.1 Module in the <xref target="appendix-asn1"/> of this document, IANA
is requested to assign an object identifier (OID) for the module
identifier (TBD0) with a Description of "id-mod-private-key-stmt-2025".  The
OID for the module should be allocated in the "SMI Security for PKIX Module
Identifier" registry (1.3.6.1.5.5.7.0).</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2986">
          <front>
            <title>PKCS #10: Certification Request Syntax Specification Version 1.7</title>
            <author fullname="M. Nystrom" initials="M." surname="Nystrom"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <date month="November" year="2000"/>
            <abstract>
              <t>This memo represents a republication of PKCS #10 v1.7 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document, except for the security considerations section, is taken directly from the PKCS #9 v2.0 or the PKCS #10 v1.7 document. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2986"/>
          <seriesInfo name="DOI" value="10.17487/RFC2986"/>
        </reference>
        <reference anchor="RFC4211">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate Request Message Format (CRMF)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="September" year="2005"/>
            <abstract>
              <t>This document describes the Certificate Request Message Format (CRMF) syntax and semantics. This syntax is used to convey a request for a certificate to a Certification Authority (CA), possibly via a Registration Authority (RA), for the purposes of X.509 certificate production. The request will typically include a public key and the associated registration information. This document does not define a certificate request protocol. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4211"/>
          <seriesInfo name="DOI" value="10.17487/RFC4211"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5912">
          <front>
            <title>New ASN.1 Modules for the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Public Key Infrastructure using X.509 (PKIX) certificate format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates those ASN.1 modules to conform to the 2002 version of ASN.1. There are no bits-on-the-wire changes to any of the formats; this is simply a change to the syntax. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5912"/>
          <seriesInfo name="DOI" value="10.17487/RFC5912"/>
        </reference>
        <reference anchor="X680" target="https://www.itu.int/rec/T-REC-X.680">
          <front>
            <title>Information technology -- Abstract Syntax Notation One (ASN.1): Specification of basic notation</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2021" month="February"/>
          </front>
          <seriesInfo name="ITU-T Recommendation" value="X.680"/>
          <seriesInfo name="ISO/IEC" value="8824-1:2021"/>
        </reference>
        <reference anchor="X690" target="https://www.itu.int/rec/T-REC-X.690">
          <front>
            <title>Information technology -- ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2021" month="February"/>
          </front>
          <seriesInfo name="ITU-T Recommendation" value="X.690"/>
          <seriesInfo name="ISO/IEC" value="8825-1-2021"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6955">
          <front>
            <title>Diffie-Hellman Proof-of-Possession Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="H. Prafullchandra" initials="H." surname="Prafullchandra"/>
            <date month="May" year="2013"/>
            <abstract>
              <t>This document describes two methods for producing an integrity check value from a Diffie-Hellman key pair and one method for producing an integrity check value from an Elliptic Curve key pair. This behavior is needed for such operations as creating the signature of a Public-Key Cryptography Standards (PKCS) #10 Certification Request. These algorithms are designed to provide a Proof-of-Possession of the private key and not to be a general purpose signing algorithm.</t>
              <t>This document obsoletes RFC 2875.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6955"/>
          <seriesInfo name="DOI" value="10.17487/RFC6955"/>
        </reference>
      </references>
    </references>
    <?line 312?>

<section anchor="appendix-asn1">
      <name>ASN.1 Module</name>
      <t>This ASN.1 Module builds upon the conventions established in <xref target="RFC5912"/>.</t>
      <sourcecode type="asn.1"><![CDATA[
<CODE STARTS>

PrivateKeyStatement-2025
  { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-private-key-stmt-2025(TBD0) }

DEFINITIONS IMPLICIT TAGS ::= BEGIN

EXPORTS ALL;

IMPORTS
  ATTRIBUTE
  FROM PKIX-CommonTypes-2009 -- in [RFC5912]
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) id-mod(0)
      id-mod-pkixCommon-02(57) }

  Certificate
  FROM PKIX1Explicit-2009 -- in [RFC5912]
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) id-mod(0)
      id-mod-pkix1-explicit-02(51) }

  IssuerAndSerialNumber
  FROM CryptographicMessageSyntax-2010 -- [RFC6268]
    { iso(1) member-body(2) us(840) rsadsi(113549)
       pkcs(1) pkcs-9(9) smime(16) modules(0)
       id-mod-cms-2009(58) } ;

--
-- Private Key Statement Attribute
--

id-at-privateKeyStatement OBJECT IDENTIFIER ::=
  { 1 3 6 1 4 1 22112 2 1 }

privateKeyStatement ATTRIBUTE ::= {
  TYPE PrivateKeyStatement
  IDENTIFIED BY id-at-privateKeyStatement }

PrivateKeyStatement ::= SEQUENCE {
  signer  IssuerAndSerialNumber,
  cert    Certificate OPTIONAL }

