• Shopping Cart
    There are no items in your cart

INCITS/ISO/IEC 15946-2 : 2002

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by

INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 2: DIGITAL SIGNATURES

Available format(s)

Hardcopy , PDF

Superseded date

23-07-2013

Language(s)

English

Published date

01-01-2002

€99.06
Excluding VAT

Foreword
Introduction
1 Scope
2 Normative references
3 Symbols and abbreviated terms
  3.1 Terms and definitions
  3.2 Symbols and notation
4 General Model for Digital Signatures with Appendix
  4.1 Parameter Generation Process
      4.1.1 Domain Parameter
      4.1.2 User Parameters
      4.1.3 Validity of Parameters
  4.2 Signature Generation Process
      4.2.1 Randomizer
  4.3 Signature Verification Process
5 EC-GDSA Signature Algorithm
  5.1 Domain and User Parameters
  5.2 Signature Generation Process
      5.2.1 Calculation of the message digest
      5.2.2 Elliptic Curve Computations (Arithmetic
            operations in the underlying field)
      5.2.3 Computations modulo the group order of
            G (Arithmetic operations in F(n))
  5.3 The Signature
  5.4 Signature Verification Process
      5.4.1 Signature Size Verification
      5.4.2 Calculation of the message digest
      5.4.3 Elliptic Curve Computations
      5.4.4 Signature Checking
6 EC-DSA
  6.1 Domain and User Parameters
  6.2 Signature Generation Process
      6.2.1 Calculation of the message digest
      6.2.2 Elliptic Curve Computations (Arithmetic
            operations in the underlying field)
      6.2.3 Computations modulo the group order of
            G (Arithmetic operations in F(n))
  6.3 The Signature
  6.4 Signature Verification Process
      6.4.1 Signature Size Verification
      6.4.2 Calculation of the message digest
      6.4.3 Elliptic Curve Computations
      6.4.4 Signature Checking
7 EC-KCDSA
  7.1 Domain and User Parameters
  7.2 Signature Generation Process
      7.2.1 Calculation of the message digest
      7.2.2 Elliptic Curve Computations (Arithmetic operations
            in the underlying field)
      7.2.3 Computations modulo the group order of
            G (Arithmetic operations in F(n))
  7.3 The Signature
  7.4 Signature Verification Process
      7.4.1 Signature Size Verification
      7.4.2 Calculation of the message digest
      7.4.3 Elliptic Curve Computation
      7.4.4 Signature Checking
Annex A (informative) Comparison
Annex B (informative) Examples
Bibliography

Defines public-key cryptographic techniques based on elliptic curves. They include the establishment of keys for secret-key systems, and digital signature mechanisms.

DocumentType
Standard
Pages
36
PublisherName
Information Technology Industry Council
Status
Superseded
SupersededBy

Standards Relationship
ISO/IEC 15946-2:2002 Identical

ISO/IEC 15946-1:2016 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General
ANSI X9.63 : 2011 FINANCIAL SERVICES - PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY, KEY AGREEMENT AND KEY TRANSPORT USING ELLIPTIC CURVE CRYPTOGRAPHY

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.