ISO/IEC 14888-3:2018
Current
The latest, up-to-date edition.
IT Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
English
12-11-2018
This document specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem.
This document provides
— a general description of a digital signature with appendix mechanism, and
— a variety of mechanisms that provide digital signatures with appendix.
For each mechanism, this document specifies
— the process of generating a pair of keys,
— the process of producing signatures, and
— the process of verifying signatures.
Annex A defines object identifiers assigned to the digital signature mechanisms specified in this document, and defines algorithm parameter structures.
Annex B defines conversion functions of FE2I, I2FE, FE2BS, BS2I, I2BS, I2OS and OS2I used in this document.
Annex D defines how to generate DSA domain parameters.
Committee |
ISO/IEC JTC 1/SC 27
|
DocumentType |
Standard
|
Pages |
155
|
PublisherName |
International Organization for Standardization
|
Status |
Current
|
Supersedes |
Standards | Relationship |
DS/ISO/IEC 14888-3:2018 | Identical |
NEN-ISO/IEC 14888-3:2018 en | Identical |
CSA ISO/IEC 14888-3:19 | Identical |
BS ISO/IEC 14888-3:2016 | Identical |
IS/ISO/IEC 14888 : Part 3 : 2018 | Identical |
INCITS/ISO/IEC 14888-3:2018(2023) | Identical |
BS ISO/IEC 14888-3:2018 | Identical |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.