akadálymentesítes98B80341-C60D-47E9-BFD7-4DA17C4552BEarrow-sidearrow-turn-leftarrow-turn-rightarrw-up00CBA6B5-2405-4F29-B4B4-F1FD05E515CF033FE6BD-A0A4-4F1A-AC81-DF9B82281C23FFE94B6B-B7F6-48A3-AA17-001740ACC82B2BB4E896-0693-442D-AD30-DA2CA305CFAD90096E03-5C9C-4614-8A7D-C4D8050462EE01F4B6E5-7340-4665-AD74-8B0ED3D9EFC7C793A736-E30C-4449-8677-05E8D3C8B340056F4B6D-4810-4769-8695-D9430BD7EBBA5028284F-E815-4FA8-A786-5D1CAD1C972C5FC82277-5A45-4AD5-9711-BFC1EBBC78641634DA89-134B-4658-A87A-87EE25F1F4C4EC991ECD-7C35-4F3C-AB46-DA5A7964C78CDFFBB51C-EC7E-4609-B2F1-050BE53CB79758CAA304-5CD1-40EF-BFCC-1EC7C945EEDAA7CCCDEF-64AE-497C-A61B-395F4E9D3BE1DF67BE01-C728-4DF8-91E9-0FF61372A8E8384A82E6-3ABC-497F-AF28-85F35781214457514F04-613E-45A5-BDFE-C39546EA31DE9A963E8A-A779-47DF-B336-689940784A90flagF2F396C1-4FCE-467E-9E88-234B21A9E1FAC8BD8D45-BB1E-4EE6-A42C-AE03B7320F2BD51A239C-1481-4D50-A402-62285AEB5D91A733AA99-29E0-49AB-A058-3A7921307C123764FB81-2316-4694-B99D-0FBD8AA79E20E756C8BD-B809-403C-B291-34D306FAFDFC47CA210C-8002-4454-AE9D-5587B7333A13minus-icon2C204BDA-10D0-4A6D-86B2-77BBA743439D2C204BDA-10D0-4A6D-86B2-77BBA743439D912A2873-64E7-4F35-BDD1-93FD4AAE66DD3FB8C193-49B4-432F-8C44-85AF562565F3playplus-iconDA85C601-1D55-4EDF-BF24-18A21E1519C9DA85C601-1D55-4EDF-BF24-18A21E1519C9AE6E8177-A332-4595-8237-F89B399E2FE880014403-A851-46FF-B048-C9C4E8853CB4070A1479-1417-472C-9732-6C693DDFC24490BC5F2B-9829-4956-BB7A-C2E9CDDB0D77F1E26F04-F26E-460C-AF33-4A191A7AEA7669B46B56-4EB7-4C0C-9EE5-CD64502945D42C6BAFBE-9477-41EA-BE42-8057F7FE2D46C335B2AB-C1E1-4730-90C4-0070C27B039F5148F26A-308E-4DA2-B40F-3811FA79D4435148F26A-308E-4DA2-B40F-3811FA79D443

RSA sunset date

RSA sunset date

RSA sunset date

As PKI is not unified worldwide, the corresponding legislation and regulatory bodies usually differ; the same applies regarding algorithm sunset dates. For example, in the US, the main standards and guidelines have been worked out by NIST. These are often followed in other continents, but in Europe, we have other participants contributing to the security-wise standardization of algorithm usability. The basis of the European structure of this issue is developed by SOG-IS, which is an abbreviation for Senior Officials Group Information Systems Security.

This organization consists of government agencies from EFTA countries, with the original aim of the coordination of standardizing Common Criteria protection profiles, but the current structure includes working groups such as the Crypto WG, which is responsible for the creation and maintenance of the document called SOG-IS Crypto Evaluation Scheme - Agreed Cryptographic Mechanisms. This document, which is currently referred to as SOG-IS Agreed Cryptographic Mechanisms is made for the purpose of supporting Common Criteria evaluations of TOEs whose security functionalities comprise cryptographic mechanisms, but it is as well the basis of the most relevant European Technical Specification about algorithms, namely ETSI’s TS 119 312, or, as commonly called, AlgoPaper.

The Agreed Cryptographic Mechanisms document divides algorithms into two categories, namely recommended and legacy, and the AlgoPaper uses these terms in the same way, also trying to follow the recommendations of SOG-IS with slightly different sunset dates but keeping the main idea. Legacy algorithms are supported for interoperability purposes and they include RSA with a key size of more than 1900 bits, but less than 3000 bits; this is important because in hierarchical PKIs, a very common key size is 2048-bit; the World is currently not aware of any working attacks against it with sufficiently secure parameters, thus its sunset date keeps getting extended, as it has been several times.

The new version of the SOG-IS Agreed Cryptographic Mechanisms gives most legacy algorithms five more years of usability, and three for 2048-bit RSA. This is probable to be reflected in the ETSI AlgoPaper as well, so users of RSA-based certificates need not to worry for now, but as it is probable that this deadline will not be extended any longer, a good option is to migrate to ECC-based solutions that are recommended by the international community.

References:

ETSI TS 119 312 V1.3.1 (2019-02)
https://www.etsi.org/deliver/etsi_ts/119300_119399/119312/01.03.01_60/ts_119312v010301p.pdf

SOG-IS Crypto Evaluation Scheme Agreed Cryptographic Mechanisms, Version 1.2
https://www.sogis.eu/documents/cc/crypto/SOGIS-Agreed-Cryptographic-Mechanisms-1.2.pdf