|  | 
|  | 1 | +Key Management | 
|  | 2 | +============== | 
|  | 3 | + | 
|  | 4 | +Key Slots | 
|  | 5 | +--------- | 
|  | 6 | + | 
|  | 7 | +The PIV application can hold certificates for different purposes. | 
|  | 8 | +For each purpose the private key and its corresponding certificate are stored in a key slot. | 
|  | 9 | + | 
|  | 10 | ++-------+------------------------+-------------------------------------------------------+ | 
|  | 11 | +| Slot  | Application            | Description                                           | | 
|  | 12 | ++=======+========================+=======================================================+ | 
|  | 13 | +| 82-95 | Retired Key Management | The private keys and certificates in these slots were | | 
|  | 14 | +|       |                        | used for key management applications and are still    | | 
|  | 15 | +|       |                        | there to provide backward compatibility.              | | 
|  | 16 | ++-------+------------------------+-------------------------------------------------------+ | 
|  | 17 | +| 9a    | Authentication         | The private key and certificate in this slot          | | 
|  | 18 | +|       |                        | are used to authenticate the cardholder.              | | 
|  | 19 | ++-------+------------------------+-------------------------------------------------------+ | 
|  | 20 | +| 9c    | Signature              | The private key and certificate in this slot          | | 
|  | 21 | +|       |                        | are used to sign emails and files.                    | | 
|  | 22 | ++-------+------------------------+-------------------------------------------------------+ | 
|  | 23 | +| 9d    | Key Management         | The private key and certificate in this slot          | | 
|  | 24 | +|       |                        | are used to encrypt emails and files.                 | | 
|  | 25 | ++-------+------------------------+-------------------------------------------------------+ | 
|  | 26 | +| 9e    | Card Authentication    | The private key and certificate in this slot          | | 
|  | 27 | +|       |                        | are used for physical operations, such as building    | | 
|  | 28 | +|       |                        | access or time recording. Support from the respective | | 
|  | 29 | +|       |                        | system is a prerequisite.                             | | 
|  | 30 | ++-------+------------------------+-------------------------------------------------------+ | 
|  | 31 | + | 
|  | 32 | +Algorithms | 
|  | 33 | +---------- | 
|  | 34 | + | 
|  | 35 | +The PIV application uses asymmetric and symmetric algorithms. | 
|  | 36 | +The asymmetric algorithms are used for the user private keys and the symmetric algorithms for the management key. | 
|  | 37 | + | 
|  | 38 | +Supported asymmetric key algorithms: | 
|  | 39 | + | 
|  | 40 | +* RSA 2048 | 
|  | 41 | +* nistp256 | 
|  | 42 | + | 
|  | 43 | +Supported symmetric key algorithms: | 
|  | 44 | + | 
|  | 45 | +* AES 256 | 
|  | 46 | +* 3DES (TDES) | 
|  | 47 | + | 
|  | 48 | +.. warning:: | 
|  | 49 | +   It is not recommended to use the 3DES (TDES) algorithm. | 
|  | 50 | + | 
|  | 51 | +Generate Key | 
|  | 52 | +------------ | 
|  | 53 | + | 
|  | 54 | +The PIV application can generate a new private key on the Nitrokey. | 
|  | 55 | + | 
|  | 56 | +The command below will create private key in key slot ``9a `` for the user with the subject name ``John Doe `` and subject alternative name ``[email protected] ``. | 
|  | 57 | + | 
|  | 58 | +.. code-block:: | 
|  | 59 | +
 | 
|  | 60 | +   nitropy nk3 piv generate-key --key-slot 9a --subject-name "John Doe" --subject-alt-name-upn "[email protected]" | 
0 commit comments