• Shopping Cart
    There are no items in your cart

SR 002 176 : 1.1.1

Current

Current

The latest, up-to-date edition.

ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); ALGORITHMS AND PARAMETERS FOR SECURE ELECTRONIC SIGNATURES

Available format(s)

Hardcopy , PDF

Language(s)

English

€13.46
Excluding VAT

Intellectual Property Rights
Foreword
Introduction
1 Scope
2 References
3 Definitions and abbreviations
  3.1 Definitions
  3.2 Abbreviations
4 Algorithms and Parameters for Secure Electronic Signatures
  4.1 Management activities
  4.2 Signature suites for secure electronic signatures
  4.3 Cryptographic hash functions
  4.4 Padding methods
  4.5 Signature algorithms
  4.6 Random number generation
Annex A (normative): Updating algorithms and parameters
      A.1 Introduction
      A.2 Management Process
Annex B (informative): Algorithm Object Identifiers
Annex C (informative): Generation of RSA keys for signatures
      C.1 Generation of random prime numbers
      C.2 Generation of RSA modulus
      C.3 Generation of RSA keys
Annex D (informative): On the generation of random data
      D.1 Why cryptography needs random numbers
      D.2 Generation of truly random bits
      D.3 Statistical tests
      D.4 Pseudorandom bit generation
      D.5 Conclusion
Annex E (informative): Verification
Annex F (informative): Bibliography
History

Describes an initial set of algorithms and the corresponding parameters to be included in a list of approved methods for producing or verifying Electronic Signatures in Secure Signature-Creating Devices (SSCD), to be referenced in the Certificate Policy documents, during the signature creation and validation process and environment, in trusted CSP components (Certification Service Provider) and other technical components and related areas.

Committee
ESI
DocumentType
Standard
Pages
28
PublisherName
European Telecommunications Standards Institute
Status
Current

S.R. CWA 14167-4:2004 CRYPTOGRAPHIC MODULE FOR CSP SIGNING OPERATIONS - PROTECTION PROFILE - CMCSO PP
TR 102 206 : 1.1.3 MOBILE COMMERCE (M-COMM); MOBILE SIGNATURE SERVICE; SECURITY FRAMEWORK
TS 102 280 : 1.1.1 X.509 V.3 CERTIFICATE PROFILE FOR CERTIFICATES ISSUED TO NATURAL PERSONS

ISO/IEC 14888-3:2016 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
ISO/IEC 9796-3:2006 Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms
ISO/IEC 9979:1999 Information technology Security techniques Procedures for the registration of cryptographic algorithms
ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
ANSI X9.17 : 1995 FINANCIAL INSTITUTION KEY MANAGEMENT (WHOLESALE),

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.