• BS ISO/IEC 29150:2011

    Current The latest, up-to-date edition.

    Information technology. Security techniques. Signcryption

    Available format(s):  Hardcopy, PDF

    Language(s):  English

    Published date:  30-04-2014

    Publisher:  British Standards Institution

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Introduction
    1 Scope
    2 Normative references
    3 Terms and definitions
    4 Symbols and notations
    5 Finite fields and elliptic curves
    6 Conversion functions
    7 Cryptographic transformations
    8 General model for signcryption
    9 Discrete logarithm based signcryption mechanism (DLSC)
    10 Elliptic curve based signcryption mechanism (ECDLSC)
    11 Integer factorization based signcryption mechanism (IFSC)
    12 Encrypt-then-sign-based mechanism (EtS)
    Annex A (normative) - Object identifiers
    Annex B (informative) - Security considerations
    Annex C (informative) - Guidance on use of the mechanisms
    Annex D (informative) - Examples
    Bibliography

    Abstract - (Show below) - (Hide below)

    Describes four mechanisms for signcryption that employ public key cryptographic techniques requiring both the originator and the recipient of protected data to have their own public and private key pairs.

    General Product Information - (Show below) - (Hide below)

    Committee IST/33/2
    Development Note Supersedes 10/30192164 DC. (01/2012)
    Document Type Standard
    Publisher British Standards Institution
    Status Current
    Supersedes

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 19772:2009 Information technology Security techniques Authenticated encryption
    ISO/IEC 18033-1:2015 Information technology Security techniques Encryption algorithms Part 1: General
    ISO/IEC 18032:2005 Information technology Security techniques Prime number generation
    ISO/IEC 15946-1:2016 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General
    ISO/IEC 14888-3:2016 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
    ISO/IEC 8825-1:2015 Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1:
    ISO/IEC 18033-2:2006 Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
    ISO/IEC 9796-3:2006 Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms
    ISO/IEC 14888-1:2008 Information technology Security techniques Digital signatures with appendix Part 1: General
    ISO/IEC 10118-1:2016 Information technology Security techniques Hash-functions Part 1: General
    ISO/IEC 9796-2:2010 Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms
    FIPS PUB 186 : 0 DIGITAL SIGNATURE STANDARD (DSS)
    ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
    ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
    ISO/IEC 15946-5:2017 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 5: Elliptic curve generation
    ISO/IEC 10118-2:2010 Information technology Security techniques Hash-functions Part 2: Hash-functions using an n-bit block cipher
    ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
    ISO/IEC 14888-2:2008 Information technology Security techniques Digital signatures with appendix Part 2: Integer factorization based mechanisms
    ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
    ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
    ISO/IEC 9798-1:2010 Information technology Security techniques Entity authentication Part 1: General
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective