1) signature algorithm 2) subject public key algorithm 3) subject public key value 4) thumbprint (not implemented) 5) thumbprint algorithm (not implemented) Issue number: Submitted by: Reviewed by: