1、Information technology Generic applications of ASN.1 Part 4:Cryptographic message syntax ISO/IEC 2021INTERNATIONAL STANDARDISO/IEC24824-4Reference numberISO/IEC 24824-4:2021(E)First edition2021-03 ISO/IEC 24824-4:2021(E)ii ISO/IEC 2021 All rights reservedCOPYRIGHT PROTECTED DOCUMENT ISO/IEC 2021All
2、rights reserved.Unless otherwise specified,or required in the context of its implementation,no part of this publication may be reproduced or utilized otherwise in any form or by any means,electronic or mechanical,including photocopying,or posting on the internet or an intranet,without prior written
3、permission.Permission can be requested from either ISO at the address below or ISOs member body in the country of the requester.ISO copyright officeCP 401 Ch.de Blandonnet 8CH-1214 Vernier,GenevaPhone:+41 22 749 01 11Email:copyrightiso.orgWebsite:www.iso.orgPublished in SwitzerlandISO/IEC 24824-4:20
4、21(E)ISO/IEC 2020 All rights reserved iii Foreword ISO(the International Organization for Standardization)and IEC(the International Electrotechnical Commission)form the specialized system for worldwide standardization.National bodies that are members of ISO or IEC participate in the development of I
5、nternational Standards through technical committees established by the respective organization to deal with particular fields of technical activity.ISO and IEC technical committees collaborate in fields of mutual interest.Other international organizations,governmental and non-governmental,in liaison
6、 with ISO and IEC,also take part in the work.The procedures used to develop this document and those intended for its further maintenance are described in the ISO/IEC Directives,Part 1.In particular,the different approval criteria needed for the different types of document should be noted.This docume
7、nt was drafted in accordance with the editorial rules of the ISO/IEC Directives,Part2(see www.iso.org/directives or www.iec.ch/members_experts/refdocs).Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights.ISO and IEC shall not be held r
8、esponsible for identifying any or all such patent rights.Details of any patent rights identified during the development of the document will be in the Introduction and/or on the ISO list of patent declarations received(see www.iso.org/patents)or the IEC list of patent declarations received(see paten
9、ts.iec.ch).Any trade name used in this document is information given for the convenience of users and does not constitute an endorsement.For an explanation of the voluntary nature of standards,the meaning of ISO specific terms and expressions related to conformity assessment,as well as information a
10、bout ISOs adherence to the World Trade Organization(WTO)principles in the Technical Barriers to Trade(TBT)see www.iso.org/iso/foreword.html.In the IEC,www.iec.ch/understanding-standards.This document was prepared by ITU-T Telecommunication Standardization Sector of ITU(as ITU-T X.894 10/2018)and dra
11、fted in accordance with its editorial rules,in collaboration with Joint Technical Committee ISO/IEC JTC1,Information technology,Subcommittee SC6,Telecommunications and information exchange between systems.A list of all parts in the ISO/IEC 24824 series can be found on the ISO and IEC websites.Any fe
12、edback or questions on this document should be directed to the users national standards body.A complete listing of these bodies can be found at www.iso.org/members.html and www.iec.ch/national-committees.ISO/IEC 24824-4:2021(E)iv Rec.ITU-T X.894(10/2018)ISO/IEC 2021 All rights reserved CONTENTS Page
13、 1 Scope.1 2 Normative references.1 2.1 Identical Recommendations|International Standards.1 2.2 Paired Recommendations|International Standards equivalent in technical content.1 2.3 Additional References.1 3 Definitions.1 4 Abbreviations.2 5 Conventions.2 6 Cryptographic message syntax.2 7 Signcrypti
14、on.3 7.1 The SigncryptedData type.4 7.2 The ContentInformation type.4 7.3 The Signcrypter type.10 8 Quantum safe SignedData signatures.11 8.1 Detached content consideration.12 8.2 Time stamp consideration.12 8.3 The tokenizedParts attribute.13 9 Other key management techniques.13 9.1 Constructive ke
15、y management.13 9.2 Database encryption key management.14 Annex A ASN.1 modules.17 A.1 Main CMS module(from IETF RFC 6268).17 A.2 Module CMSObjectIdentifiers.23 A.3 Module AlgorithmInformation-2009(from IETF RFC 5912).25 A.4 Module CryptographicMessageSyntaxAlgorithms-2009(from IETF RFC 5911).32 A.5
16、 Module PKIX-Algs-2009(from IETF RFC 5912).35 A.6 Module PKIXAttributeCertificate-2009(from IETF RFC 5912).42 A.7 Module AttributeCertificateVersion1-2009(from IETF RFC 5912).46 A.8 Module PKIX-CommonTypes-2009(from IETF RFC 5912).47 A.9 Module PKIX-X400Address-2009(from IETF RFC 5912).50 A.10 Module PKIX1Explicit-2009(from IETF RFC 5912).54 A.11 Module PKIXImplicit-2009(from IETF RFC 5912).60 A.12 Module PKIX1-PSS-OAEP-Algorithms-2009(from IETF RFC 5912).67 A.13 Module SecureMimeMessageV3dot1-2