• Shopping Cart
    There are no items in your cart

CSA ISO/IEC 14888-2:09 (R2019)

Current

Current

The latest, up-to-date edition.

Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms (Adopted ISO/IEC 14888-2:2008, second edition, 2008-04-15)

Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

01-01-2009

€202.79
Excluding VAT

CSA Preface Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the Canadian Advisory Committee (CAC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T). This Standard supersedes CAN/CSA-ISO/IEC 14888-2-02 (adoption of ISO/IEC 14888-2:1999). At the time of publication, ISO/IEC 14888-2:2008 is available from ISO and IEC in English only. CSA will publish the French version when it becomes available from ISO and IEC. This International Standard was reviewed by the CSA TCIT under the jurisdiction of the Strategic Steering Committee on Information Technology and deemed acceptable for use in Canada. From time to time, ISO/IEC may publish addenda, corrigenda, etc. The CSA TCIT will review these documents for approval and publication. For a listing, refer to the CSA Information Products catalogue or CSA Info Update or contact a CSA Sales representative. This Standard has been formally approved, without modification, by the Technical Committee and has been approved as a National Standard of Canada by the Standards Council of Canada. Scope This part of ISO/IEC 14888 specifies digital signatures with appendix whose security is based on the difficulty of factoring the modulus in use. For each signature scheme, it specifies: a) the relationships and constraints between all the data elements required for signing and verifying; b) a signature mechanism, i.e., how to produce a signature of a message with the data elements required for signing; c) a verification mechanism, i.e., how to verify a signature of a message with the data elements required for verifying. The production of key pairs requires random bits and prime numbers. The production of signatures often requires random bits. Techniques for producing random bits and prime numbers are outside the scope of this part of ISO/IEC 14888. For further information, see ISO/IEC 18031 [33] and ISO/IEC 18032 [34]. Various means are available to obtain a reliable copy of the public verification key, e.g., a public key certificate. Techniques for managing keys and certificates are outside the scope of this part of ISO/IEC 14888. For further information, see ISO/IEC 9594-8 [27], ISO/IEC 11770 [31] and ISO/IEC 15945 [32].

DocumentType
Standard
ISBN
978-1-55491-180-6
Pages
90
PublisherName
Canadian Standards Association
Status
Current
Supersedes

CSA Preface Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the Canadian Advisory Committee (CAC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T). This Standard supersedes CAN/CSA-ISO/IEC 14888-2-02 (adoption of ISO/IEC 14888-2:1999). At the time of publication, ISO/IEC 14888-2:2008 is available from ISO and IEC in English only. CSA will publish the French version when it becomes available from ISO and IEC. This International Standard was reviewed by the CSA TCIT under the jurisdiction of the Strategic Steering Committee on Information Technology and deemed acceptable for use in Canada. From time to time, ISO/IEC may publish addenda, corrigenda, etc. The CSA TCIT will review these documents for approval and publication. For a listing, refer to the CSA Information Products catalogue or CSA Info Update or contact a CSA Sales representative. This Standard has been formally approved, without modification, by the Technical Committee and has been approved as a National Standard of Canada by the Standards Council of Canada. Scope This part of ISO/IEC 14888 specifies digital signatures with appendix whose security is based on the difficulty of factoring the modulus in use. For each signature scheme, it specifies: a) the relationships and constraints between all the data elements required for signing and verifying; b) a signature mechanism, i.e., how to produce a signature of a message with the data elements required for signing; c) a verification mechanism, i.e., how to verify a signature of a message with the data elements required for verifying. The production of key pairs requires random bits and prime numbers. The production of signatures often requires random bits. Techniques for producing random bits and prime numbers are outside the scope of this part of ISO/IEC 14888. For further information, see ISO/IEC 18031 [33] and ISO/IEC 18032 [34]. Various means are available to obtain a reliable copy of the public verification key, e.g., a public key certificate. Techniques for managing keys and certificates are outside the scope of this part of ISO/IEC 14888. For further information, see ISO/IEC 9594-8 [27], ISO/IEC 11770 [31] and ISO/IEC 15945 [32].

Standards Relationship
ISO/IEC 14888-2:2008 Identical

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.