ISO/IEC 14888-2:2008
Current
The latest, up-to-date edition.
Information technology Security techniques Digital signatures with appendix Part 2: Integer factorization based mechanisms
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
01-04-2008
ISO/IEC 14888 specifies digital signature with appendix. As no part of the message is recovered from the signature (the recoverable part of the message is empty), the signed message consists of the signature and the whole message.
NOTE ISO/IEC 9796 specifies digital signature giving message recovery. As all or part of the message is recovered from the signature, the recoverable part of the message is not empty. The signed message consists of either the signature only (when the non-recoverable part of the message is empty), or both the signature and the non-recoverable part.
ISO/IEC 14888-2:2008 specifies digital signatures with appendix whose security is based on the difficulty of factoring the modulus in use. For each signature scheme, it specifies:
- the relationships and constraints between all the data elements required for signing and verifying;
- a signature mechanism, i.e. how to produce a signature of a message with the data elements required for signing;
- a verification mechanism, i.e. how to verify a signature of a message with the data elements required for verifying.
The title of ISO/IEC 14888-2 has changed from Identity-based mechanisms (first edition) to Integer factorization based mechanisms (second edition).
- ISO/IEC 14888-2:2008 includes the identity-based scheme specified in ISO/IEC 14888-2:1999, namely the GQ1 scheme. This scheme has been revised due to the withdrawal of ISO/IEC 9796:1991 in 1999.
- Among the certificate-based schemes specified in ISO/IEC 14888-3:1998, it includes all the schemes based on the difficulty of factoring the modulus in use, namely, the RSA, RW and ESIGN schemes. These schemes have been revised due to the withdrawal of ISO/IEC 9796:1991 in 1999.
- It takes into account ISO/IEC 14888-3:1998/Cor.1:2001, technical corrigendum of the ESIGN scheme.
- It includes a format mechanism, namely the PSS mechanism, also specified in ISO/IEC 9796-2:2002, and details of how to use it in each of the RSA, RW, GQ1 and ESIGN schemes.
- It includes new certificate-based schemes that use no format mechanism, namely, the GQ2, GPS1 and GPS2 schemes.
- For each scheme and its options, as needed, it provides an object identifier.
DocumentType |
Standard
|
Pages |
66
|
PublisherName |
International Organization for Standardization
|
Status |
Current
|
Supersedes |
Standards | Relationship |
NEN ISO/IEC 14888-2 : 2008 C1 2015 | Identical |
INCITS/ISO/IEC 14888-2 : 2009(R2014) | Identical |
BS ISO/IEC 14888-2:2008 | Identical |
CSA ISO/IEC 14888-2:09 (R2019) | Identical |
INCITS/ISO/IEC 14888-2:2008(R2019) | Identical |
CSA ISO/IEC 14888-2 :2009 | Identical |
CSA ISO/IEC 14888-2 : 2009 : INC : COR 1 : 2016 : R201400 | Identical |
CSA ISO/IEC 14888-2 : 2009 : R2014 | Identical |
BS ISO/IEC 11770-5:2011 | Information technology Security techniques. Key management Group key management |
08/30169502 DC : 0 | BS ISO/IEC 9798-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO KNOWLEDGE TECHNIQUES |
13/30257954 DC : 0 | BS ISO/IEC 11770-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
BS EN 419212-1:2017 | Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services Introduction and common definitions |
08/30169511 DC : DRAFT DEC 2008 | BS ISO/IEC 13888-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
CSA ISO/IEC 9798-5 : 2010 : R2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO-KNOWLEDGE TECHNIQUES |
09/30204721 DC : 0 | BS ISO/IEC 9798-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 1: GENERAL |
BS ISO/IEC 9798-1:2010 | Information technology. Security techniques. Entity authentication General |
INCITS/ISO/IEC 15946-3 : 2002 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 3: KEY ESTABLISHMENT |
CSA ISO/IEC 15945 : 2004 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
INCITS/ISO/IEC 15945 : 2002 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
CSA ISO/IEC 9798-5 : 2010 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO-KNOWLEDGE TECHNIQUES |
I.S. EN 419212-1:2017 | APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 1: INTRODUCTION AND COMMON DEFINITIONS |
CEN ISO/TS 19299:2015 | Electronic fee collection - Security framework (ISO/TS 19299:2015) |
ISO/IEC 11770-5:2011 | Information technology Security techniques Key management Part 5: Group key management |
08/30169505 DC : DRAFT JULY 2008 | BS ISO/IEC 13888-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 1: GENERAL |
S.R. CEN/TS 16439:2013 | ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK |
ISO/IEC 15945:2002 | Information technology — Security techniques — Specification of TTP services to support the application of digital signatures |
PD ISO/TR 14742:2010 | Financial services. Recommendations on cryptographic algorithms and their use |
BS ISO/IEC 18367:2016 | Information technology. Security techniques. Cryptographic algorithms and security mechanisms conformance testing |
CAN/CSA-ISO/IEC 15945-04 (R2017) | Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures (Adopted ISO/IEC 15945:2002, first edition, 2002-02-01) |
I.S. EN 14890-1:2008 | APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
ISO/IEC 29150:2011 | Information technology — Security techniques — Signcryption |
ISO/IEC 17960:2015 | Information technology Programming languages, their environments and system software interfaces Code signing for source code |
ISO/IEC 18367:2016 | Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing |
BS ISO/IEC 17960:2015 | Information technology. Programming languages, their environments and system software interfaces. Code signing for source code |
03/652695 DC : 0 | ISO/IEC 9798-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO KNOWLEDGE TECHNIQUES |
ISO/IEC 9798-5:2009 | Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques |
07/30163724 DC : 0 | BS ISO/IEC 24727-4 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS PROGRAMMING INTERFACE - PART 4: API ADMINISTRATION |
DIN EN 14890-1:2009-03 | APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
TR 102 272 : 1.1.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); ASN.1 FORMAT FOR SIGNATURE POLICIES |
12/30255293 DC : 0 | BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
16/30345808 DC : 0 | BS EN 419212-1 - APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 1: INTRODUCTION AND COMMON DEFINITIONS |
BS ISO/IEC 29150:2011 | Information technology. Security techniques. Signcryption |
BS EN ISO 12855:2015 | Electronic fee collection. Information exchange between service provision and toll charging |
CSA ISO/IEC 9798-1 :2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 1: GENERAL |
INCITS/ISO/IEC 15945 : 2002 : R2007 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
INCITS/ISO/IEC 11770-5 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 5: GROUP KEY MANAGEMENT |
BS ISO/IEC 11770-3 : 2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
CAN/CSA-ISO/IEC 17960:16 | Information technology Programming languages, their environments and system software interfaces Code signing for source code (Adopted ISO/IEC 17960:2015, first edition, 2015-09-01) |
ISO/TR 14742:2010 | Financial services Recommendations on cryptographic algorithms and their use |
ISO/TS 19299:2015 | Electronic fee collection Security framework |
UNI EN 419212-1 : 2015 | APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
07/30154069 DC : 0 | BS ISO/IEC 24727-3 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 3: APPLICATION INTERFACE |
PREN 419212-1 : DRAFT 2016 | APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 1: INTRODUCTION AND COMMON DEFINITIONS |
BS ISO/IEC 15945:2002 | Information technology. Security techniques. Specification of TTP services to support the application of digital signatures |
DIN EN 14890-1 E : 2009 | APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
BS EN 419212-2:2017 | Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services Signature and Seal Services |
I.S. EN ISO 12855:2015 | ELECTRONIC FEE COLLECTION - INFORMATION EXCHANGE BETWEEN SERVICE PROVISION AND TOLL CHARGING (ISO 12855:2015) |
10/30237107 DC : DRAFT DEC 2010 | BS ISO/IEC 11770-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 5: GROUP KEY MANAGEMENT |
DIN CEN ISO/TS 19299;DIN SPEC 74125:2016-02 | ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
16/30345811 DC : 0 | BS EN 419212-2 - APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 2: SIGNATURE AND SEAL SERVICES |
PD CEN ISO/TS 19299:2015 | Electronic fee collection. Security framework |
NF EN 14890-1 : 2009 | APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
UNI CEN/TS 16439 : 2013 | ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK |
CAN/CSA-ISO/IEC 9798-1:12 (R2016) | Information technology - Security techniques - Entity authentication - Part 1: General (Adopted ISO/IEC 9798-1:2010, third edition, 2010-07-01) |
S.R. CEN ISO/TS 19299:2015 | ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
ISO/IEC 9798-1:2010 | Information technology Security techniques Entity authentication Part 1: General |
ISO 12855:2015 | Electronic fee collection Information exchange between service provision and toll charging |
UNE-ETSI/TS 101733 V1.2.2:2011 | Electronic signature formats. |
EN 419212-1:2017 | Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 1: Introduction and common definitions |
EN ISO 12855:2015 | Electronic fee collection - Information exchange between service provision and toll charging (ISO 12855:2015) |
EN 419212-2:2017 | Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 2: Signature and Seal Services |
EN 14890-1:2008 | Application Interface for smart cards used as Secure Signature Creation Devices - Part 1: Basic services |
INCITS/ISO/IEC 9798-5 : 2010 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO-KNOWLEDGE TECHNIQUES |
BS EN 14890-1:2008 | Application interface for smart cards used as secure signature creation devices Basic services |
BS ISO/IEC 9798-5:2009 | Information technology. Security techniques. Entity authentication Mechanisms using zero knowledge techniques |
CAN/CSA-ISO/IEC 11770-3:16 | Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques (Adopted ISO/IEC 11770-3:2015, third edition, 2015-08-01) |
CSA ISO/IEC 15945 : 2004 : R2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
PD CEN/TS 16439:2013 | Electronic fee collection. Security framework |
I.S. EN 419212-2:2017 | APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 2: SIGNATURE AND SEAL SERVICES |
ISO/IEC 11770-3:2015 | Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
CEN/TS 16439:2013 | Electronic fee collection - Security framework |
CAN/CSA-ISO/IEC 18367:18 | Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing (Adopted ISO/IEC 18367:2016, first edition, 2016-12-15) |
ISO/IEC 18031:2011 | Information technology Security techniques Random bit generation |
ISO/IEC 18032:2005 | Information technology Security techniques Prime number generation |
ISO/IEC 9798-3:1998 | Information technology Security techniques Entity authentication Part 3: Mechanisms using digital signature techniques |
ISO/IEC 14888-3:2016 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms |
ISO/IEC 8825-1:2015 | Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1: |
ISO/IEC 15945:2002 | Information technology — Security techniques — Specification of TTP services to support the application of digital signatures |
ISO/IEC 9594-8:2017 | Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks |
ISO/IEC 9798-5:2009 | Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques |
ISO/IEC 14888-1:2008 | Information technology — Security techniques — Digital signatures with appendix — Part 1: General |
ISO/IEC 8824-1:2015 | Information technology Abstract Syntax Notation One (ASN.1): Specification of basic notation Part 1: |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.