• BS ISO/IEC 14888-1:1998

    Current The latest, up-to-date edition.

    Information technology. Security techniques. Digital signatures with appendix General

    Available format(s):  Hardcopy, PDF

    Language(s):  English

    Published date:  15-04-1999

    Publisher:  British Standards Institution

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    National Foreword
    1. Scope
    2. Normative references
    3. General
    4. Terms and definitions
    5. Symbols, conventions, and legend for figures
        5.1 Symbols
        5.2 Coding convention
        5.3 Legend for figures
    6. General model
    7. Options for binding signature mechanism and hash-function
    8. Key generation process
    9. Signature process
        9.1 Producing pre-signature
        9.2 Preparing message
        9.3 Computing witness
        9.4 Computing signature
    10. Verification process
        10.1 Preparing message
        10.2 Retrieving witness
        10.3 Computing verification function
        10.4 Verifying witness
    11. Randomized mechanisms with two-part signatures
        11.1 Computing signature
              11.1.1 Computing for the first part of the
                      signature
              11.1.2 Computing assignment
              11.1.3 Computing the second part of the signature
        11.2 Computing verification function
              11.2.1 Retrieving assignment
              11.2.2 Recomputing pre-signature
              11.2.3 Retrieving assignment
              11.2.4 Recomputing pre-signature
              11.2.5 Recomputing witness

    Abstract - (Show below) - (Hide below)

    Gives several digital signature mechanisms with appendix for messages of arbitrary length. Contains principles and requirements in general, for digital signatures with appendix. Also, gives definitions and symbols that are common to all parts of ISO/IEC 14888.

    General Product Information - (Show below) - (Hide below)

    Committee IST/33
    Development Note Supersedes 98/652307 DC. (05/2005) Supersedes 06/30108755 DC. (05/2008)
    Document Type Standard
    Publisher British Standards Institution
    Status Current
    Superseded By
    Supersedes

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 10118-4:1998 Information technology Security techniques Hash-functions Part 4: Hash-functions using modular arithmetic
    ISO/IEC 15945:2002 Information technology — Security techniques — Specification of TTP services to support the application of digital signatures
    ISO/IEC 9594-8:2017 Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks
    ISO/IEC 10118-1:2016 Information technology Security techniques Hash-functions Part 1: General
    ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
    ISO/IEC 10118-2:2010 Information technology Security techniques Hash-functions Part 2: Hash-functions using an n-bit block cipher
    ISO/IEC 9796:1991 Information technology Security techniques Digital signature scheme giving message recovery
    ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective