RSA, DSA and EC Keys

For creating certificates, keys are needed. All keys are stored encrypted in the database using the PKCS#8 AES algorithm. The password can be changed for each key.

The password type means:

common:

The database password provided during database load.

private:

The key is encrypted with an individual passphrase, which is not stored by XCA. This can be set and reset via the context menu of the key.

PIN:

Security tokens are usually protected by a PIN.

No password:

Public keys don’t need a password.

All keys carry a use counter which counts the times it is used in requests or certificates. When creating new requests or certificates the list of available keys is reduced to the keys with a use counter of 0. This can be overridden by the check-box next to the key list. Keys should never be used multiple times.

When importing an EC key with explicit curve parameters, the corresponding curve OID is searched and set if found.

  • Private Key columns

    • Type One of RSA, DSA, EC, ED25519.

    • Size Key size in bits.

    • EC Group Curve name of the EC key.

    • Use Number of certificates and requests in the database using this key. For new certificates and requests only unused or newly generated keys should be used.

    • Password Protection of the key. See RSA, DSA and EC Keys

Generating Keys

The dialog asks for the internal name of the key and the key-size in bits. For EC keys, a list of curves is shown. It contains all X9.62 curves and many others. For ED25519 keys no further information is required.

Even if the size drop-down list only shows the most usual key sizes, any other size may be set here by editing this box. While searching for random prime numbers a progress bar is shown in the bottom of the base application. After the key generation is done the key will be stored in the database.

When checking the Remember as default box, the settings (Key-type, key-size or EC curve) will be remembered and preset for the next key generation dialog. This option is not available when generating keys on ‘ref’token.

For every connected token providing the Key-Generate facility, an entry in the drop-down menu of the key-types will be shown. It contains the name of the token and the valid key-sizes.

In case of EC keys generated on a token, the list of possible curves is restricted based on informations provided by the token (Key size and FP/F2M). The token may support even less ECParameters / OIDs. When selecting an unsupported EC curve an error will occur. Please consult the documentation of the provider of the PKCS#11 library.

Key Export

Keys can be exported by either selecting the key and pressing Export or by using the context-menu. It may be chosen to export the key to the clipboard as PEM public, SSH2 public or unencrypted PEM private format. In case of a file export a dialog-box opens where next to the filename one of the following formats may be selected:

  • PEM public: the public part of the key in PEM format

  • DER public: the public part of the key in DER format

  • SSH2 public: the public part of the key in SSH2 format

  • PEM private: the private key unencrypt in PEM format

  • PKCS#8 encrypted: the encrypted private key in PKCS#8 format

  • DER private: the private key in binary DER format

  • PEM encrypted: the private key in PEM format with an OpenSSL specific extensions for encryption

  • PKCS#8 unencrypted: the private key unencrypted in PKCS#8 format

  • SSH2 private: the private key unencrypted in SSH2 format

The filename is the internal name plus a pem, der, pk8, pub or priv suffix. When changing the file-format, the suffix of the filename changes accordingly. Only PKCS#8 or PEM files can be encrypted, because the DER format (although it could be encrypted) does not support a way to supply the encryption algorithm like e.g. DES. Of course, encryption does not make sense if the private part is not exported.

When exporting the key via SQL from the database, see Extracting items openssl asks for the password, which is either the database password or its own password in case the password type is private.