ISO/IEC 9796-3:2006
Current
The latest, up-to-date edition.
Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms
Hardcopy , PDF
English
12-09-2006
A digital signature in electronic exchange of information provides the same kind of facilities that are expected from a handwritten signature in paper-based mail. Hence it is applicable to providing entity authentication, data origin authentication, non-repudiation, and integrity of data.
ISO/IEC 9796-3:2006 specifies digital signature mechanisms giving partial or total message recovery aiming at reducing storage and transmission overhead.
ISO/IEC 9796-3:2006 specifies mechanisms based on the discrete logarithm problem of a finite field or an elliptic curve over a finite field.
ISO/IEC 9796-3:2006 defines types of redundancy: natural redundancy, added redundancy, or both.
ISO/IEC 9796-3:2006 gives the general model for digital signatures giving partial or total message recovery aiming at reducing storage and transmission overhead.
ISO/IEC 9796-3:2006 specifies six digital signature schemes giving data recovery: NR, ECNR, ECMR, ECAO, ECPV, and ECKNR. NR is defined on a prime field; ECNR, ECMR, ECAO, ECPV, and ECKNR are defined on an elliptic curve over a finite field.
| Committee |
ISO/IEC JTC 1/SC 27
|
| DevelopmentNote |
Supersedes ISO/IEC 9796. (03/2001)
|
| DocumentType |
Standard
|
| Pages |
69
|
| ProductNote |
THIS STANDARD ALSO HAVE ITS CRRECTED VERSION OF (en) : 2013-09
|
| PublisherName |
International Organization for Standardization
|
| Status |
Current
|
| Supersedes |
| Standards | Relationship |
| BIS IS/ISO/IEC 9796-3 : 2006 | Identical |
| NEN ISO/IEC 9796-3 : 2006 + COR 2013 | Identical |
| PN ISO/IEC 9796-3 : 2009 | Identical |
| BS ISO/IEC 9796-3:2006 | Identical |
| INCITS/ISO/IEC 9796-3:2006(R 2018) | Identical |
| INCITS/ISO/IEC 9796-3:2006(R2023) | Identical |
| INCITS/ISO/IEC 9796-3 : 2000 : R2005 | Identical |
| INCITS/ISO/IEC 9796-3 : 2000 | Identical |
| ISO/IEC 29192-4:2013 | Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques |
| 13/30257954 DC : 0 | BS ISO/IEC 11770-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
| 04/30105372 DC : DRAFT DEC 2004 | ISO/IEC 11770-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
| BS EN 14890-1:2008 | Application interface for smart cards used as secure signature creation devices Basic services |
| INCITS/ISO/IEC 18014-3 : 2010 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TIME-STAMPING SERVICES - PART 3: MECHANISMS PRODUCING LINKED TOKENS |
| BS ISO/IEC 15946-3:2002 | Information technology. Security techniques. Cryptographic techniques based on elliptic curves Key establishment |
| INCITS/ISO/IEC 15946-3 : 2002 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 3: KEY ESTABLISHMENT |
| BS ISO/IEC 17799 : 2005 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY MANAGEMENT |
| INCITS/ISO/IEC 15945 : 2002 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
| BS ISO/IEC 9796-2:2010 | Information technology. Security techniques. Digital signature schemes giving message recovery Integer factorization based mechanisms |
| ISO/IEC TR 29149:2012 | Information technology — Security techniques — Best practices for the provision and use of time-stamping services |
| ISO/IEC 15945:2002 | Information technology — Security techniques — Specification of TTP services to support the application of digital signatures |
| 09/30202174 DC : 0 | BS EN 50159 - RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
| ISO/IEC 9796-2:2010 | Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Integer factorization based mechanisms |
| 16/30335567 DC : 0 | BS ISO/IEC 15946-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 5: ELLIPTIC CURVE GENERATION |
| PD ISO/TS 12812-2:2017 | Core banking. Mobile financial services Security and data protection for mobile financial services |
| 02/652466 DC : DRAFT MAY 2002 | ISO/IEC FCD 15946-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 4: DIGITAL SIGNATURES GIVING MESSAGE RECOVERY |
| BS ISO/IEC 19790:2012 | Information technology. Security techniques. Security requirements for cryptographic modules |
| PD ISO/TR 14742:2010 | Financial services. Recommendations on cryptographic algorithms and their use |
| BS ISO/IEC 15945:2002 | Information technology. Security techniques. Specification of TTP services to support the application of digital signatures |
| ISO/IEC 19790:2012 | Information technology — Security techniques — Security requirements for cryptographic modules |
| I.S. EN 14890-1:2008 | APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
| PREN 50159 : DRAFT 2009 | RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
| ISO/TS 12812-2:2017 | Core banking — Mobile financial services — Part 2: Security and data protection for mobile financial services |
| ISO/IEC 15946-4:2004 | Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 4: Digital signatures giving message recovery |
| ISO/IEC 17960:2015 | Information technology — Programming languages, their environments and system software interfaces — Code signing for source code |
| BS 7799-1(2005) : 2005 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY MANAGEMENT |
| 04/30062174 DC : DRAFT JUN 2004 | ISO/IEC FCD 17799 - INFORMATION TECHNOLOGY - CODE OF PRACTICE FOR INFORMATION SECURITY MANAGEMENT |
| BS ISO/IEC 17960:2015 | Information technology. Programming languages, their environments and system software interfaces. Code signing for source code |
