UNLIMITED FREE ACCESS TO THE WORLD'S BEST IDEAS

close

ISO/IEC 9796-2

Information technology - Security techniques - Digital signature schemes giving message recovery - Part 2: Integer factorization based mechanisms

active, Most Current
Buy Now
Organization: ISO
Publication Date: 15 December 2010
Status: active
Page Count: 64
ICS Code (Information coding): 35.040
scope:

This part of ISO/IEC 9796 specifies three digital signature schemes giving message recovery, two of which are deterministic (non-randomized) and one of which is randomized. The security of all three schemes is based on the difficulty of factorizing large numbers. All three schemes can provide either total or partial message recovery.

This part of ISO/IEC 9796 specifies the method for key production for the three signature schemes. However, techniques for key management and for random number generation (as required for the randomized signature scheme) are outside the scope of this part of ISO/IEC 9796.

The first mechanism specified in this part of ISO/IEC 9796 is only applicable for existing implementations, and is retained for reasons of backward compatibility.

Document History

ISO/IEC 9796-2
December 15, 2010
Information technology - Security techniques - Digital signature schemes giving message recovery - Part 2: Integer factorization based mechanisms
This part of ISO/IEC 9796 specifies three digital signature schemes giving message recovery, two of which are deterministic (non-randomized) and one of which is randomized. The security of all three...
January 15, 2008
Information technology - Security techniques - Digital signature schemes giving message recovery - Part 2: Integer factorization based mechanisms AMENDMENT 1
A description is not available for this item.
October 1, 2002
Information Technology - Security Techniques - Digital Signature Schemes Giving Message Recovery - Part 2: Integer Factorization Based Mechanisms
A description is not available for this item.
September 1, 1997
Information Technology - Security Techniques - Digital Signature Schemes Giving Message Recovery - Part 2: Mechanisms Using a Hash-Function
A description is not available for this item.

References

Advertisement