
ISO 14888:2018
ISO 14888:2018 IT Security techniques – Digital signatures with appendix – Part 3: Discrete logarithm based mechanisms
CDN $390.00
Description
This document specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem.
This document provides
– a general description of a digital signature with appendix mechanism, and
– a variety of mechanisms that provide digital signatures with appendix.
For each mechanism, this document specifies
– the process of generating a pair of keys,
– the process of producing signatures, and
– the process of verifying signatures.
Annex A defines object identifiers assigned to the digital signature mechanisms specified in this document, and defines algorithm parameter structures.
Annex B defines conversion functions of FE2I, I2FE, FE2BS, BS2I, I2BS, I2OS and OS2I used in this document.
Annex D defines how to generate DSA domain parameters.
Edition
4
Published Date
2018-11-12
Status
PUBLISHED
Pages
155
Format 
Secure PDF
Secure – PDF details
- Save your file locally or view it via a web viewer
- Viewing permissions are restricted exclusively to the purchaser
- Device limits - 3
- Printing – Enabled only to print (1) copy
See more about our Environmental Commitment
Abstract
This document specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem.
This document provides
- a general description of a digital signature with appendix mechanism, and
- a variety of mechanisms that provide digital signatures with appendix.
For each mechanism, this document specifies
- the process of generating a pair of keys,
- the process of producing signatures, and
- the process of verifying signatures.
Annex A defines object identifiers assigned to the digital signature mechanisms specified in this document, and defines algorithm parameter structures.
Annex B defines conversion functions of FE2I, I2FE, FE2BS, BS2I, I2BS, I2OS and OS2I used in this document.
Annex D defines how to generate DSA domain parameters.
Previous Editions
Can’t find what you are looking for?
Please contact us at:
Related Documents
-

ISO 27001:2022 Information security, cybersecurity and privacy protection – Information security management systems – Requirements
CDN $285.00 Add to cart -

ISO 21177:2024 Intelligent transport systems – ITS station security services for secure session establishment and authentication between trusted devices
CDN $390.00 Add to cart -

ISO 27003:2017 Information technology – Security techniques – Information security management systems – Guidance
CDN $360.00 Add to cart -

ISO 27557:2022 Information security, cybersecurity and privacy protection – Application of ISO 31000:2018 for organizational privacy risk management
CDN $233.00 Add to cart







