BS ISO/IEC 9796-2:2010
Current
The latest, up-to-date edition.
Information technology. Security techniques. Digital signature schemes giving message recovery Integer factorization based mechanisms
Hardcopy , PDF
English
31-01-2011
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 Converting between bit strings and integers
6 Requirements
7 Model for signature and verification processes
8 Digital signature scheme 1
9 Digital signature scheme 2
10 Digital signature scheme 3
Annex A (normative) - ASN.1 module
Annex B (normative) - Public key system for digital signature
Annex C (normative) - Mask generation function
Annex D (informative) - On hash-function identifiers and the
choice of the recoverable length of the message
Annex E (informative) - Examples
Bibliography
Describes three digital signature schemes giving message recovery, two of which are deterministic (non-randomized) and one of which is randomized.
Committee |
IST/33/2
|
DevelopmentNote |
Supersedes 01/652352 DC. (11/2002) Supersedes 97/640173 DC. (03/2007) Supersedes 09/30214048 DC. (01/2011)
|
DocumentType |
Standard
|
Pages |
68
|
PublisherName |
British Standards Institution
|
Status |
Current
|
Supersedes |
This part of ISO/IEC9796 specifies three digital signature schemes giving message recovery, two of which are deterministic (non-randomized) and one of which is randomized. The security of all three schemes is based on the difficulty of factorizing large numbers. All three schemes can provide either total or partial message recovery.
This part of ISO/IEC9796 specifies the method for key production for the three signature schemes. However, techniques for key management and for random number generation (as required for the randomized signature scheme) are outside the scope of this part of ISO/IEC9796.
The first mechanism specified in this part of ISO/IEC9796 is only applicable for existing implementations, and is retained for reasons of backward compatibility.
Standards | Relationship |
ISO/IEC 9796-2:2010 | Identical |
ISO/IEC 9796-3:2006 | Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms |
ISO/IEC 9797-2:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function |
ISO/IEC 9798-1:2010 | Information technology Security techniques Entity authentication Part 1: General |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.