Public Key Cryptography Standards (PKCS) are a group of public-key cryptography intervendor standards first developed by RSA Security, with involvement from Apple, Digital, Lotus Software, Microsoft, MIT, Nothern Telecom, and Sun Microsystems, first published in June 1991.[1]
The PKCS series of standards began development internally at RSA Laboratories in March 1991 with the “broad design goals” of maintaining compatibility with existing Privacy-Enhanced Mail (PEM) protocol certificates, allow handling of arbitrary data, adding richer information in certificate attributes, supporting Diffie-Hellman key exchange, and creating protocols to be some day incorporated into International Telecommunication Union X.200 standards by basing it on existing ITU-T standards such as ASN.1 and BER. [2] PKCS then taken by RSA to the US National Institute of Standards and Technology‘s Open Systems Interconnection Workshop, an organization created in 1983 by NIST at the request of industry to provide a forum for industry co-operation in computer interconnection protocols. Development of the PKCS protocols was undertaken in the 1991 sessions of the OSI Workshop under the Security Special Interest Group chaired by Trusted Information Systems. However, PKCS did not appear in the final OSI Workshop yearly publication [3] [4] and was instead published as an OSI working document, the first publicly available version of the protocols.[2] Though not industry standards because the company retained control over them, some of the standards have moved into the “standards track” processes of relevant standards organizations since May 1997,[5] such as the IETF and the PKIX working group.
Key Updates (2023–2025):
- Integration of PKCS #7 and PKCS #12 into broader standards like S/MIME and TLS.
- Evolution of PKCS #11 to support newer hardware and cloud services; support for NIST’s ML-DSA and ML-KEM.
- Involvement of PKCS standards in post-quantum cryptography efforts, with NIST’s ongoing standardization.
- Growing adoption of PKCS standards in the context of blockchain and digital assets.
| Version | Name | Comments | |
|---|---|---|---|
| PKCS #1 | 2.2 | RSA Cryptography Standard[6] | See RFC 8017. Defines the mathematical properties and format of RSA public and private keys (ASN.1-encoded in clear-text), and the basic algorithms and encoding/padding schemes for performing RSA encryption, decryption, and producing and verifying signatures. |
| PKCS #2 | – | Withdrawn | No longer active. Covered RSA encryption of message digests; subsequently merged into PKCS #1 by PKCS#1 v1.5 in 1993. |
| PKCS #3 | 1.4 | Diffie–Hellman Key Agreement Standard[7] | A cryptographic protocol that allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel. |
| PKCS #4 | – | Withdrawn | No longer active. Covered RSA key syntax; subsequently merged into PKCS #1 by PKCS#1 v1.5 in 1993. |
| PKCS #5 | 2.1 | Password-based Encryption Standard[8][9] | See RFC 8018 and PBKDF2. |
| PKCS #6 | 1.5 | Extended-Certificate Syntax Standard[10] | Defines extensions to the old v1 X.509 certificate specification. Obsoleted by v3 of the same. |
| PKCS #7 | 1.5 | Cryptographic Message Syntax Standard[11] | See RFC 2315. Used to sign and/or encrypt messages under a PKI. Used also for certificate dissemination (for instance as a response to a PKCS #10 message). Formed the basis for S/MIME, which is as of 2010 based on RFC 5652, an updated Cryptographic Message Syntax Standard (CMS). Often used for single sign-on. |
| PKCS #8 | 2.0 | Private-Key Information Syntax Standard[12] | See RFC 5958. Used to carry private and public keys (encrypted or unencrypted). |
| PKCS #9 | 2.0 | Selected Attribute Types[13] | See RFC 2985. Defines selected attribute types for use in PKCS #6 extended certificates, PKCS #7 digitally signed messages, PKCS #8 private-key information, and PKCS #10 certificate-signing requests. |
| PKCS #10 | 1.7 | Certification Request Standard[14] | See RFC 2986. Format of messages sent to a certification authority to request certification of a public key. See certificate signing request. |
| PKCS #11 | 3.2 | Cryptographic Token Interface[15] | Also known as “Cryptoki”. An API defining a generic interface to cryptographic tokens (see also hardware security module). Often used in single sign-on, public-key cryptography and disk encryption[16] systems. RSA Security has turned over further development of the PKCS #11 standard to the OASIS PKCS 11 Technical Committee. |
| PKCS #12 | 1.1 | Personal Information Exchange Syntax Standard[17] | See RFC 7292. Defines a file format commonly used to store private keys with accompanying public key certificates, protected with a password-based symmetric key. PFX is a predecessor to PKCS #12.
