• ISO/IEC 14888-2:2008

    Current The latest, up-to-date edition.

    Information technology Security techniques Digital signatures with appendix Part 2: Integer factorization based mechanisms

    Available format(s):  Hardcopy, PDF, PDF 3 Users, PDF 5 Users, PDF 9 Users

    Language(s): 

    Published date:  01-04-2008

    Publisher:  International Organization for Standardization

    Add To Cart

    Abstract - (Show below) - (Hide below)

    ISO/IEC 14888 specifies digital signature with appendix. As no part of the message is recovered from the signature (the recoverable part of the message is empty), the signed message consists of the signature and the whole message.

    NOTE ISO/IEC 9796 specifies digital signature giving message recovery. As all or part of the message is recovered from the signature, the recoverable part of the message is not empty. The signed message consists of either the signature only (when the non-recoverable part of the message is empty), or both the signature and the non-recoverable part.

    ISO/IEC 14888-2:2008 specifies digital signatures with appendix whose security is based on the difficulty of factoring the modulus in use. For each signature scheme, it specifies:

    • the relationships and constraints between all the data elements required for signing and verifying;
    • a signature mechanism, i.e. how to produce a signature of a message with the data elements required for signing;
    • a verification mechanism, i.e. how to verify a signature of a message with the data elements required for verifying.

    The title of ISO/IEC 14888-2 has changed from Identity-based mechanisms (first edition) to Integer factorization based mechanisms (second edition).

    1. ISO/IEC 14888-2:2008 includes the identity-based scheme specified in ISO/IEC 14888-2:1999, namely the GQ1 scheme. This scheme has been revised due to the withdrawal of ISO/IEC 9796:1991 in 1999.
    2. Among the certificate-based schemes specified in ISO/IEC 14888-3:1998, it includes all the schemes based on the difficulty of factoring the modulus in use, namely, the RSA, RW and ESIGN schemes. These schemes have been revised due to the withdrawal of ISO/IEC 9796:1991 in 1999.
    3. It takes into account ISO/IEC 14888-3:1998/Cor.1:2001, technical corrigendum of the ESIGN scheme.
    4. It includes a format mechanism, namely the PSS mechanism, also specified in ISO/IEC 9796-2:2002, and details of how to use it in each of the RSA, RW, GQ1 and ESIGN schemes.
    5. It includes new certificate-based schemes that use no format mechanism, namely, the GQ2, GPS1 and GPS2 schemes.
    6. For each scheme and its options, as needed, it provides an object identifier.

    General Product Information - (Show below) - (Hide below)

    Document Type Standard
    Publisher International Organization for Standardization
    Status Current
    Supersedes

    Standards Referenced By This Book - (Show below) - (Hide below)

