CSA ISO/IEC 15946-4
Information technology Security techniques Cryptographic techniques based on elliptic curves Part 4: Digital signatures giving message recovery
|Publication Date:||1 October 2005|
|ICS Code (Information coding):||35.040|
ISO/IEC 15946 specifies public-key cryptographic techniques based on elliptic curves. These techniques include methods for the establishment of keys for symmetric cryptographic techniques, and digital signature mechanisms.
The scope of this part of ISO/IEC 15946 is restricted to cryptographic techniques based on elliptic curves defined over finite fields (including the special cases of prime order and characteristic two). The representation of elements of the underlying finite field (i.e. which basis is used) is outside the scope of this part of ISO/IEC 15946.
This part of ISO/IEC 15946 specifies five different mechanisms for digital signatures giving message recovery. The mathematical background and general techniques necessary for implementing the mechanisms are described in ISO/IEC 15946-1.
Digital signature mechanisms can be divided into the following two categories.
- When the whole message has to be stored and/or transmitted with the signature, the mechanism is named a 'signature mechanism with appendix'.
- When the whole message, or part of it, can be recovered from the signature, the mechanism is named a 'signature mechanism giving message recovery'. The mechanisms specified in this part of ISO/IEC 15946 fall into the second category, i.e. they give either total or partial message recovery. [For elliptic curve based digital signature schemes with appendix, see ISO/IEC 15946-2.]
NOTE In applications where a combination of algorithms is used to provide security services or when an algorithm is parameterised by the choice of a combination of other algorithms such a combination may be specified as a sequence of object identifiers assigned to these algorithms or by including the object identifiers of lower layer algorithms in the parameters field of the algorithm identifier structure specifying higher layer algorithms (for example by specifying the object identifier of a hash function as a parameter in the algorithm identifier structure of a signature scheme). The algorithm identifier structure is defined in ISO/IEC 9594-8.
NOTE The encoding of object identifiers is application dependent.