This container format can contain multiple embedded objects, such as multiple certificates. Usually protected/encrypted with a password. Usable as a format for the Java KeyStore and to establish client authentication certificates in Mozilla Firefox. Usable by Apache Tomcat. |
| PKCS #13 | – | Elliptic-curve cryptography Standard | (Apparently abandoned, only reference is a proposal from 1998.) |
| PKCS #14 | – | Pseudo-random Number Generation | (Apparently abandoned, no documents exist.) |
| PKCS #15 | 1.1 | Cryptographic Token Information Format Standard[18] | Defines a standard allowing users of cryptographic tokens to identify themselves to applications, independent of the application’s Cryptoki implementation (PKCS #11) or other API. RSA has relinquished IC-card-related parts of this standard to ISO/IEC 7816-15.[19] |
See also
References
- ^ “PKCS”. rsa.com. RSA Laboratories. Archived from the original on June 7, 1997. Retrieved February 24, 2026.
- ^ a b Kaliski Jr., Burton S. (November 1, 1993). “An Overview of the PKCS Standards”. rsa.com. RSA Laboratories. Archived from the original on July 28, 1997. Retrieved March 25, 2026.
- ^ Boland, Tim (December 1991). Stable Implementation Agreements for Open Systems Interconnection Protocols Version 5 Edition 1 (PDF). Gaithersburg, MD: United States Department of Commerce, Technology Administration, National Institute of Standards and Technology. Retrieved March 25, 2026.
- ^ Boland, Tim (December 1991). Stable Implementation Agreements for Open Systems Interconnection Protocols Version 5 Edition 1 [Part 2] (PDF). Gaithersburg, MD: United States Department of Commerce, Technology Administration, National Institute of Standards and Technology. Retrieved March 26, 2026.
- ^ “PKCS #1: RSA Encryption Version 1.5”. ietf.org. IETF. Retrieved February 24, 2026.
- ^ “PKCS #1: RSA Cryptography Standard”. RSA Laboratories.
- ^ “PKCS #3: Diffie-Hellman Key Agreement Standard”. RSA Laboratories.
- ^ “PKCS #5: Password-Based Cryptography Standard”. RSA Laboratories. Archived from the original on April 7, 2015.
- ^ “PKCS #5 v2.0: Password-Based Cryptography Standard” (PDF). RSA Laboratories. March 25, 1999. Retrieved May 30, 2024.
- ^ “PKCS #6: Extended-Certificate Syntax Standard”. RSA Laboratories.
- ^ “PKCS #7: Cryptographic Message Syntax Standard”. RSA Laboratories.
- ^ “PKCS #8: Private-Key Information Syntax Standard”. RSA Laboratories.
- ^ “PKCS #9: Selected Attribute Types”. RSA Laboratories.
- ^ “PKCS #10: Certification Request Syntax Standard”. RSA Laboratories.
- ^ “PKCS #11: Cryptographic Token Interface Standard”. RSA Laboratories.
- ^ Security Token/Smartcard Support in FreeOTFE
- ^ “PKCS #12: Personal Information Exchange Syntax Standard”. RSA Laboratories. Archived from the original on April 1, 2014.
- ^ “PKCS #15: Cryptographic Token Information Format Standard”. RSA Laboratories.
- ^ RSA Laboratories: “PKCS #15: Cryptographic Token Information Format Standard“.
- General
- Jean-Sébastien Coron, Marc Joye, David Naccache, and Pascal Paillier (2000). “New Attacks on PKCS #1 v1.5 Encryption” (PDF). EUROCRYPT. pp. 369–381.
{{cite web}}: CS1 maint: multiple names: authors list (link)
External links
- About PKCS (appendix G from RFC 3447)
- OASIS PKCS 11 TC (technical committee home page)
- An Overview of the PKCS Standards: An RSA Laboratories Technical Note, November 1993