• CSA ISO/IEC 14888-2 :2009

    Superseded A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

    INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 2: INTEGER FACTORIZATION BASED MECHANISMS

    Available format(s):  Hardcopy, PDF

    Superseded date:  23-07-2021

    Language(s):  English

    Published date:  01-01-2014

    Publisher:  Canadian Standards Association

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Introduction
    1 Scope
    2 Normative references
    3 Terms and definitions
    4 Symbols and abbreviated terms
    5 General
    6 RSA and RW schemes
    7 GQ1 scheme (identity-based scheme)
    8 GQ2 scheme
    9 GPS1 scheme
    10 GPS2 scheme
    11 ESIGN scheme
    Annex A (normative) - Object identifiers
    Annex B (informative) - Guidance on parameter choice
            and comparison of signature schemes
    Annex C (informative) - Numerical examples
    Annex D (informative) - Two other format mechanisms for
            RSA/RW schemes
    Annex E (informative) - Products allowing message recovery for
            RSA/RW verification mechanisms
    Annex F (informative) - Products allowing two-pass authentication
            for GQ/GPS schemes
    Bibliography

    Abstract - (Show below) - (Hide below)

    Defines digital signatures with appendix whose security is based on the difficulty of factoring the modulus in use.

    General Product Information - (Show below) - (Hide below)

    Document Type Standard
    Product Note Reconfirmed EN
    Publisher Canadian Standards Association
    Status Superseded
    Superseded By
    Supersedes

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
    ISO/IEC 18032:2005 Information technology Security techniques Prime number generation
    ISO/IEC 9798-3:1998 Information technology Security techniques Entity authentication Part 3: Mechanisms using digital signature techniques
    ISO/IEC 14888-3:2016 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
    ISO/IEC 8825-1:2015 Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1:
    ISO/IEC 15945:2002 Information technology — Security techniques — Specification of TTP services to support the application of digital signatures
    ISO/IEC 9594-8:2017 Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks
    ISO/IEC 9798-5:2009 Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques
    ISO/IEC 14888-1:2008 Information technology Security techniques Digital signatures with appendix Part 1: General
    ISO/IEC 8824-1:2015 Information technology Abstract Syntax Notation One (ASN.1): Specification of basic notation Part 1:
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective