TS 102 176-1 : 2.1.1
Current
The latest, up-to-date edition.
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); ALGORITHMS AND PARAMETERS FOR SECURE ELECTRONIC SIGNATURES; PART 1: HASH FUNCTIONS AND ASYMMETRIC ALGORITHMS
Hardcopy , PDF
English
Intellectual Property Rights
Foreword
Introduction
1 Scope
2 References
3 Definitions and abbreviations
4 Maintenance of the document
5 Hash functions
6 Signature schemes
7 Signature suites
8 Random number generation methods
9 Recommended hash functions and key sizes versus
time
10 Time period resistance of hash functions and keys
11 Practical ways to identify hash functions and signature
algorithms
Annex A (normative) - Algorithms for various data
structures
Annex B (informative) - Recommended key sizes
(historical)
Annex C (informative) - Generation of RSA modulus
Annex D (informative) - Generation of elliptic curve
domain parameters
Annex E (informative) - On the generation of random data
Annex F (informative) - Algorithm identifiers defined in
various documents
Annex G (informative) - Abstracts of ISO/IEC 10118-3
and ISO/IEC 9796-2
Annex H (informative) - Signature maintenance
Annex I (informative) - Major changes from previous
versions
Annex J (informative) - National Bodies
Annex K (informative) - Bibliography
History
Describes a list of hash functions and a list of signature schemes, as well as the recommended combinations of hash functions and signatures schemes in the form of "signature suites".
Committee |
ESI
|
DocumentType |
Standard
|
Pages |
66
|
PublisherName |
European Telecommunications Standards Institute
|
Status |
Current
|
TS 102 734 : 1.1.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES; PROFILES OF CMS ADVANCED ELECTRONIC SIGNATURES BASED ON TS 101 733 (CADES) |
TR 101 564 : 1.1.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); GUIDANCE ON ETSI TS 102 042 FOR ISSUING EXTENDED VALIDATION CERTIFICATES FOR AUDITORS AND CSPS |
TS 102 573 : 2.1.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY REQUIREMENTS FOR TRUST SERVICE PROVIDERS SIGNING AND/OR STORING DATA OBJECTS |
TS 103 172 : 2.2.2 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); PADES BASELINE PROFILE |
TS 102 640-2 : 2.2.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); REGISTERED ELECTRONIC MAIL (REM); PART 2: DATA REQUIREMENTS, FORMATS AND SIGNATURES FOR REM |
EN 319 411-2 : 2.2.2 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY AND SECURITY REQUIREMENTS FOR TRUST SERVICE PROVIDERS ISSUING CERTIFICATES; PART 2: REQUIREMENTS FOR TRUST SERVICE PROVIDERS ISSUING EU QUALIFIED CERTIFICATES |
TR 101 533-2 : 1.3.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); DATA PRESERVATION SYSTEMS SECURITY; PART 2: GUIDELINES FOR ASSESSORS |
PD ISO/TR 14742:2010 | Financial services. Recommendations on cryptographic algorithms and their use |
TR 103 123 : 1.1.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); GUIDANCE FOR AUDITORS AND CSPS ON ETSI TS 102 042 FOR ISSUING PUBLICLY-TRUSTED TLS/SSL CERTIFICATES |
TS 103 173 : 2.2.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); CADES BASELINE PROFILE |
I.S. EN 14890-1:2008 | APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
13/30274704 DC : 0 | BS EN 419111-2 - PROTECTION PROFILES FOR SIGNATURE CREATION AND VERIFICATION APPLICATION - SIGNATURE CREATION APPLICATION - PART 2: CORE PP |
13/30274701 DC : 0 | BS EN 419111-1 - PROTECTION PROFILES FOR SIGNATURE CREATION AND VERIFICATION APPLICATION - PART 1: INTRODUCTION |
17/30354142 DC : 0 | BS EN 419231 - PROTECTION PROFILE FOR TRUSTWORTHY SYSTEMS SUPPORTING TIME STAMPING |
TS 102 640-6-3 : 1.1.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); REGISTERED ELECTRONIC MAIL (REM); PART 6: INTEROPERABILITY PROFILES; SUB-PART 3: REM-MD SOAP BINDING PROFILE |
07/30161079 DC : 0 | BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
12/30255293 DC : 0 | BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
S.R. CWA 16745:2014 | IMPROVING TRANSPARENCY IN FINANCIAL AND BUSINESS REPORTING - METADATA CONTAINER |
ISO/TR 14742:2010 | Financial services Recommendations on cryptographic algorithms and their use |
UNI EN 419212-1 : 2015 | APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
TS 102 778 : 1.1.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); PDF ADVANCED ELECTRONIC SIGNATURE PROFILES; CMS PROFILE BASED ON ISO 32000-1 |
DIN EN 14890-1 E : 2009 | APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
DIN EN 14890-1:2009-03 | APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
13/30274713 DC : 0 | BS EN 419111-5 - PROTECTION PROFILES FOR SIGNATURE CREATION AND VERIFICATION APPLICATION - SIGNATURE VERIFICATION APPLICATION - PART 5: POSSIBLE EXTENSIONS |
TS 103 174 : 2.2.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); ASIC BASELINE PROFILE |
07/30161082 DC : 0 | BS EN 14890-2 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 2: ADDITIONAL SERVICES |
TS 103 171 : 2.1.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); XADES BASELINE PROFILE |
TS 102 904 : 1.1.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES; PROFILES OF XML ADVANCED ELECTRONIC SIGNATURES BASED ON TS 101 903 (XADES) |
13/30274707 DC : 0 | BS EN 419111-3 - PROTECTION PROFILES FOR SIGNATURE CREATION AND VERIFICATION APPLICATION - SIGNATURE CREATION APPLICATION - PART 3: POSSIBLE EXTENSIONS |
EN 14890-1:2008 | Application Interface for smart cards used as Secure Signature Creation Devices - Part 1: Basic services |
BS EN 14890-1:2008 | Application interface for smart cards used as secure signature creation devices Basic services |
PD ISO/IEC TR 29149:2012 | Information technology. Security techniques. Best practices for the provision and use of time-stamping services |
UNI/TR 11465-2 : 2012 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI) - DATA PRESERVATION SYSTEMS SECURITY - PART 2: GUIDELINES FOR ASSESSORS |
TS 102 778-2 : 1.2.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); PDF ADVANCED ELECTRONIC SIGNATURE PROFILES; PART 2: PADES BASIC - PROFILE BASED ON ISO 32000-1 |
S.R. CWA 16047:2009 | E-INVOICING COMPLIANCE GUIDELINES - COMMENTARY TO THE COMPLIANCE MATRIX |
TS 119 312 : 1.2.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); CRYPTOGRAPHIC SUITES |
UNE 71505-3:2013 | Information Technologies (IT). Digital evidences management system. Part 3: Formats and technical mechanisms. |
ISO/IEC TR 29149:2012 | Information technology Security techniques Best practices for the provision and use of time-stamping services |
FIPS PUB 186 : 0 | DIGITAL SIGNATURE STANDARD (DSS) |
FIPS PUB 180 : 2002 | SECURE HASH STANDARD |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.