<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.18 (Ruby 2.6.10) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-housley-lamps-private-key-attest-attr-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title abbrev="Statement of Private Key Possession">An Attribute for Statement of Possession of a Private Key</title>
    <seriesInfo name="Internet-Draft" value="draft-housley-lamps-private-key-attest-attr-01"/>
    <author initials="R." surname="Housley" fullname="Russ Housley">
      <organization abbrev="Vigil Security">Vigil Security, LLC</organization>
      <address>
        <postal>
          <city>Herndon, VA</city>
          <country>US</country>
        </postal>
        <email>housley@vigilsec.com</email>
      </address>
    </author>
    <date year="2025" month="January" day="09"/>
    <area>Security</area>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 59?>

<t>This document specifies an attribute for a statement of possession of a private key
by a certificate subject.  As part of X.509 certificate enrollment, a Certification
Authority (CA) typically demands proof that the subject possesses of the private key
that corresponds to the to-be-certified public key.  In some cases, a CA might accept
a signed statement from the certificate subject.  For example, when a certificate
subject needs separate certificates for signature and key establishment, a statement
that can be validated with the previously issued signature certificate for the same
subject might be adequate for subsequent issuance of the key establishment certificate.</t>
    </abstract>
  </front>
  <middle>
    <?line 70?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document specifies an attribute for a statement of possession of a private key
by a certificate subject.  As part of X.509 certificate <xref target="RFC5280"/> enrollment, a
Certification Authority (CA) typically demands proof that the subject possesses the
private key that corresponds to the to-be-certified public key.  In some cases, a CA
might accept a signed statement from the certificate subject.  For example, when a
certificate subject needs separate certificates for signature and key establishment,
a signed statement that can be validated with the previously issued signature
certificate for the same subject might be adequate for subsequent issuance of the
key establishment certificate.  Note that <xref target="RFC6955"/> offers some algorithms to
provide proof of possession for Diffie-Hellman private keys.  However, these
algorithms are not suitable for use with PKCS#10 <xref target="RFC2986"/>.  On the other hand,
the the attribute specified in this document is suitable for use with PKCS#10.</t>
      <t>In many situations a subject needs two certificates, one for digiatal signatures, and
a separate one for key establishment.  For example, a subject may need a signature
certificate that contains a ML-DSA public key and a key establishment certificate
that contains a ML-KEM public key.  For another example, a subject may need a signature
certificate that contains a ECDSA public key and a key establishment certificate
that contains a ECDH public key.</t>
      <t>In this situation, a CA might accept a signed statement that can be validated with the
previously issued signature certificate as adequate for subsequent issuance of
the key establishment certificate.</t>
      <t>When using the attribute defined in this document make a statement about the
possession of the key establishment private key, the process for a subject to
obtain two certificates is:</t>
      <ol spacing="normal" type="1"><li>
          <t>The subject generates the signature key pair.</t>
        </li>
        <li>
          <t>The subject composes a PKCS#10 Certificate Signing Request (CSR) in the usual
manner.  It includes a signature that is produced with the private key from
step 1.</t>
        </li>
        <li>
          <t>The subject sends the CSR to the CA, and it gets back a signature certificate.
The signature certificate includes a key usage of digitalSignature, 
nonRepudiation, or both <xref section="4.2.1.3" sectionFormat="of" target="RFC5280"/>.</t>
        </li>
        <li>
          <t>The subject generates the key establishment key pair.</t>
        </li>
        <li>
          <t>The subject composes a PKCS#10 CSR containing the key establishment public
key.  The CSR attributes include the attribute specified in <xref target="attr"/> of this
document.  The subject name matches the one from step 2.  The CSR includes a
signature that is produced with the private key from step 1.</t>
        </li>
        <li>
          <t>The subject sends the CSR to the CA, and it gets back a key establishment
certificate.  The key establishment certificate includes a key usage of
keyEncipherment or keyAgreement <xref section="4.2.1.3" sectionFormat="of" target="RFC5280"/>.</t>
        </li>
      </ol>
      <section anchor="asn1">
        <name>ASN.1</name>
        <t>The attestation attribute is generated using ASN.1 <xref target="X680"/>, using the
Distinguished Encoding Rules (DER) <xref target="X690"/>.</t>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="attr">
      <name>Attribute for Statement of Possession of a Private Key</name>
      <t>The attribute for statement of possession of a private key is included in a
certificate request to make the following statement:</t>
      <ul empty="true">
        <li>
          <t>"The subject of the signature certificate that is used to validate the
signature on this certificate request also has possession of the private key
that corresponds to the public key in the certificate request."</t>
        </li>
      </ul>
      <t>The CA <bcp14>MUST</bcp14> perform certification path validation for the signature
certificate as specified in <xref section="6" sectionFormat="of" target="RFC5280"/>.  If the certification
path is not valid, then the CA <bcp14>MUST</bcp14> reject the certificate request.</t>
      <t>The CA <bcp14>MUST</bcp14> validate the signature on the certificate request using the
public key from the signature certificate.  If the signature is not valid,
then the CA <bcp14>MUST</bcp14> reject the certificate request.</t>
      <t>The subject in the signature certificate <bcp14>SHOULD</bcp14> be the same as the subject name
in the certificate request.  If they are different, the certificate policy <bcp14>MUST</bcp14>
describe how the CA can determine that the two subject names identify the same
entity.  If the CA is unable to determine that the two subject names identify
the same entity, then the CA <bcp14>MUST</bcp14> reject the certificate request.</t>
      <t>If subject alternative names are present in the certificate request, they
<bcp14>SHOULD</bcp14> match subject alternative names in the signature certificate.  If the CA
is unable to determine that each of subject alternative names identifies
the same entity as is named in the signature certificate, then the CA <bcp14>MUST</bcp14>
reject the certificate request.</t>
      <t>The attribute for statement of possession of a private key has the following
structure:</t>
      <sourcecode type="asn.1"><![CDATA[
   id-at-privateKeyStatement OBJECT IDENTIFIER ::= 
     { 1 3 6 1 4 1 22112 2 1 }

