• Shopping Cart
    There are no items in your cart

BS ISO/IEC 14888-1:1998

Current

Current

The latest, up-to-date edition.

Information technology. Security techniques. Digital signatures with appendix General

Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

15-04-1999

€165.94
Excluding VAT

National Foreword
1. Scope
2. Normative references
3. General
4. Terms and definitions
5. Symbols, conventions, and legend for figures
    5.1 Symbols
    5.2 Coding convention
    5.3 Legend for figures
6. General model
7. Options for binding signature mechanism and hash-function
8. Key generation process
9. Signature process
    9.1 Producing pre-signature
    9.2 Preparing message
    9.3 Computing witness
    9.4 Computing signature
10. Verification process
    10.1 Preparing message
    10.2 Retrieving witness
    10.3 Computing verification function
    10.4 Verifying witness
11. Randomized mechanisms with two-part signatures
    11.1 Computing signature
          11.1.1 Computing for the first part of the
                  signature
          11.1.2 Computing assignment
          11.1.3 Computing the second part of the signature
    11.2 Computing verification function
          11.2.1 Retrieving assignment
          11.2.2 Recomputing pre-signature
          11.2.3 Retrieving assignment
          11.2.4 Recomputing pre-signature
          11.2.5 Recomputing witness

Gives several digital signature mechanisms with appendix for messages of arbitrary length. Contains principles and requirements in general, for digital signatures with appendix. Also, gives definitions and symbols that are common to all parts of ISO/IEC 14888.

Committee
IST/33
DevelopmentNote
Supersedes 98/652307 DC. (05/2005) Supersedes 06/30108755 DC. (05/2008)
DocumentType
Standard
Pages
20
PublisherName
British Standards Institution
Status
Current
SupersededBy
Supersedes

Standards Relationship
ISO/IEC 14888-1:2008 Identical

ISO/IEC 10118-4:1998 Information technology Security techniques Hash-functions Part 4: Hash-functions using modular arithmetic
ISO/IEC 15945:2002 Information technology — Security techniques — Specification of TTP services to support the application of digital signatures
ISO/IEC 9594-8:2017 Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks
ISO/IEC 10118-1:2016 Information technology Security techniques Hash-functions Part 1: General
ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
ISO/IEC 10118-2:2010 Information technology Security techniques Hash-functions Part 2: Hash-functions using an n-bit block cipher
ISO/IEC 9796:1991 Information technology Security techniques Digital signature scheme giving message recovery
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.