INCITS/ISO/IEC 15946-2 : 2002
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 2: DIGITAL SIGNATURES
Hardcopy , PDF
23-07-2013
English
01-01-2002
Foreword
Introduction
1 Scope
2 Normative references
3 Symbols and abbreviated terms
3.1 Terms and definitions
3.2 Symbols and notation
4 General Model for Digital Signatures with Appendix
4.1 Parameter Generation Process
4.1.1 Domain Parameter
4.1.2 User Parameters
4.1.3 Validity of Parameters
4.2 Signature Generation Process
4.2.1 Randomizer
4.3 Signature Verification Process
5 EC-GDSA Signature Algorithm
5.1 Domain and User Parameters
5.2 Signature Generation Process
5.2.1 Calculation of the message digest
5.2.2 Elliptic Curve Computations (Arithmetic
operations in the underlying field)
5.2.3 Computations modulo the group order of
G (Arithmetic operations in F(n))
5.3 The Signature
5.4 Signature Verification Process
5.4.1 Signature Size Verification
5.4.2 Calculation of the message digest
5.4.3 Elliptic Curve Computations
5.4.4 Signature Checking
6 EC-DSA
6.1 Domain and User Parameters
6.2 Signature Generation Process
6.2.1 Calculation of the message digest
6.2.2 Elliptic Curve Computations (Arithmetic
operations in the underlying field)
6.2.3 Computations modulo the group order of
G (Arithmetic operations in F(n))
6.3 The Signature
6.4 Signature Verification Process
6.4.1 Signature Size Verification
6.4.2 Calculation of the message digest
6.4.3 Elliptic Curve Computations
6.4.4 Signature Checking
7 EC-KCDSA
7.1 Domain and User Parameters
7.2 Signature Generation Process
7.2.1 Calculation of the message digest
7.2.2 Elliptic Curve Computations (Arithmetic operations
in the underlying field)
7.2.3 Computations modulo the group order of
G (Arithmetic operations in F(n))
7.3 The Signature
7.4 Signature Verification Process
7.4.1 Signature Size Verification
7.4.2 Calculation of the message digest
7.4.3 Elliptic Curve Computation
7.4.4 Signature Checking
Annex A (informative) Comparison
Annex B (informative) Examples
Bibliography
Defines public-key cryptographic techniques based on elliptic curves. They include the establishment of keys for secret-key systems, and digital signature mechanisms.
DocumentType |
Standard
|
Pages |
36
|
PublisherName |
Information Technology Industry Council
|
Status |
Superseded
|
SupersededBy |
Standards | Relationship |
ISO/IEC 15946-2:2002 | Identical |
ISO/IEC 15946-1:2016 | Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General |
ANSI X9.63 : 2011 | FINANCIAL SERVICES - PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY, KEY AGREEMENT AND KEY TRANSPORT USING ELLIPTIC CURVE CRYPTOGRAPHY |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.