CSA ISO/IEC 14888-3 : 2018
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
View Superseded by
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 3: DISCRETE LOGARITHM BASED MECHANISMS
Hardcopy , PDF
16-10-2019
English
01-01-2018
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 General model
6 Certificate-based mechanisms
7 Identity-based mechanisms
Annex A (normative) - Object identifier
Annex B (normative) - Conversion functions (I)
Annex C (informative) - Conversion functions (II)
Annex D (normative) - Generation of DSA domain
parameters
Annex E (informative) - The Weil and Tate pairings
Annex F (informative) - Numerical examples
Annex G (informative) - Comparison of the signature
schemes
Annex H (informative) - Claimed features for choosing
a mechanism
Bibliography
Defines digital signature mechanisms with appendix whose security is based on the discrete logarithm problem.
DocumentType |
Standard
|
Pages |
150
|
PublisherName |
Canadian Standards Association
|
Status |
Withdrawn
|
SupersededBy | |
Supersedes |
Standards | Relationship |
ISO/IEC 14888-3:2016 | Identical |
ISO/IEC 18032:2005 | Information technology Security techniques Prime number generation |
ISO/IEC 15946-1:2016 | Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General |
ISO/IEC 15945:2002 | Information technology — Security techniques — Specification of TTP services to support the application of digital signatures |
ISO/IEC 18033-2:2006 | Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers |
ISO/IEC 9594-8:2017 | Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks |
ISO/IEC 14888-1:2008 | Information technology — Security techniques — Digital signatures with appendix — Part 1: General |
ISO/IEC 10118-3:2004 | Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions |
ISO/IEC 11770-3:2015 | Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.