--
-- Registration Control Support
--

RegControlSet ATTRIBUTE ::= { regCtrl-privateKeStatement, ... }

regCtrl-privateKeyStatement ATTRIBUTE ::= privateKeyStatement

id-regCtrl-privateKeyStatement OBJECT IDENTIFIER ::=
  id-at-privateKeyStatement
     
END

<CODE ENDS>
]]></sourcecode>
    </section>
    <section anchor="appendix-example-use-of-the-privatekeystatement-attribute">
      <name>Appendix: Example use of the privateKeyStatement Attribute</name>
      <t>In this example, the self-signed certificate for the CA is:</t>
      <artwork><![CDATA[
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
]]></artwork>
      <t>Alice generates her ECDSA signature key pair.  Then, Alice composes
a PKCS#10 Certificate Signing Request (CSR) in the usual manner as
specified in <xref target="RFC2986"/>.  The CSR includes a signature that is produced
with her ECDSA private key.  The CSR is:</t>
      <artwork><![CDATA[
-----BEGIN CERTIFICATE REQUEST-----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-----END CERTIFICATE REQUEST-----
]]></artwork>
      <t>The CA issues a signature certificate to Alice:</t>
      <artwork><![CDATA[
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
]]></artwork>
      <t>Alice generates her ECDH key establishment key pair.  Then, Alice
composes a PKCS#10 CSR.  The CSR attributes include the
privateKeyStatement attribute, which points to her ECDSA signature
certificate.  The CSR includes her ECDH public key and a signature that
is produced with her ECDSA private key.  The CSR is:</t>
      <artwork><![CDATA[
-----BEGIN CERTIFICATE REQUEST-----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-----END CERTIFICATE REQUEST-----
]]></artwork>
      <t>The CSR decodes to:</t>
      <artwork><![CDATA[
   0 1073: SEQUENCE {
   4  952:  SEQUENCE {
   8    1:   INTEGER 0
  11   60:   SEQUENCE {
  13   11:    SET {
  15    9:     SEQUENCE {
  17    3:      OBJECT IDENTIFIER countryName (2 5 4 6)
  22    2:      PrintableString 'US'
         :       }
         :      }
  26   11:    SET {
  28    9:     SEQUENCE {
  30    3:      OBJECT IDENTIFIER stateOrProvinceName (2 5 4 8)
  35    2:      PrintableString 'VA'
         :       }
         :      }
  39   16:    SET {
  41   14:     SEQUENCE {
  43    3:      OBJECT IDENTIFIER localityName (2 5 4 7)
  48    7:      PrintableString 'Herndon'
         :       }
         :      }
  57   14:    SET {
  59   12:     SEQUENCE {
  61    3:      OBJECT IDENTIFIER commonName (2 5 4 3)
  66    5:      PrintableString 'Alice'
         :       }
         :      }
         :     }
  73  116:   SEQUENCE {
  75   14:    SEQUENCE {
  77    5:     OBJECT IDENTIFIER ECDH (1 3 132 1 12)
  84    5:     OBJECT IDENTIFIER secp384r1 (1 3 132 0 34)
         :      }
  91   98:    BIT STRING
         :     04 01 47 24 13 1F E7 2A D6 CE 45 F7 8B 85 A8 57
         :     BB 97 52 EA 19 D1 02 F1 39 BE 7B 95 58 04 27 CA
         :     00 2F 0C 27 24 90 32 3D 46 8B 11 04 5C BF B5 5A
         :     3B 60 DB 75 EF 9C 9A 2E 08 3A 31 4A 90 C2 48 CA
         :     9F DE 4B E9 E7 E9 DA 33 7E EE C5 AD D9 62 00 FA
         :     0C F6 37 99 EE 44 66 FC 99 3E F4 91 25 31 65 FC
         :     16
         :     }
 191  765:   [0] {
 195  103:    SEQUENCE {
 197    9:     OBJECT IDENTIFIER
         :      extensionRequest (1 2 840 113549 1 9 14)
 208   90:     SET {
 210   88:      SEQUENCE {
 212   12:       SEQUENCE {
 214    3:        OBJECT IDENTIFIER
         :         basicConstraints (2 5 29 19)
 219    1:        BOOLEAN TRUE
 222    2:        OCTET STRING, encapsulates {
 224    0:         SEQUENCE {}
         :          }
         :         }
 226   11:       SEQUENCE {
 228    3:        OBJECT IDENTIFIER keyUsage (2 5 29 15)
 233    4:        OCTET STRING, encapsulates {
 235    2:         BIT STRING 3 unused bits
         :          '10000'B (bit 4)
         :          }
         :         }
 239   34:       SEQUENCE {
 241    3:        OBJECT IDENTIFIER subjectAltName (2 5 29 17)
 246   27:        OCTET STRING, encapsulates {
 248   25:         SEQUENCE {
 250   23:          [1] 'alice@email.example.com'
         :           }
         :          }
         :         }
 275   23:       SEQUENCE {
 277    3:        OBJECT IDENTIFIER
         :         certificatePolicies (2 5 29 32)
 282   16:        OCTET STRING, encapsulates {
 284   14:         SEQUENCE {
 286   12:          SEQUENCE {
 288   10:           OBJECT IDENTIFIER 
         :            testCertPolicy (2 16 840 1 101 3 2 1 48 48)
         :            }
         :           }
         :          }
         :         }
         :        }
         :       }
         :      }
 300  656:    SEQUENCE {
 304   10:     OBJECT IDENTIFIER
         :      privateKeyStatement (1 3 6 1 4 1 22112 2 1)
 316  640:     SET {
 320  636:      SEQUENCE {
 324   79:       SEQUENCE {
 326   55:        SEQUENCE {
 328   11:         SET {
 330    9:          SEQUENCE {
 332    3:           OBJECT IDENTIFIER countryName (2 5 4 6)
 337    2:           PrintableString 'US'
         :            }
         :           }
 341   19:         SET {
 343   17:          SEQUENCE {
 345    3:           OBJECT IDENTIFIER
         :            organizationName (2 5 4 10)
 350   10:           PrintableString 'Example CA'
         :            }
         :           }
 362   19:         SET {
 364   17:          SEQUENCE {
 366    3:           OBJECT IDENTIFIER commonName (2 5 4 3)
 371   10:           PrintableString 'ca.example'
         :            }
         :           }
         :          }
 383   20:        INTEGER
         :      7F 74 A3 FC 03 6C E2 14 78 5C 59 61 4E 6F 8D F2
         :      4C 47 A8 79
         :         }
 405  551:       SEQUENCE {
 409  430:        SEQUENCE {
 413    3:         [0] {
 415    1:          INTEGER 2
         :           }
 418   20:         INTEGER
         :      7F 74 A3 FC 03 6C E2 14 78 5C 59 61 4E 6F 8D F2
         :      4C 47 A8 79
 440   10:         SEQUENCE {
 442    8:          OBJECT IDENTIFIER
         :           ecdsaWithSHA384 (1 2 840 10045 4 3 3)
         :           }
 452   55:         SEQUENCE {
 454   11:          SET {
 456    9:           SEQUENCE {
 458    3:            OBJECT IDENTIFIER
         :             countryName (2 5 4 6)
 463    2:            PrintableString 'US'
         :             }
         :            }
 467   19:          SET {
 469   17:           SEQUENCE {
 471    3:            OBJECT IDENTIFIER
         :             organizationName (2 5 4 10)
 476   10:            PrintableString 'Example CA'
         :             }
         :            }
 488   19:          SET {
 490   17:           SEQUENCE {
 492    3:            OBJECT IDENTIFIER
         :             commonName (2 5 4 3)
 497   10:            PrintableString 'ca.example'
         :             }
         :            }
         :           }
 509   30:         SEQUENCE {
 511   13:          UTCTime 09/01/2025 17:03:48 GMT
 526   13:          UTCTime 09/01/2026 17:03:48 GMT
         :           }
 541   60:         SEQUENCE {
 543   11:          SET {
 545    9:           SEQUENCE {
 547    3:            OBJECT IDENTIFIER
         :             countryName (2 5 4 6)
 552    2:            PrintableString 'US'
         :             }
         :            }
 556   11:          SET {
 558    9:           SEQUENCE {
 560    3:            OBJECT IDENTIFIER
         :             stateOrProvinceName (2 5 4 8)
 565    2:            PrintableString 'VA'
         :             }
         :            }
 569   16:          SET {
 571   14:           SEQUENCE {
 573    3:            OBJECT IDENTIFIER
         :             localityName (2 5 4 7)
 578    7:            PrintableString 'Herndon'
         :             }
         :            }
 587   14:          SET {
 589   12:           SEQUENCE {
 591    3:            OBJECT IDENTIFIER
         :             commonName (2 5 4 3)
 596    5:            PrintableString 'Alice'
         :             }
         :            }
         :           }
 603  118:         SEQUENCE {
 605   16:          SEQUENCE {
 607    7:           OBJECT IDENTIFIER
         :            ecPublicKey (1 2 840 10045 2 1)
 616    5:           OBJECT IDENTIFIER
         :            secp384r1 (1 3 132 0 34)
         :            }
 623   98:          BIT STRING
         :      04 80 1C FB A9 57 37 53 08 33 FF 36 41 E5 8D 6F
