0 1 2 0 1 2 3 4 0 1 2 Security model for PKI X.509 format of the certificate. DER or PEM. Number of registers to follow for the certificate User ID for the request signature User ID for this certificate Role for this certificate Format of this certificate Type of this certificate First word of this fragment Last word of this fragment Total Length of the Certificate In registers, zero padded. Length of this fragment Maximum fragment length is 80 registers Timestamp value is the number of seconds since January 1, 2000 Millisecond counter 0-999 Sequence number of request Shall be advanced for each request Signing key used 0-5 Each controller is assigned a key index that maps to their access control role Algorithm used to compute the digital signature For future proof No digital signature For test purposes only 64 bit AES signature algorithm is used 256 bit ECC signature algorithm is used