
ISO 14888:2008
ISO 14888:2008 Information technology – Security techniques – Digital signatures with appendix – Part 1: General
CDN $115.00
Description
There are two types of digital signature mechanism:
- When the verification process needs the message as part of the input, the mechanism is called “signature mechanism with appendix”. A hash-function is in used in the calculation of the appendix.
- When the verification process reveals all or part of the message, the mechanism is called a “signature mechanism giving message recovery”. A hash-function is also used in the generation and verification of these signatures.
ISO/IEC 14888 specifies digital signatures with appendix. ISO/IEC 14888-1:2008 specifies general principles and requirements for digital signatures with appendix. ISO/IEC 14888-2 addresses digital signatures based on integer factoring, and ISO/IEC 14888-3 addresses digital signatures based on discrete logarithm.
Signature mechanisms giving message recovery are specified in ISO/IEC 9796. Hash-functions are specified in ISO/IEC 10118.
Edition
2
Published Date
2008-04-01
Status
PUBLISHED
Pages
11
Format 
Secure PDF
Secure – PDF details
- Save your file locally or view it via a web viewer
- Viewing permissions are restricted exclusively to the purchaser
- Device limits - 3
- Printing – Enabled only to print (1) copy
See more about our Environmental Commitment
Abstract
There are two types of digital signature mechanism:
- When the verification process needs the message as part of the input, the mechanism is called "signature mechanism with appendix". A hash-function is in used in the calculation of the appendix.
- When the verification process reveals all or part of the message, the mechanism is called a "signature mechanism giving message recovery". A hash-function is also used in the generation and verification of these signatures.
ISO/IEC 14888 specifies digital signatures with appendix. ISO/IEC 14888-1:2008 specifies general principles and requirements for digital signatures with appendix. ISO/IEC 14888-2 addresses digital signatures based on integer factoring, and ISO/IEC 14888-3 addresses digital signatures based on discrete logarithm.
Signature mechanisms giving message recovery are specified in ISO/IEC 9796. Hash-functions are specified in ISO/IEC 10118.
Previous Editions
Can’t find what you are looking for?
Please contact us at:
Related Documents
-

ISO 27033:2023 Information technology – Network security – Part 7: Guidelines for network virtualization security
CDN $233.00 Add to cart -

ISO 27006:2021 Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems
CDN $115.00 Add to cart -

ISO 27554:2024 Information security, cybersecurity and privacy protection – Application of ISO 31000 for assessment of identity-related risk
CDN $173.00 Add to cart -

ISO 20009:2022 Information security – Anonymous entity authentication – Part 3: Mechanisms based on blind signatures
CDN $173.00 Add to cart