   privateKeyStatement ATTRIBUTE ::= {
     TYPE PrivateKeyStatement
     IDENTIFIED BY id-at-privateKeyStatement }

   PrivateKeyStatement ::= SEQUENCE {
     signer  IssuerAndSerialNumber,
     cert    Certificate OPTIONAL }

]]></sourcecode>
      <t>The components of the PrivateKeyStatement SEQUENCE have the following semantics:</t>
      <ul empty="true">
        <li>
          <dl>
            <dt>signer:</dt>
            <dd>
              <t>the issuer name and certificate serial number of the signature certificate.</t>
            </dd>
          </dl>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <dl>
            <dt>cert:</dt>
            <dd>
              <t>the signature certificate.  If the issuer of the key establishment certificate
will be the same as the issuer of the signature certificate, then this
component <bcp14>MAY</bcp14> be omitted.  When the signature certificate is omitted, the
signer is assuming that the CA has a mechanism to obtain all valid
certificates that it issued.</t>
            </dd>
          </dl>
        </li>
      </ul>
    </section>
    <section anchor="conventions-for-pkcs10">
      <name>Conventions for PKCS#10</name>
      <t>This section specifies the conventions for using the attribute for statement
of possession of a private key with PKCS#10 <xref target="RFC2986"/> when requesting a
key establishment certificate.</t>
      <t>The PKCS#10 CertificationRequest always has three components, as follows:</t>
      <ul empty="true">
        <li>
          <dl>
            <dt>certificationRequestInfo:</dt>
            <dd>
              <t>the subject name <bcp14>SHOULD</bcp14> be the same as the subject name in the signature certificate,
the subjectPKInfo <bcp14>MUST</bcp14> contain the public key for the key establishment algorithm,
and the attributes <bcp14>MUST</bcp14> include privateKeyStatement attribute as specified
in <xref target="attr"/> of this document.</t>
            </dd>
          </dl>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <dl>
            <dt>signatureAlgorithm:</dt>
            <dd>
              <t>the signature algorithm <bcp14>MUST</bcp14> be one that can be validated with the public key
in the signature certificate.</t>
            </dd>
          </dl>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <dl>
            <dt>signature:</dt>
            <dd>
              <t>the signature over certificationRequestInfo <bcp14>MUST</bcp14> validate with the public key
in the signature certificate, and certification path validation for the signature
certificate <bcp14>MUST</bcp14> be successful as specified in <xref section="6" sectionFormat="of" target="RFC5280"/>.</t>
            </dd>
          </dl>
        </li>
      </ul>
    </section>
    <section anchor="conventions-for-crmf">
      <name>Conventions for CRMF</name>
      <t>This section specifies the conventions for using the attribute for statement
of possession of a private key with the Certificate Request Message
Format (CRMF) <xref target="RFC4211"/> when requesting a key establisment certificate.</t>
      <t>The following ASN.1 types are defined for use with CRMF.  They have exactly
the same semantics and syntax as the attribute discussed above, but they
offer a similar naming convention to the Registration Controls in <xref target="RFC4211"/>.</t>
      <sourcecode type="asn.1"><![CDATA[
  regCtrl-privateKeyStatement ATTRIBUTE ::= privateKeyStatement

  id-regCtrl-privateKeyStatement OBJECT IDENTIFIER ::=
    id-at-privateKeyStatement
 