    BS ISO/IEC 11770-5:2011 Information technology Security techniques. Key management Group key management
    08/30169502 DC : 0 BS ISO/IEC 9798-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO KNOWLEDGE TECHNIQUES
    13/30257954 DC : 0 BS ISO/IEC 11770-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES
    BS EN 419212-1:2017 Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services Introduction and common definitions
    08/30169511 DC : DRAFT DEC 2008 BS ISO/IEC 13888-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES
    CSA ISO/IEC 9798-5 : 2010 : R2015 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO-KNOWLEDGE TECHNIQUES
    09/30204721 DC : 0 BS ISO/IEC 9798-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 1: GENERAL
    BS ISO/IEC 9798-1:2010 Information technology. Security techniques. Entity authentication General
    INCITS/ISO/IEC 15946-3 : 2002 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 3: KEY ESTABLISHMENT
    CSA ISO/IEC 15945 : 2004 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES
    INCITS/ISO/IEC 15945 : 2002 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES
    CSA ISO/IEC 9798-5 : 2010 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO-KNOWLEDGE TECHNIQUES
    I.S. EN 419212-1:2017 APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 1: INTRODUCTION AND COMMON DEFINITIONS
    CEN ISO/TS 19299 : 2015 ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015)
    ISO/IEC 11770-5:2011 Information technology Security techniques Key management Part 5: Group key management
    08/30169505 DC : DRAFT JULY 2008 BS ISO/IEC 13888-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 1: GENERAL
    S.R. CEN/TS 16439:2013 ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK
    ISO/IEC 15945:2002 Information technology — Security techniques — Specification of TTP services to support the application of digital signatures
    PD ISO/TR 14742:2010 Financial services. Recommendations on cryptographic algorithms and their use
    BS ISO/IEC 18367:2016 Information technology. Security techniques. Cryptographic algorithms and security mechanisms conformance testing
    CAN/CSA-ISO/IEC 15945-04 (R2017) Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures (Adopted ISO/IEC 15945:2002, first edition, 2002-02-01)
    CAN/CSA-ISO/IEC 18367:18 Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing (Adopted ISO/IEC 18367:2016, first edition, 2016-12-15)
    I.S. EN 14890-1:2008 APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
    ISO/IEC 29150:2011 Information technology — Security techniques — Signcryption
    ISO/IEC 17960:2015 Information technology Programming languages, their environments and system software interfaces Code signing for source code
    ISO/IEC 18367:2016 Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing
    BS ISO/IEC 17960:2015 Information technology. Programming languages, their environments and system software interfaces. Code signing for source code
    03/652695 DC : 0 ISO/IEC 9798-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO KNOWLEDGE TECHNIQUES
    ISO/IEC 9798-5:2009 Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques
    07/30163724 DC : 0 BS ISO/IEC 24727-4 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS PROGRAMMING INTERFACE - PART 4: API ADMINISTRATION
    DIN EN 14890-1:2009-03 APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
    TR 102 272 : 1.1.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); ASN.1 FORMAT FOR SIGNATURE POLICIES
    12/30255293 DC : 0 BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
    16/30345808 DC : 0 BS EN 419212-1 - APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 1: INTRODUCTION AND COMMON DEFINITIONS
    BS ISO/IEC 29150:2011 Information technology. Security techniques. Signcryption
    BS EN ISO 12855:2015 Electronic fee collection. Information exchange between service provision and toll charging
    CSA ISO/IEC 9798-1 :2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 1: GENERAL
    DIN CEN ISO/TS 19299;DIN SPEC 74125:2016-02 ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015)
    INCITS/ISO/IEC 15945 : 2002 : R2007 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES
    INCITS/ISO/IEC 11770-5 : 2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 5: GROUP KEY MANAGEMENT
    BS ISO/IEC 11770-3 : 2015 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES
    CAN/CSA-ISO/IEC 17960:16 Information technology Programming languages, their environments and system software interfaces Code signing for source code (Adopted ISO/IEC 17960:2015, first edition, 2015-09-01)
    ISO/TR 14742:2010 Financial services Recommendations on cryptographic algorithms and their use
    ISO/TS 19299:2015 Electronic fee collection Security framework
    UNI EN 419212-1 : 2015 APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
    07/30154069 DC : 0 BS ISO/IEC 24727-3 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 3: APPLICATION INTERFACE
    PREN 419212-1 : DRAFT 2016 APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 1: INTRODUCTION AND COMMON DEFINITIONS
    BS ISO/IEC 15945:2002 Information technology. Security techniques. Specification of TTP services to support the application of digital signatures
    DIN EN 14890-1 E : 2009 APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
    BS EN 419212-2:2017 Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services Signature and Seal Services
    I.S. EN ISO 12855:2015 ELECTRONIC FEE COLLECTION - INFORMATION EXCHANGE BETWEEN SERVICE PROVISION AND TOLL CHARGING (ISO 12855:2015)
    10/30237107 DC : DRAFT DEC 2010 BS ISO/IEC 11770-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 5: GROUP KEY MANAGEMENT
    DIN CEN ISO/TS 19299;DIN SPEC 74125:2016-02 ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015)
    16/30345811 DC : 0 BS EN 419212-2 - APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 2: SIGNATURE AND SEAL SERVICES
    PD CEN ISO/TS 19299:2015 Electronic fee collection. Security framework
    NF EN 14890-1 : 2009 APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
    UNI CEN/TS 16439 : 2013 ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK
    CAN/CSA-ISO/IEC 9798-1:12 (R2016) Information technology - Security techniques - Entity authentication - Part 1: General (Adopted ISO/IEC 9798-1:2010, third edition, 2010-07-01)
    S.R. CEN ISO/TS 19299:2015 ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015)
    ISO/IEC 9798-1:2010 Information technology Security techniques Entity authentication Part 1: General
    ISO 12855:2015 Electronic fee collection Information exchange between service provision and toll charging
    UNE-ETSI/TS 101733 V1.2.2:2011 Electronic signature formats.
    EN 419212-1:2017 Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 1: Introduction and common definitions
    EN ISO 12855:2015 (edition 2) Electronic fee collection - Information exchange between service provision and toll charging (ISO 12855:2015)
    EN 419212-2:2017 Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 2: Signature and Seal Services
    EN 14890-1:2008 Application Interface for smart cards used as Secure Signature Creation Devices - Part 1: Basic services
    INCITS/ISO/IEC 9798-5 : 2010 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO-KNOWLEDGE TECHNIQUES
    BS EN 14890-1:2008 Application interface for smart cards used as secure signature creation devices Basic services
    BS ISO/IEC 9798-5:2009 Information technology. Security techniques. Entity authentication Mechanisms using zero knowledge techniques
    CAN/CSA-ISO/IEC 11770-3:16 Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques (Adopted ISO/IEC 11770-3:2015, third edition, 2015-08-01)
    CSA ISO/IEC 15945 : 2004 : R2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES
    PD CEN/TS 16439:2013 Electronic fee collection. Security framework
    I.S. EN 419212-2:2017 APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 2: SIGNATURE AND SEAL SERVICES
    ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
    CEN/TS 16439:2013 Electronic fee collection - Security framework

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
    ISO/IEC 18032:2005 Information technology Security techniques Prime number generation
    ISO/IEC 9798-3:1998 Information technology Security techniques Entity authentication Part 3: Mechanisms using digital signature techniques
    ISO/IEC 14888-3:2016 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
    ISO/IEC 8825-1:2015 Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1:
    ISO/IEC 15945:2002 Information technology — Security techniques — Specification of TTP services to support the application of digital signatures
    ISO/IEC 9594-8:2017 Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks
    ISO/IEC 9798-5:2009 Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques
    ISO/IEC 14888-1:2008 Information technology Security techniques Digital signatures with appendix Part 1: General
    ISO/IEC 8824-1:2015 Information technology Abstract Syntax Notation One (ASN.1): Specification of basic notation Part 1:
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective