National Certification Authority of the Republic of Kazakhstan is interested in provision of information systems developer`s kits (both national and private) for further usage of registration certificates of the NCA of the RoK.
To start using NCA of the RoK registration certificates in information systems, an IS user or his/her representative should obtain an information systems developer`s kit of the NCA of the RoK containing libraries and test registration certificates. You need to do the following:
1. Send draft letter and handover and acceptnace certificate to info@pki.gov.kz to check the correctness thereof.
2. Signed, sealed letters and 2 copies of the act of acceptance and transfer (signed and sealed) are not required to be sent to JSC “National Information Technologies”, at the address: Republic of Kazakhstan, Z05H9B0, Nur-Sultan, BC “Expo”, 55/15 Mangilik El str., block C 2.3, subscriber’s mailbox for incoming letters in the lobby (office 340 room 3.16.1).
IMPORTANT!
NCA of the RoK is only responsible for the provision of systems developer`s kit of the NCA of the RoK; delivery of consultations related to officials versions of NCA of the RoK encryption provider provided in a developer`s kit and a document describing rules for digital signature and registration certificates of NCA of the RoK verification.
Information system owner is responsible for verification of signature.
For more details contact our specialists via e-mail: info@pki.gov.kz .
Should any technical issues arise, contact us via e-mail knca@pki.gov.kz.
Service name | Address | |
---|---|---|
Time stamp service | tsp.pki.gov.kz | |
The list of revoked certificates |
RSA
|
CRL (Live),
CRL (Reserve)
Delta CRL (Live), Delta CRL (Reserve) |
GOST
|
CRL (Live),
CRL (Reserve)
Delta CRL (Live), Delta CRL (Reserve) |
|
Online Certificate Status Protocol (RSA, GOST) | ocsp.pki.gov.kz |
Kalkan Crypt compliance certificate
Guidelines for information systems upon interaction with NCA of the RoK
Archival registration certificates of NCA of the RoK
Rules for verification of digital signature authenticity
Requirements to NCALayer modules development