]]></sourcecode>
      <t>The CRMF CertificationRequest always has three components, as follows:</t>
      <ul empty="true">
        <li>
          <dl>
            <dt>certReq:</dt>
            <dd>
              <t>the certTemplate <bcp14>MUST</bcp14> include the subject and the publicKey components. The
same subject name <bcp14>SHOULD</bcp14> match the subject name in the signature certificate, and
publicKey <bcp14>MUST</bcp14> contain the public key for the key establishment algorithm.</t>
            </dd>
          </dl>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <dl>
            <dt>popo:</dt>
            <dd>
              <t>the ProofOfPossession <bcp14>MUST</bcp14> use the signature CHOICE,
the poposkInput <bcp14>MUST</bcp14> be present, POPOSigningKeyInput.authInfo <bcp14>MUST</bcp14> use
the sender CHOICE, the sender <bcp14>MUST</bcp14> set to the subject name that appears in
the signature certificate, the publicKey <bcp14>MUST</bcp14> contain a copy of the public
key from the certTemplate, the algorithmIdentifier <bcp14>MUST</bcp14> identify a signture
algorithm that can be validated with the public key in the signature certificate,
signature over the poposkInput <bcp14>MUST</bcp14> validate with the public key in the signature
certificate, and certification path validation for the signature certificate
<bcp14>MUST</bcp14> be successful as specified in <xref section="6" sectionFormat="of" target="RFC5280"/>.</t>
            </dd>
          </dl>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <dl>
            <dt>regInfo:</dt>
            <dd>
              <t>the attributes <bcp14>MUST</bcp14> include privateKeyStatement attribute as specified
in <xref target="attr"/> of this document.</t>
            </dd>
          </dl>
        </li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The subject is signing privateKeyStatement attribute to tell the CA that it has
possession of the key establishment private key.  This is being done instead of
providing some other form of proof of possession.  If the subject has lost control
of the signature private key, then the signed privateKeyStatement attribute
could be generated by some other party.  Timely revocation of the compromised
signature certificate is the only protection against such loss of control.</t>
      <t>The signature key pair and the key establishment key pair are expected to have
roughly the same security strength.  To ensure that the signature on the attestation
is not the weak part of the certificate enrollment, the signature key pair <bcp14>SHOULD</bcp14> be
at least as strong as the key establishment key pair.</t>
      <t>If a CA allows subject in the key establishment certificate to be different than
the subject name in the signature certificate, then certificate policy <bcp14>MUST</bcp14>
describe how to determine that the two subject names identify the same entity.
Likewise, if a CA allows subject alternative names in the key establishment
certificate that are not present in the signature certificate, then certificate
policy <bcp14>MUST</bcp14> describe how to determine that the subject alternative names identify
the same entity as is named in the signature certificate.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>For the ASN.1 Module in the <xref target="appendix-asn1"/> of this document, IANA
is requested to assign an object identifier (OID) for the module
identifier (TBD0) with a Description of "id-mod-private-key-stmt-2025".  The
OID for the module should be allocated in the "SMI Security for PKIX Module
Identifier" registry (1.3.6.1.5.5.7.0).</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2986">
          <front>
            <title>PKCS #10: Certification Request Syntax Specification Version 1.7</title>
            <author fullname="M. Nystrom" initials="M." surname="Nystrom"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <date month="November" year="2000"/>
            <abstract>
              <t>This memo represents a republication of PKCS #10 v1.7 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document, except for the security considerations section, is taken directly from the PKCS #9 v2.0 or the PKCS #10 v1.7 document. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2986"/>
          <seriesInfo name="DOI" value="10.17487/RFC2986"/>
        </reference>
        <reference anchor="RFC4211">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate Request Message Format (CRMF)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="September" year="2005"/>
            <abstract>
              <t>This document describes the Certificate Request Message Format (CRMF) syntax and semantics. This syntax is used to convey a request for a certificate to a Certification Authority (CA), possibly via a Registration Authority (RA), for the purposes of X.509 certificate production. The request will typically include a public key and the associated registration information. This document does not define a certificate request protocol. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4211"/>
          <seriesInfo name="DOI" value="10.17487/RFC4211"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5912">
          <front>
            <title>New ASN.1 Modules for the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Public Key Infrastructure using X.509 (PKIX) certificate format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates those ASN.1 modules to conform to the 2002 version of ASN.1. There are no bits-on-the-wire changes to any of the formats; this is simply a change to the syntax. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5912"/>
          <seriesInfo name="DOI" value="10.17487/RFC5912"/>
        </reference>
        <reference anchor="X680" target="https://www.itu.int/rec/T-REC-X.680">
          <front>
            <title>Information technology -- Abstract Syntax Notation One (ASN.1): Specification of basic notation</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2021" month="February"/>
          </front>
          <seriesInfo name="ITU-T Recommendation" value="X.680"/>
          <seriesInfo name="ISO/IEC" value="8824-1:2021"/>
        </reference>
        <reference anchor="X690" target="https://www.itu.int/rec/T-REC-X.690">
          <front>
            <title>Information technology -- ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2021" month="February"/>
          </front>
          <seriesInfo name="ITU-T Recommendation" value="X.690"/>
          <seriesInfo name="ISO/IEC" value="8825-1-2021"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6955">
          <front>
            <title>Diffie-Hellman Proof-of-Possession Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="H. Prafullchandra" initials="H." surname="Prafullchandra"/>
            <date month="May" year="2013"/>
            <abstract>
              <t>This document describes two methods for producing an integrity check value from a Diffie-Hellman key pair and one method for producing an integrity check value from an Elliptic Curve key pair. This behavior is needed for such operations as creating the signature of a Public-Key Cryptography Standards (PKCS) #10 Certification Request. These algorithms are designed to provide a Proof-of-Possession of the private key and not to be a general purpose signing algorithm.</t>
              <t>This document obsoletes RFC 2875.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6955"/>
          <seriesInfo name="DOI" value="10.17487/RFC6955"/>
        </reference>
      </references>
    </references>
    <?line 312?>

