• There are no items in your cart

BS ISO/IEC 14888-2:2008

Current

Current

The latest, up-to-date edition.

Information technology. Security techniques. Digital signatures with appendix Integer factorization based mechanisms

Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

31-10-2015

€348.24
Excluding VAT

Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 General
6 RSA and RW schemes
7 GQ1 scheme (identity-based scheme)
8 GQ2 scheme
9 GPS1 scheme
10 GPS2 scheme
11 ESIGN scheme
Annex A (normative) Object identifiers
Annex B (informative) Guidance on parameter choice
        and comparison of signature schemes
Annex C (informative) Numerical examples
Annex D (informative) Two other format mechanisms
        for RSA/RW schemes
Annex E (informative) Products allowing message
        recovery for RSA/RW verification mechanisms
Annex F (informative) Products allowing two-pass
        authentication for GQ/GPS schemes
Bibliography

Describes digital signatures with appendix whose security is based on the difficulty of factoring the modulus in use.

Committee
IST/33/2
DevelopmentNote
Supersedes 99/652300 DC. (08/2005) Supersedes 06/30108758 DC. (05/2008)
DocumentType
Standard
Pages
76
PublisherName
British Standards Institution
Status
Current
Supersedes

This part of ISO/IEC 14888 specifies digital signatures with appendix whose security is based on the difficulty of factoring the modulus in use. For each signature scheme, it specifies: the relationships and constraints between all the data elements required for signing and verifying; a signature mechanism, i.e., how to produce a signature of a message with the data elements required for signing; a verification mechanism, i.e., how to verify a signature of a message with the data elements required for verifying. The production of key pairs requires random bits and prime numbers. The production of signatures often requires random bits. Techniques for producing random bits and prime numbers are outside the scope of this part of ISO/IEC 14888. For further information, see ISO/IEC 18031 [33] and ISO/IEC 18032 [34]. Various means are available to obtain a reliable copy of the public verification key, e.g., a public key certificate. Techniques for managing keys and certificates are outside the scope of this part of ISO/IEC 14888. For further information, see ISO/IEC 9594-8 [27], ISO/IEC 11770 [31] and ISO/IEC 15945 [32].

Standards Relationship
ISO/IEC 14888-2:2008 Identical
ISO/IEC 14888-2:2008/Cor 1:2015 Identical

ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
ISO/IEC 18032:2005 Information technology Security techniques Prime number generation
ISO/IEC 9798-3:1998 Information technology Security techniques Entity authentication Part 3: Mechanisms using digital signature techniques
ISO/IEC 14888-3:2016 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
ISO/IEC 8825-1:2015 Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1:
ISO/IEC 15945:2002 Information technology — Security techniques — Specification of TTP services to support the application of digital signatures
ISO/IEC 9594-8:2017 Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks
ISO/IEC 9798-5:2009 Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques
ISO/IEC 14888-1:2008 Information technology — Security techniques — Digital signatures with appendix — Part 1: General
ISO/IEC 8824-1:2015 Information technology Abstract Syntax Notation One (ASN.1): Specification of basic notation Part 1:

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.