Software and technical complex “Center of key certification according to ICAO”

Software and technical complex “Certification Authority ICAO»  implements mechanisms for key generation, creation and verification of digital signatures, the formation and further maintenance of public key certificates (distribution, cancellation, storing, blocking and renewal), providing information about actions canceled and blocked public key certificate fixing the time and services to ensure that procedures for the issuance and control of the circulation of electronic biometric passports.

CA implements the following cryptographic algorithms and protocols:

For the purpose of application and verify digital signatures:

  • RSA, some IETF RFC 3447 (it should be used hashing algorithms SHA-1, SHA-256 in accordance with sections 9, 10 DSTU ISO / IEC 10118-3: 2005, respectively);
  • ECDSA, a specific State Standard ISO / IEC 14888-3: 2014 (this should be used hashing algorithms SHA-1, SHA 256 under section 9, 10 DSTU ISO / IEC 10118-3: 2005, respectively);

To generate a pseudo-random sequences and key data – algorithm in a separate procedure agreed with the Administration of State Special Communication Service.

CA enables the use of the following key data:

  • The key pairs (private, public key) digital signature (for generating certificates and certificate revocation lists) for algorithms RSA (4096 bit) and ECDSA (224 bits in length);
  • The key pairs (private, public key) digital signature (for use in determining the status of the certificates) for the algorithms RSA (4096 bit) and ECDSA (224 bits in length);
  • The key pairs (private, public key) digital signature (to generate time stamps) for algorithms RSA (length 4096 bits) and ECDSA (224 bits in length);
  • The key pairs (private, public key) officials serving PTC CSK;
  • The key pairs (private, public key) for the digital signature algorithms RSA (1024 bits in length) and ECDSA (length of 224 bits).

Software of CA intended for cryptographic protection of information with restricted access (except for service information and information constituting a state secret) and public information, the need for protection which is defined by law.