<section anchor="appendix-asn1">
      <name>ASN.1 Module</name>
      <t>This ASN.1 Module builds upon the conventions established in <xref target="RFC5912"/>.</t>
      <sourcecode type="asn.1"><![CDATA[
<CODE STARTS>

PrivateKeyStatement-2025
  { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-private-key-stmt-2025(TBD0) }

DEFINITIONS IMPLICIT TAGS ::= BEGIN

EXPORTS ALL;

IMPORTS
  ATTRIBUTE
  FROM PKIX-CommonTypes-2009 -- in [RFC5912]
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) id-mod(0)
      id-mod-pkixCommon-02(57) }

  Certificate
  FROM PKIX1Explicit-2009 -- in [RFC5912]
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) id-mod(0)
      id-mod-pkix1-explicit-02(51) }

  IssuerAndSerialNumber
  FROM CryptographicMessageSyntax-2010 -- [RFC6268]
    { iso(1) member-body(2) us(840) rsadsi(113549)
       pkcs(1) pkcs-9(9) smime(16) modules(0)
       id-mod-cms-2009(58) } ;

--
-- Private Key Statement Attribute
--

id-at-privateKeyStatement OBJECT IDENTIFIER ::=
  { 1 3 6 1 4 1 22112 2 1 }

privateKeyStatement ATTRIBUTE ::= {
  TYPE PrivateKeyStatement
  IDENTIFIED BY id-at-privateKeyStatement }

PrivateKeyStatement ::= SEQUENCE {
  signer  IssuerAndSerialNumber,
  cert    Certificate OPTIONAL }

--
-- Registration Control Support
--

RegControlSet ATTRIBUTE ::= { regCtrl-privateKeStatement, ... }

regCtrl-privateKeyStatement ATTRIBUTE ::= privateKeyStatement

id-regCtrl-privateKeyStatement OBJECT IDENTIFIER ::=
  id-at-privateKeyStatement
     
END

<CODE ENDS>
]]></sourcecode>
    </section>
    <section anchor="appendix-example-use-of-the-privatekeystatement-attribute">
      <name>Appendix: Example use of the privateKeyStatement Attribute</name>
      <t>In this example, the self-signed certificate for the CA is:</t>
      <artwork><![CDATA[
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
]]></artwork>
      <t>Alice generates her ECDSA signature key pair.  Then, Alice composes
a PKCS#10 Certificate Signing Request (CSR) in the usual manner as
specified in <xref target="RFC2986"/>.  The CSR includes a signature that is produced
with her ECDSA private key.  The CSR is:</t>
      <artwork><![CDATA[
-----BEGIN CERTIFICATE REQUEST-----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-----END CERTIFICATE REQUEST-----
]]></artwork>
      <t>The CA issues a signature certificate to Alice:</t>
      <artwork><![CDATA[
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
]]></artwork>
      <t>Alice generates her ECDH key establishment key pair.  Then, Alice
composes a PKCS#10 CSR.  The CSR attributes include the
privateKeyStatement attribute, which points to her ECDSA signature
certificate.  The CSR includes her ECDH public key and a signature that
is produced with her ECDSA private key.  The CSR is:</t>
      <artwork><![CDATA[
-----BEGIN CERTIFICATE REQUEST-----
MIIEMTCCA7gCAQAwPDELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAlZBMRAwDgYDVQQH
EwdIZXJuZG9uMQ4wDAYDVQQDEwVBbGljZTB0MA4GBSuBBAEMBgUrgQQAIgNiAAQB
RyQTH+cq1s5F94uFqFe7l1LqGdEC8Tm+e5VYBCfKAC8MJySQMj1GixEEXL+1Wjtg
23XvnJouCDoxSpDCSMqf3kvp5+naM37uxa3ZYgD6DPY3me5EZvyZPvSRJTFl/Bag
ggL9MGcGCSqGSIb3DQEJDjFaMFgwDAYDVR0TAQH/BAIwADALBgNVHQ8EBAMCAwgw
IgYDVR0RBBswGYEXYWxpY2VAZW1haWwuZXhhbXBsZS5jb20wFwYDVR0gBBAwDjAM
BgpghkgBZQMCATAwMIICkAYKKwYBBAGBrGACATGCAoAwggJ8ME8wNzELMAkGA1UE
BhMCVVMxEzARBgNVBAoTCkV4YW1wbGUgQ0ExEzARBgNVBAMTCmNhLmV4YW1wbGUC
FH90o/wDbOIUeFxZYU5vjfJMR6h5MIICJzCCAa6gAwIBAgIUf3Sj/ANs4hR4XFlh
Tm+N8kxHqHkwCgYIKoZIzj0EAwMwNzELMAkGA1UEBhMCVVMxEzARBgNVBAoTCkV4
YW1wbGUgQ0ExEzARBgNVBAMTCmNhLmV4YW1wbGUwHhcNMjUwMTA5MTcwMzQ4WhcN
MjYwMTA5MTcwMzQ4WjA8MQswCQYDVQQGEwJVUzELMAkGA1UECBMCVkExEDAOBgNV
BAcTB0hlcm5kb24xDjAMBgNVBAMTBUFsaWNlMHYwEAYHKoZIzj0CAQYFK4EEACID
YgAEgBz7qVc3Uwgz/zZB5Y1vnkfTOv6VWBZV4XRt/iPPEJvkwKNVozR4US9yNcxX
mniTOqIlMcLRXYkCipgxf8MwUhzBnvE/25B316nopn5Fe63bXUvz5bVAjVAlIM3E
A1Gxo3YwdDAMBgNVHRMBAf8EAjAAMAsGA1UdDwQEAwIHgDAdBgNVHQ4EFgQUIx0A
0f7tCzkQEZgYzH3NcM2L05IwHwYDVR0jBBgwFoAUPpi8su/cNBu+cZLSo/ptvPJm
QKowFwYDVR0gBBAwDjAMBgpghkgBZQMCATAwMAoGCCqGSM49BAMDA2cAMGQCMGu/
Uypd7BaVnUjB36UtX9m5ZmPi78y51RA8WhbOv0KQVrcYtj4qOdiMVKBcoVceyAIw
RJ6U91048NAb3nicHcrGFf1UYrhbDlytK4tCa5HBxD/qAgy4/eUzA5NZwVaLK78u
MAoGCCqGSM49BAMDA2cAMGQCL2TNHPULWcCS2DqZCCiQeSwx2JPLMI14Vi977bzy
rImq5p0H3Bel6fAS8BnQ00WNAjEAhHDAlcbRuHhqdW6mOgDd5kWEGGqgixIuvEEc
fVbnNCEyEE4n0mQ99PHURnXoHwqF
-----END CERTIFICATE REQUEST-----
]]></artwork>
      <t>The CSR decodes to:</t>
      <artwork><![CDATA[
   0 1073: SEQUENCE {
   4  952:  SEQUENCE {
   8    1:   INTEGER 0
  11   60:   SEQUENCE {
  13   11:    SET {
  15    9:     SEQUENCE {
  17    3:      OBJECT IDENTIFIER countryName (2 5 4 6)
  22    2:      PrintableString 'US'
         :       }
         :      }
  26   11:    SET {
  28    9:     SEQUENCE {
  30    3:      OBJECT IDENTIFIER stateOrProvinceName (2 5 4 8)
  35    2:      PrintableString 'VA'
         :       }
         :      }
  39   16:    SET {
  41   14:     SEQUENCE {
