BS ISO/IEC 14888-1:1998
Current
The latest, up-to-date edition.
Information technology. Security techniques. Digital signatures with appendix General
Hardcopy , PDF
English
15-04-1999
National Foreword
1. Scope
2. Normative references
3. General
4. Terms and definitions
5. Symbols, conventions, and legend for figures
5.1 Symbols
5.2 Coding convention
5.3 Legend for figures
6. General model
7. Options for binding signature mechanism and hash-function
8. Key generation process
9. Signature process
9.1 Producing pre-signature
9.2 Preparing message
9.3 Computing witness
9.4 Computing signature
10. Verification process
10.1 Preparing message
10.2 Retrieving witness
10.3 Computing verification function
10.4 Verifying witness
11. Randomized mechanisms with two-part signatures
11.1 Computing signature
11.1.1 Computing for the first part of the
signature
11.1.2 Computing assignment
11.1.3 Computing the second part of the signature
11.2 Computing verification function
11.2.1 Retrieving assignment
11.2.2 Recomputing pre-signature
11.2.3 Retrieving assignment
11.2.4 Recomputing pre-signature
11.2.5 Recomputing witness
Gives several digital signature mechanisms with appendix for messages of arbitrary length. Contains principles and requirements in general, for digital signatures with appendix. Also, gives definitions and symbols that are common to all parts of ISO/IEC 14888.
Committee |
IST/33
|
DevelopmentNote |
Supersedes 98/652307 DC. (05/2005) Supersedes 06/30108755 DC. (05/2008)
|
DocumentType |
Standard
|
Pages |
20
|
PublisherName |
British Standards Institution
|
Status |
Current
|
SupersededBy | |
Supersedes |
Standards | Relationship |
ISO/IEC 14888-1:2008 | Identical |
ISO/IEC 10118-4:1998 | Information technology Security techniques Hash-functions Part 4: Hash-functions using modular arithmetic |
ISO/IEC 15945:2002 | Information technology — Security techniques — Specification of TTP services to support the application of digital signatures |
ISO/IEC 9594-8:2017 | Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks |
ISO/IEC 10118-1:2016 | Information technology Security techniques Hash-functions Part 1: General |
ISO/IEC 10118-3:2004 | Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions |
ISO/IEC 10118-2:2010 | Information technology Security techniques Hash-functions Part 2: Hash-functions using an n-bit block cipher |
ISO/IEC 9796:1991 | Information technology Security techniques Digital signature scheme giving message recovery |
ISO/IEC 11770-3:2015 | Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.