• There are no items in your cart

CSA ISO/IEC 14888-3 : 2018

Withdrawn

Withdrawn

A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

View Superseded by

INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 3: DISCRETE LOGARITHM BASED MECHANISMS

Available format(s)

Hardcopy , PDF

Withdrawn date

16-10-2019

Superseded by

CSA ISO/IEC 14888-3:19

Language(s)

English

Published date

01-01-2018

€205.49
Excluding VAT

Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 General model
6 Certificate-based mechanisms
7 Identity-based mechanisms
Annex A (normative) - Object identifier
Annex B (normative) - Conversion functions (I)
Annex C (informative) - Conversion functions (II)
Annex D (normative) - Generation of DSA domain
        parameters
Annex E (informative) - The Weil and Tate pairings
Annex F (informative) - Numerical examples
Annex G (informative) - Comparison of the signature
        schemes
Annex H (informative) - Claimed features for choosing
        a mechanism
Bibliography

Defines digital signature mechanisms with appendix whose security is based on the discrete logarithm problem.

DocumentType
Standard
Pages
150
PublisherName
Canadian Standards Association
Status
Withdrawn
SupersededBy
Supersedes

Standards Relationship
ISO/IEC 14888-3:2016 Identical

ISO/IEC 18032:2005 Information technology Security techniques Prime number generation
ISO/IEC 15946-1:2016 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General
ISO/IEC 15945:2002 Information technology — Security techniques — Specification of TTP services to support the application of digital signatures
ISO/IEC 18033-2:2006 Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
ISO/IEC 9594-8:2017 Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks
ISO/IEC 14888-1:2008 Information technology — Security techniques — Digital signatures with appendix — Part 1: General
ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.