         :      9E 47 D3 3A FE 95 58 16 55 E1 74 6D FE 23 CF 10
         :      9B E4 C0 A3 55 A3 34 78 51 2F 72 35 CC 57 9A 78
         :      93 3A A2 25 31 C2 D1 5D 89 02 8A 98 31 7F C3 30
         :      52 1C C1 9E F1 3F DB 90 77 D7 A9 E8 A6 7E 45 7B
         :      AD DB 5D 4B F3 E5 B5 40 8D 50 25 20 CD C4 03 51
         :      B1
         :           }
 723  118:         [3] {
 725  116:          SEQUENCE {
 727   12:           SEQUENCE {
 729    3:            OBJECT IDENTIFIER
         :             basicConstraints (2 5 29 19)
 734    1:            BOOLEAN TRUE
 737    2:            OCTET STRING, encapsulates {
 739    0:             SEQUENCE {}
         :              }
         :             }
 741   11:           SEQUENCE {
 743    3:            OBJECT IDENTIFIER
         :             keyUsage (2 5 29 15)
 748    4:            OCTET STRING, encapsulates {
 750    2:             BIT STRING 7 unused bits
         :              '1'B (bit 0)
         :              }
         :             }
 754   29:           SEQUENCE {
 756    3:            OBJECT IDENTIFIER
         :             subjectKeyIdentifier (2 5 29 14)
 761   22:            OCTET STRING, encapsulates {
 763   20:             OCTET STRING
         :      23 1D 00 D1 FE ED 0B 39 10 11 98 18 CC 7D CD 70
         :      CD 8B D3 92
         :              }
         :             }
 785   31:           SEQUENCE {
 787    3:            OBJECT IDENTIFIER
         :             authorityKeyIdentifier (2 5 29 35)
 792   24:            OCTET STRING, encapsulates {
 794   22:             SEQUENCE {
 796   20:              [0]
         :      3E 98 BC B2 EF DC 34 1B BE 71 92 D2 A3 FA 6D BC
         :      F2 66 40 AA
         :               }
         :              }
         :             }
 818   23:           SEQUENCE {
 820    3:            OBJECT IDENTIFIER
         :             certificatePolicies (2 5 29 32)
 825   16:            OCTET STRING, encapsulates {
 827   14:             SEQUENCE {
 829   12:              SEQUENCE {
 831   10:               OBJECT IDENTIFIER
         :                testCertPolicy (2 16 840 1 101 3 2 1 48 48)
         :                }
         :               }
         :              }
         :             }
         :            }
         :           }
         :          }
 843   10:        SEQUENCE {
 845    8:         OBJECT IDENTIFIER
         :          ecdsaWithSHA384 (1 2 840 10045 4 3 3)
         :          }
 855  103:        BIT STRING, encapsulates {
 858  100:         SEQUENCE {
 860   48:          INTEGER
         :      6B BF 53 2A 5D EC 16 95 9D 48 C1 DF A5 2D 5F D9
         :      B9 66 63 E2 EF CC B9 D5 10 3C 5A 16 CE BF 42 90
         :      56 B7 18 B6 3E 2A 39 D8 8C 54 A0 5C A1 57 1E C8
 910   48:          INTEGER
         :      44 9E 94 F7 5D 38 F0 D0 1B DE 78 9C 1D CA C6 15
         :      FD 54 62 B8 5B 0E 5C AD 2B 8B 42 6B 91 C1 C4 3F
         :      EA 02 0C B8 FD E5 33 03 93 59 C1 56 8B 2B BF 2E
         :           }
         :          }
         :         }
         :        }
         :       }
         :      }
         :     }
         :    }
 960   10:  SEQUENCE {
 962    8:   OBJECT IDENTIFIER ecdsaWithSHA384 (1 2 840 10045 4 3 3)
         :    }
 972  103:  BIT STRING, encapsulates {
 975  100:   SEQUENCE {
 977   47:    INTEGER
         :     64 CD 1C F5 0B 59 C0 92 D8 3A 99 08 28 90 79 2C
         :     31 D8 93 CB 30 8D 78 56 2F 7B ED BC F2 AC 89 AA
         :     E6 9D 07 DC 17 A5 E9 F0 12 F0 19 D0 D3 45 8D
1026   49:    INTEGER
         :     00 84 70 C0 95 C6 D1 B8 78 6A 75 6E A6 3A 00 DD
         :     E6 45 84 18 6A A0 8B 12 2E BC 41 1C 7D 56 E7 34
         :     21 32 10 4E 27 D2 64 3D F4 F1 D4 46 75 E8 1F 0A
         :     85
         :     }
         :    }
         :   }
]]></artwork>
      <t>The CA issues a key establishment certificate to Alice:</t>
      <artwork><![CDATA[
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
]]></artwork>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to
Sean Turner,
Joe Mandel,
Mike StJohns,
Mike Ounsworth,
Carl Wallace,
Corey Bonnell, and
Hani Ezzadeen
for their constructive comments.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
