SR 002 176 : 1.1.1
Current
The latest, up-to-date edition.
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); ALGORITHMS AND PARAMETERS FOR SECURE ELECTRONIC SIGNATURES
Hardcopy , PDF
English
Intellectual Property Rights
Foreword
Introduction
1 Scope
2 References
3 Definitions and abbreviations
3.1 Definitions
3.2 Abbreviations
4 Algorithms and Parameters for Secure Electronic Signatures
4.1 Management activities
4.2 Signature suites for secure electronic signatures
4.3 Cryptographic hash functions
4.4 Padding methods
4.5 Signature algorithms
4.6 Random number generation
Annex A (normative): Updating algorithms and parameters
A.1 Introduction
A.2 Management Process
Annex B (informative): Algorithm Object Identifiers
Annex C (informative): Generation of RSA keys for signatures
C.1 Generation of random prime numbers
C.2 Generation of RSA modulus
C.3 Generation of RSA keys
Annex D (informative): On the generation of random data
D.1 Why cryptography needs random numbers
D.2 Generation of truly random bits
D.3 Statistical tests
D.4 Pseudorandom bit generation
D.5 Conclusion
Annex E (informative): Verification
Annex F (informative): Bibliography
History
Describes an initial set of algorithms and the corresponding parameters to be included in a list of approved methods for producing or verifying Electronic Signatures in Secure Signature-Creating Devices (SSCD), to be referenced in the Certificate Policy documents, during the signature creation and validation process and environment, in trusted CSP components (Certification Service Provider) and other technical components and related areas.
Committee |
ESI
|
DocumentType |
Standard
|
Pages |
28
|
PublisherName |
European Telecommunications Standards Institute
|
Status |
Current
|
S.R. CWA 14167-4:2004 | CRYPTOGRAPHIC MODULE FOR CSP SIGNING OPERATIONS - PROTECTION PROFILE - CMCSO PP |
TR 102 206 : 1.1.3 | MOBILE COMMERCE (M-COMM); MOBILE SIGNATURE SERVICE; SECURITY FRAMEWORK |
TS 102 280 : 1.1.1 | X.509 V.3 CERTIFICATE PROFILE FOR CERTIFICATES ISSUED TO NATURAL PERSONS |
ISO/IEC 14888-3:2016 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms |
ISO/IEC 9796-3:2006 | Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms |
ISO/IEC 9979:1999 | Information technology Security techniques Procedures for the registration of cryptographic algorithms |
ISO/IEC 10118-3:2004 | Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions |
ANSI X9.17 : 1995 | FINANCIAL INSTITUTION KEY MANAGEMENT (WHOLESALE), |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.