| 09/30214048 DC : 0 | BS ISO/IEC 9796-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURE SCHEMES GIVING MESSAGE RECOVERY - PART 2: INTEGER FACTORIZATION BASED MECHANISMS |
| BS EN 50159:2010 | Railway applications. Communication, signalling and processing systems. Safety-related communication in transmission systems |
| 12/30228421 DC : 0 | BS ISO/IEC 29192-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES |
| BS ISO 11568-4:2007 | Banking. Key management (retail) Asymmetric cryptosystems. Key management and life cycle |
| BS ISO/IEC 15946-5:2017 | Information technology. Security techniques. Cryptographic techniques based on elliptic curves Elliptic curve generation |
| DIN EN 14890-1:2009-03 | APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
| BS ISO/IEC 15946-4:2004 | Information technology. Security techniques. Cryptographic techniques based on elliptic curves Digital signatures giving message recovery |
| 12/30186137 DC : 0 | BS ISO/IEC 27002 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
| ISO/IEC 29167-17:2015 | Information technology — Automatic identification and data capture techniques — Part 17: Crypto suite cryptoGPS security services for air interface communications |
| INCITS/ISO/IEC 17799 : 2005 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY MANAGEMENT |
| BS ISO/IEC 29150:2011 | Information technology. Security techniques. Signcryption |
| BS ISO/IEC 29192-4 : 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES |
| BS ISO/IEC 11770-3 : 2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
| ISO/IEC 15946-5:2017 | Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generation |
| ISO/TR 14742:2010 | Financial services — Recommendations on cryptographic algorithms and their use |
| CEI EN 50159 : 2012 | RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
| DIN EN 14890-1 E : 2009 | APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
| ISO/IEC 17799:2005 | Information technology — Security techniques — Code of practice for information security management |
| ISO/IEC 29150:2011 | Information technology — Security techniques — Signcryption |
| IEC 62280:2014 | Railway applications - Communication, signalling and processing systems - Safety related communication in transmission systems |
| EN 50159:2010 | Railway applications - Communication, signalling and processing systems - Safety-related communication in transmission systems |
| EN 14890-1:2008 | Application Interface for smart cards used as Secure Signature Creation Devices - Part 1: Basic services |
| INCITS/ISO/IEC 29192-4 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES |
| PD ISO/IEC TR 29149:2012 | Information technology. Security techniques. Best practices for the provision and use of time-stamping services |
| 05/30112566 DC : DRAFT JAN 2005 | ISO 11568-4 - BANKING - KEY MANAGEMENT (RETAIL) - PART 4: ASYMMETRIC CRYPTOSYSTEMS - KEY MANAGEMENT AND LIFE CYCLE |
| INCITS/ISO/IEC 11770-4 : 2008 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
| INCITS/ISO/IEC 15945 : 2002 : R2007 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
| ISO/IEC 11770-3:2015 | Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques |
| ISO/IEC 15946-3:2002 | Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 3: Key establishment |
| I.S. EN 50159:2010 | RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
| ISO 11568-4:2007 | Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle |
| UNE-EN 50159:2011 | Railway applications - Communication, signalling and processing systems - Safety-related communication in transmission systems |
| INCITS/ISO/IEC 20008-1:2013(R2019) | Information technology - Security techniques - Anonymous digital signatures - Part 1: General<br> |
| INCITS/ISO/IEC 24727-4:2008(R2019) | Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration |
| INCITS/ISO/IEC 18370-1:2016(2019) | Information technology -- Security techniques -- Blind digital signatures -- Part 1: General |
| INCITS/ISO/IEC 14888-2:2008(R2019) | Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms<br> |
| INCITS/ISO/IEC 18370-2:2016(R2019) | Information technology -- Security techniques - - Blind digital signatures -- Part 2: Discrete logarithm based mechanisms |
| INCITS/ISO/IEC 24727-3:2008(R2019) | Identification cards — Integrated circuit card programming interfaces — Part 3: Application interface |
| INCITS/ISO/IEC 20009-1:2013(R2019) | Information technology - Security techniques - Anonymous entity authentication - Part 1: General |
| INCITS/ISO/IEC 29192-4:2013(R2019) | Information technology - Security techniques - Lightweight cryptography - Part 4: Mechanisms using asymmetric techniques |
| INCITS/ISO/IEC 24727-2:2008[R2019] | Identification cards — Integrated circuit card programming interfaces — Part 4: Application programming interface (API) administration<br> |
| ISO/IEC 15946-1:2016 | Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General |
| ISO/IEC 14888-1:2008 | Information technology — Security techniques — Digital signatures with appendix — Part 1: General |
| ISO/IEC 15946-5:2017 | Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generation |
| ANSI X9.63 : 2011 | FINANCIAL SERVICES - PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY, KEY AGREEMENT AND KEY TRANSPORT USING ELLIPTIC CURVE CRYPTOGRAPHY |
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.