UNLIMITED FREE ACCESS TO THE WORLD'S BEST IDEAS

close

CSA ISO/IEC 14888-3:19

IT Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms

active, Most Current
Organization: CSA
Publication Date: 1 January 2019
Status: active
Page Count: 176
ICS Code (IT Security): 35.030
scope:

This document specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem.

This document provides

- a general description of a digital signature with appendix mechanism, and

- a variety of mechanisms that provide digital signatures with appendix.

For each mechanism, this document specifies

- the process of generating a pair of keys,

- the process of producing signatures, and

- the process of verifying signatures.

Annex A defines object identifiers assigned to the digital signature mechanisms specified in this document, and defines algorithm parameter structures.

Annex B defines conversion functions of FE2I, I2FE, FE2BS, BS2I, I2BS, I2OS and OS2I used in this document.

Annex D defines how to generate DSA domain parameters.

Document History

CSA ISO/IEC 14888-3:19
January 1, 2019
IT Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
This document specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem. This document provides — a general description of a digital signature...
January 1, 2018
Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms
This part of ISO/IEC 14888 specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem. This part of ISO/IEC 14888 provides — a general...
Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms AMENDMENT 2: Optimizing hash inputs
Foreword ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) form the specialized system for worldwide standardization. National bodies...
January 1, 2013
Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms AMENDMENT 2: Optimizing hash inputs
Foreword ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) form the specialized system for worldwide standardization. National bodies...
Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms - AMENDMENT 1: Elliptic Curve Russian Digital Signature Algorithm, Schnorr Digital Signature Algorithm, Elliptic Curve Schnorr Digital Signature Algorithm, and Elliptic Curve Full Schnorr Digital Signature Algorithm
Foreword ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) form the specialized system for worldwide standardization. National bodies...
Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms - AMENDMENT 1: Elliptic Curve Russian Digital Signature Algorithm, Schnorr Digital Signature Algorithm, Elliptic Curve Schnorr Digital Signature Algorithm, and Elliptic Curve Full Schnorr Digital Signature Algorithm
Foreword ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) form the specialized system for worldwide standardization. National bodies...
November 1, 2007
Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
This part of ISO/IEC 14888 specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem. This part of ISO/IEC 14888 provides - a general description...
November 1, 2007
Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms
This part of ISO/IEC 14888 specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem. This part of ISO/IEC 14888 provides - a general description...
November 1, 2007
Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
This part of ISO/IEC 14888 specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem. This part of ISO/IEC 14888 provides - a general description...
January 1, 2007
Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms
This part of ISO/IEC 14888 specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem. This part of ISO/IEC 14888 provides - a general description...

References

Advertisement