  43    3:      OBJECT IDENTIFIER localityName (2 5 4 7)
  48    7:      PrintableString 'Herndon'
         :       }
         :      }
  57   14:    SET {
  59   12:     SEQUENCE {
  61    3:      OBJECT IDENTIFIER commonName (2 5 4 3)
  66    5:      PrintableString 'Alice'
         :       }
         :      }
         :     }
  73  116:   SEQUENCE {
  75   14:    SEQUENCE {
  77    5:     OBJECT IDENTIFIER ECDH (1 3 132 1 12)
  84    5:     OBJECT IDENTIFIER secp384r1 (1 3 132 0 34)
         :      }
  91   98:    BIT STRING
         :     04 01 47 24 13 1F E7 2A D6 CE 45 F7 8B 85 A8 57
         :     BB 97 52 EA 19 D1 02 F1 39 BE 7B 95 58 04 27 CA
         :     00 2F 0C 27 24 90 32 3D 46 8B 11 04 5C BF B5 5A
         :     3B 60 DB 75 EF 9C 9A 2E 08 3A 31 4A 90 C2 48 CA
         :     9F DE 4B E9 E7 E9 DA 33 7E EE C5 AD D9 62 00 FA
         :     0C F6 37 99 EE 44 66 FC 99 3E F4 91 25 31 65 FC
         :     16
         :     }
 191  765:   [0] {
 195  103:    SEQUENCE {
 197    9:     OBJECT IDENTIFIER
         :      extensionRequest (1 2 840 113549 1 9 14)
 208   90:     SET {
 210   88:      SEQUENCE {
 212   12:       SEQUENCE {
 214    3:        OBJECT IDENTIFIER
         :         basicConstraints (2 5 29 19)
 219    1:        BOOLEAN TRUE
 222    2:        OCTET STRING, encapsulates {
 224    0:         SEQUENCE {}
         :          }
         :         }
 226   11:       SEQUENCE {
 228    3:        OBJECT IDENTIFIER keyUsage (2 5 29 15)
 233    4:        OCTET STRING, encapsulates {
 235    2:         BIT STRING 3 unused bits
         :          '10000'B (bit 4)
         :          }
         :         }
 239   34:       SEQUENCE {
 241    3:        OBJECT IDENTIFIER subjectAltName (2 5 29 17)
 246   27:        OCTET STRING, encapsulates {
 248   25:         SEQUENCE {
 250   23:          [1] 'alice@email.example.com'
         :           }
         :          }
         :         }
 275   23:       SEQUENCE {
 277    3:        OBJECT IDENTIFIER
         :         certificatePolicies (2 5 29 32)
 282   16:        OCTET STRING, encapsulates {
 284   14:         SEQUENCE {
 286   12:          SEQUENCE {
 288   10:           OBJECT IDENTIFIER 
         :            testCertPolicy (2 16 840 1 101 3 2 1 48 48)
         :            }
         :           }
         :          }
         :         }
         :        }
         :       }
         :      }
 300  656:    SEQUENCE {
 304   10:     OBJECT IDENTIFIER
         :      privateKeyAttest (1 3 6 1 4 1 22112 2 1)
 316  640:     SET {
 320  636:      SEQUENCE {
 324   79:       SEQUENCE {
 326   55:        SEQUENCE {
 328   11:         SET {
 330    9:          SEQUENCE {
 332    3:           OBJECT IDENTIFIER countryName (2 5 4 6)
 337    2:           PrintableString 'US'
         :            }
         :           }
 341   19:         SET {
 343   17:          SEQUENCE {
 345    3:           OBJECT IDENTIFIER
         :            organizationName (2 5 4 10)
 350   10:           PrintableString 'Example CA'
         :            }
         :           }
 362   19:         SET {
 364   17:          SEQUENCE {
 366    3:           OBJECT IDENTIFIER commonName (2 5 4 3)
 371   10:           PrintableString 'ca.example'
         :            }
         :           }
         :          }
 383   20:        INTEGER
         :      7F 74 A3 FC 03 6C E2 14 78 5C 59 61 4E 6F 8D F2
         :      4C 47 A8 79
         :         }
 405  551:       SEQUENCE {
 409  430:        SEQUENCE {
 413    3:         [0] {
 415    1:          INTEGER 2
         :           }
 418   20:         INTEGER
         :      7F 74 A3 FC 03 6C E2 14 78 5C 59 61 4E 6F 8D F2
         :      4C 47 A8 79
