UNLIMITED FREE ACCESS TO THE WORLD'S BEST IDEAS

close
Already an Engineering360 user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your Engineering360 Experience

close
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

CSA ISO/IEC 14888-2

Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms

active, Most Current
Buy Now
Organization: CSA
Publication Date: 1 January 2009
Status: active
Page Count: 90
ICS Code (Information coding): 35.040
scope:

This part of ISO/IEC 14888 specifies digital signatures with appendix whose security is based on the difficulty of factoring the modulus in use. For each signature scheme, it specifies:

a) the relationships and constraints between all the data elements required for signing and verifying;

b) a signature mechanism, i.e., how to produce a signature of a message with the data elements required for signing;

c) a verification mechanism, i.e., how to verify a signature of a message with the data elements required for verifying.

The production of key pairs requires random bits and prime numbers. The production of signatures often requires random bits. Techniques for producing random bits and prime numbers are outside the scope of this part of ISO/IEC 14888. For further information, see ISO/IEC 18031 [33] and ISO/IEC 18032 [34].

Various means are available to obtain a reliable copy of the public verification key, e.g., a public key certificate. Techniques for managing keys and certificates are outside the scope of this part of ISO/IEC 14888. For further information, see ISO/IEC 9594-8 [27], ISO/IEC 11770 [31] and ISO/IEC 15945 [32].

Document History

October 1, 2009
Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms
This part of ISO/IEC 14888 specifies digital signatures with appendix whose security is based on the difficulty of factoring the modulus in use. For each signature scheme, it specifies: a) the...
CSA ISO/IEC 14888-2
January 1, 2009
Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms
This part of ISO/IEC 14888 specifies digital signatures with appendix whose security is based on the difficulty of factoring the modulus in use. For each signature scheme, it specifies: a) the...
January 1, 2009
Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
This part of ISO/IEC 14888 specifies digital signatures with appendix whose security is based on the difficulty of factoring the modulus in use. For each signature scheme, it specifies: a) the...
March 1, 2002
Information Technology Security Techniques Digital Signatures with Appendix Part 2: Identity-Based Mechanisms
ISO/IEC 14888 specifies a variety of digital signature mechanisms with appendix for messages of arbitrary length and is applicable in schemes providing entity authentication, data origin...
March 1, 2002
Information Technology Security Techniques Digital Signatures with Appendix Part 2: Identity-Based Mechanisms
ISO/IEC 14888 specifies a variety of digital signature mechanisms with appendix for messages of arbitrary length and is applicable in schemes providing entity authentication, data origin...

References

Advertisement