UNLIMITED FREE ACCESS TO THE WORLD'S BEST IDEAS

close

ISO/IEC 14888-3

IT Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms

active, Most Current
Buy Now
Organization: ISO
Publication Date: 1 November 2018
Status: active
Page Count: 166
ICS Code (IT Security): 35.030
scope:

This document specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem. This document provides

- a general description of a digital signature with appendix mechanism, and

- a variety of mechanisms that provide digital signatures with appendix. For each mechanism, this document specifies

- the process of generating a pair of keys,

- the process of producing signatures, and

- the process of verifying signatures.

Annex A defines object identifiers assigned to the digital signature mechanisms specified in this document, and defines algorithm parameter structures.

Annex B defines conversion functions of FE2I, I2FE, FE2BS, BS2I, I2BS, I2OS and OS2I used in this document.

 Annex D defines how to generate DSA domain parameters.

Document History

ISO/IEC 14888-3
November 1, 2018
IT Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms
This document specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem. This document provides — a general description of a digital signature...
March 15, 2016
Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms
This part of ISO/IEC 14888 specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem. This part of ISO/IEC 14888 provides — a general...
March 15, 2016
Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms
This part of ISO/IEC 14888 specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem. This part of ISO/IEC 14888 provides — a general...
July 1, 2012
Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms AMENDMENT 2: Optimizing hash inputs
A description is not available for this item.
June 15, 2010
Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms AMENDMENT 1: Elliptic Curve Russian Digital Signature Algorithm, Schnorr Digital Signature Algorithm, Elliptic Curve Schnorr Digital Signature Algorithm, and Elliptic Curve Full Schnorr Digital Signature Algorithm
A description is not available for this item.
February 15, 2009
Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms TECHNICAL CORRIGENDUM 2
A description is not available for this item.
September 1, 2007
Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms TECHNICAL CORRIGENDUM 1
A description is not available for this item.
November 15, 2006
Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms
A description is not available for this item.
December 15, 1998
Information Technology - Security Techniques - Digital Signatures with Appendix - Part 3: Certificate-Based Mechanisms
A description is not available for this item.
December 15, 1998
Information Technology - Security Techniques - Digital Signatures with Appendix - Part 3: Certificate-Based Mechanisms
A description is not available for this item.

References

Advertisement