 440   10:         SEQUENCE {
 442    8:          OBJECT IDENTIFIER
         :           ecdsaWithSHA384 (1 2 840 10045 4 3 3)
         :           }
 452   55:         SEQUENCE {
 454   11:          SET {
 456    9:           SEQUENCE {
 458    3:            OBJECT IDENTIFIER
         :             countryName (2 5 4 6)
 463    2:            PrintableString 'US'
         :             }
         :            }
 467   19:          SET {
 469   17:           SEQUENCE {
 471    3:            OBJECT IDENTIFIER
         :             organizationName (2 5 4 10)
 476   10:            PrintableString 'Example CA'
         :             }
         :            }
 488   19:          SET {
 490   17:           SEQUENCE {
 492    3:            OBJECT IDENTIFIER
         :             commonName (2 5 4 3)
 497   10:            PrintableString 'ca.example'
         :             }
         :            }
         :           }
 509   30:         SEQUENCE {
 511   13:          UTCTime 09/01/2025 17:03:48 GMT
 526   13:          UTCTime 09/01/2026 17:03:48 GMT
         :           }
 541   60:         SEQUENCE {
 543   11:          SET {
 545    9:           SEQUENCE {
 547    3:            OBJECT IDENTIFIER
         :             countryName (2 5 4 6)
 552    2:            PrintableString 'US'
         :             }
         :            }
 556   11:          SET {
 558    9:           SEQUENCE {
 560    3:            OBJECT IDENTIFIER
         :             stateOrProvinceName (2 5 4 8)
 565    2:            PrintableString 'VA'
         :             }
         :            }
 569   16:          SET {
 571   14:           SEQUENCE {
 573    3:            OBJECT IDENTIFIER
         :             localityName (2 5 4 7)
 578    7:            PrintableString 'Herndon'
         :             }
         :            }
 587   14:          SET {
 589   12:           SEQUENCE {
 591    3:            OBJECT IDENTIFIER
         :             commonName (2 5 4 3)
 596    5:            PrintableString 'Alice'
         :             }
         :            }
         :           }
 603  118:         SEQUENCE {
 605   16:          SEQUENCE {
 607    7:           OBJECT IDENTIFIER
         :            ecPublicKey (1 2 840 10045 2 1)
 616    5:           OBJECT IDENTIFIER
         :            secp384r1 (1 3 132 0 34)
         :            }
 623   98:          BIT STRING
         :      04 80 1C FB A9 57 37 53 08 33 FF 36 41 E5 8D 6F
         :      9E 47 D3 3A FE 95 58 16 55 E1 74 6D FE 23 CF 10
         :      9B E4 C0 A3 55 A3 34 78 51 2F 72 35 CC 57 9A 78
         :      93 3A A2 25 31 C2 D1 5D 89 02 8A 98 31 7F C3 30
         :      52 1C C1 9E F1 3F DB 90 77 D7 A9 E8 A6 7E 45 7B
         :      AD DB 5D 4B F3 E5 B5 40 8D 50 25 20 CD C4 03 51
         :      B1
         :           }
 723  118:         [3] {
 725  116:          SEQUENCE {
 727   12:           SEQUENCE {
 729    3:            OBJECT IDENTIFIER
         :             basicConstraints (2 5 29 19)
 734    1:            BOOLEAN TRUE
 737    2:            OCTET STRING, encapsulates {
 739    0:             SEQUENCE {}
         :              }
         :             }
 741   11:           SEQUENCE {
 743    3:            OBJECT IDENTIFIER
         :             keyUsage (2 5 29 15)
 748    4:            OCTET STRING, encapsulates {
 750    2:             BIT STRING 7 unused bits
         :              '1'B (bit 0)
         :              }
         :             }
 754   29:           SEQUENCE {
 756    3:            OBJECT IDENTIFIER
         :             subjectKeyIdentifier (2 5 29 14)
 761   22:            OCTET STRING, encapsulates {
 763   20:             OCTET STRING
         :      23 1D 00 D1 FE ED 0B 39 10 11 98 18 CC 7D CD 70
         :      CD 8B D3 92
         :              }
         :             }
 785   31:           SEQUENCE {
 787    3:            OBJECT IDENTIFIER
         :             authorityKeyIdentifier (2 5 29 35)
 792   24:            OCTET STRING, encapsulates {
 794   22:             SEQUENCE {
 796   20:              [0]
         :      3E 98 BC B2 EF DC 34 1B BE 71 92 D2 A3 FA 6D BC
         :      F2 66 40 AA
         :               }
         :              }
         :             }
 818   23:           SEQUENCE {
 820    3:            OBJECT IDENTIFIER
         :             certificatePolicies (2 5 29 32)
 825   16:            OCTET STRING, encapsulates {
 827   14:             SEQUENCE {
 829   12:              SEQUENCE {
 831   10:               OBJECT IDENTIFIER
         :                testCertPolicy (2 16 840 1 101 3 2 1 48 48)
         :                }
         :               }
         :              }
         :             }
         :            }
         :           }
         :          }
 843   10:        SEQUENCE {
 845    8:         OBJECT IDENTIFIER
         :          ecdsaWithSHA384 (1 2 840 10045 4 3 3)
         :          }
 855  103:        BIT STRING, encapsulates {
 858  100:         SEQUENCE {
 860   48:          INTEGER
         :      6B BF 53 2A 5D EC 16 95 9D 48 C1 DF A5 2D 5F D9
         :      B9 66 63 E2 EF CC B9 D5 10 3C 5A 16 CE BF 42 90
         :      56 B7 18 B6 3E 2A 39 D8 8C 54 A0 5C A1 57 1E C8
 910   48:          INTEGER
         :      44 9E 94 F7 5D 38 F0 D0 1B DE 78 9C 1D CA C6 15
         :      FD 54 62 B8 5B 0E 5C AD 2B 8B 42 6B 91 C1 C4 3F
         :      EA 02 0C B8 FD E5 33 03 93 59 C1 56 8B 2B BF 2E
         :           }
         :          }
         :         }
         :        }
         :       }
         :      }
         :     }
         :    }
 960   10:  SEQUENCE {
 962    8:   OBJECT IDENTIFIER ecdsaWithSHA384 (1 2 840 10045 4 3 3)
         :    }
 972  103:  BIT STRING, encapsulates {
 975  100:   SEQUENCE {
 977   47:    INTEGER
         :     64 CD 1C F5 0B 59 C0 92 D8 3A 99 08 28 90 79 2C
         :     31 D8 93 CB 30 8D 78 56 2F 7B ED BC F2 AC 89 AA
         :     E6 9D 07 DC 17 A5 E9 F0 12 F0 19 D0 D3 45 8D
1026   49:    INTEGER
         :     00 84 70 C0 95 C6 D1 B8 78 6A 75 6E A6 3A 00 DD
         :     E6 45 84 18 6A A0 8B 12 2E BC 41 1C 7D 56 E7 34
         :     21 32 10 4E 27 D2 64 3D F4 F1 D4 46 75 E8 1F 0A
         :     85
         :     }
         :    }
         :   }
]]></artwork>
      <t>The CA issues a key establishment certificate to Alice:</t>
      <artwork><![CDATA[
-----BEGIN CERTIFICATE-----
MIICJTCCAaygAwIBAgIUf3Sj/ANs4hR4XFlhTm+N8kxHqHowCgYIKoZIzj0EAwMw
NzELMAkGA1UEBhMCVVMxEzARBgNVBAoTCkV4YW1wbGUgQ0ExEzARBgNVBAMTCmNh
LmV4YW1wbGUwHhcNMjUwMTA5MTcwNTAwWhcNMjYwMTA5MTcwNTAwWjA8MQswCQYD
VQQGEwJVUzELMAkGA1UECBMCVkExEDAOBgNVBAcTB0hlcm5kb24xDjAMBgNVBAMT
BUFsaWNlMHQwDgYFK4EEAQwGBSuBBAAiA2IABAFHJBMf5yrWzkX3i4WoV7uXUuoZ
0QLxOb57lVgEJ8oALwwnJJAyPUaLEQRcv7VaO2Dbde+cmi4IOjFKkMJIyp/eS+nn
6dozfu7FrdliAPoM9jeZ7kRm/Jk+9JElMWX8FqN2MHQwDAYDVR0TAQH/BAIwADAL
BgNVHQ8EBAMCAwgwHQYDVR0OBBYEFAnLfJvnEUcvLXaPUDZMZlQ/zZ3WMB8GA1Ud
IwQYMBaAFD6YvLLv3DQbvnGS0qP6bbzyZkCqMBcGA1UdIAQQMA4wDAYKYIZIAWUD
AgEwMDAKBggqhkjOPQQDAwNnADBkAjARQ5LuV6yz8A5DZCll1S/gfxZ+QSJl/pKc
cTL6Sdr1IS18U/zY8VUJeB2H0nBamLwCMBRQ6sEWpNoeeR8Bonpoot/zYD2luQ1V
2jevmYsnBihKF0debgfhGvh8WIgBR69DZg==
-----END CERTIFICATE-----
]]></artwork>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to
Sean Turner,
Joe Mandel,
Mike StJohns,
Mike Ounsworth,
Carl Wallace, and
Corey Bonnell
for their constructive comments.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
