ISO/IEC 14888-3:2016
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
View Superseded by
Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
Hardcopy , PDF 1 User , PDF 3 Users , PDF 5 Users , PDF 9 Users
15-11-2018
English
17-03-2016
ISO/IEC 14888-3:2016 specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem.
ISO/IEC 14888-3:2016 provides
- a general description of a digital signature with appendix mechanism, and
- a variety of mechanisms that provide digital signatures with appendix.
For each mechanism, this part of ISO/IEC 14888 specifies
- the process of generating a pair of keys,
- the process of producing signatures, and
- the process of verifying signatures.
Committee |
ISO/IEC JTC 1/SC 27
|
DocumentType |
Standard
|
Pages |
131
|
PublisherName |
International Organization for Standardization
|
Status |
Withdrawn
|
SupersededBy | |
Supersedes |
Standards | Relationship |
DS ISO/IEC 14888-3 : 2016 | Identical |
NEN ISO/IEC 14888-3 : 2016 + COR 2017 | Identical |
BS ISO/IEC 14888-3 : 2006 | Identical |
INCITS/ISO/IEC 14888-3:2016(R2018) | Identical |
CSA ISO/IEC 14888-3 : 2018 | Identical |
BS ISO/IEC 14888-3:2016 | Identical |
INCITS/ISO/IEC 14888-3 : 1998 : R2005 | Identical |
INCITS/ISO/IEC 14888-3 : 1998 | Identical |
13/30257954 DC : 0 | BS ISO/IEC 11770-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
BS EN 419212-1:2017 | Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services Introduction and common definitions |
07/30154069 DC : 0 | BS ISO/IEC 24727-3 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 3: APPLICATION INTERFACE |
BS ISO/IEC 14888-2:2008 | Information technology. Security techniques. Digital signatures with appendix Integer factorization based mechanisms |
08/30169511 DC : DRAFT DEC 2008 | BS ISO/IEC 13888-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
09/30204721 DC : 0 | BS ISO/IEC 9798-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 1: GENERAL |
BS ISO/IEC 18014-1:2008 | Information technology. Security techniques. Time- stamping services Framework |
BS ISO/IEC 9798-1:2010 | Information technology. Security techniques. Entity authentication General |
INCITS/ISO/IEC 15946-3 : 2002 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 3: KEY ESTABLISHMENT |
INCITS/ISO/IEC 15945 : 2002 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
CSA ISO/IEC 14888-2 : 2009 : INC : COR 1 : 2016 : R201400 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 2: INTEGER FACTORIZATION BASED MECHANISMS |
I.S. EN 419212-3:2017 | APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 3: DEVICE AUTHENTICATION PROTOCOLS |
I.S. EN 419212-2:2017 | APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 2: SIGNATURE AND SEAL SERVICES |
I.S. EN 419212-1:2017 | APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 1: INTRODUCTION AND COMMON DEFINITIONS |
BIS IS 15256-4 : 2013 | BANKING - KEY MANAGEMENT (RETAIL) - PART 4: ASYMMETRIC CRYPTOSYSTEMS - KEY MANAGEMENT AND LIFE CYCLE |
ISO 11568-4:2007 | Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle |
ISO/IEC TR 29149:2012 | Information technology Security techniques Best practices for the provision and use of time-stamping services |
ISO/IEC 15945:2002 | Information technology — Security techniques — Specification of TTP services to support the application of digital signatures |
CEN/TS 16702-2:2015 | Electronic fee collection - Secure monitoring for autonomous toll systems - Part 2: Trusted recorder |
CEN ISO/TS 19299:2015 | Electronic fee collection - Security framework (ISO/TS 19299:2015) |
08/30169505 DC : DRAFT JULY 2008 | BS ISO/IEC 13888-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 1: GENERAL |
S.R. CEN/TS 16702-2:2015 | ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 2: TRUSTED RECORDER |
16/30335567 DC : 0 | BS ISO/IEC 15946-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 5: ELLIPTIC CURVE GENERATION |
ISO/IEC 13157-4:2016 | Information technology — Telecommunications and information exchange between systems — NFC Security — Part 4: NFC-SEC entity authentication and key agreement using asymmetric cryptography |
PD ISO/TR 14742:2010 | Financial services. Recommendations on cryptographic algorithms and their use |
BS ISO/IEC 15945:2002 | Information technology. Security techniques. Specification of TTP services to support the application of digital signatures |
BS ISO/IEC 18367:2016 | Information technology. Security techniques. Cryptographic algorithms and security mechanisms conformance testing |
IEEE 1363.3-2013 | IEEE Standard for Identity-Based Cryptographic Techniques using Pairings |
ECMA 410 : 3ED 2017 | NFC-SEC-03: NFC-SEC ENTITY AUTHENTICATION AND KEY AGREEMENT USING ASYMMETRIC CRYPTOGRAPHY |
CSA ISO/IEC 18014-1 : 2009 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TIME-STAMPING SERVICES - PART 1: FRAMEWORK |
CAN/CSA-ISO/IEC 15945-04 (R2017) | Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures (Adopted ISO/IEC 15945:2002, first edition, 2002-02-01) |
PREN 419212-3 : DRAFT 2016 | APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 3: DEVICE AUTHENTICATION PROTOCOLS |
CSA ISO/IEC 14888-2 : 2009 : R2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 2: INTEGER FACTORIZATION BASED MECHANISMS |
ISO/IEC 15946-5:2017 | Information technology Security techniques Cryptographic techniques based on elliptic curves Part 5: Elliptic curve generation |
ISO/IEC 17960:2015 | Information technology Programming languages, their environments and system software interfaces Code signing for source code |
ISO/IEC 11889-1:2015 | Information technology — Trusted platform module library — Part 1: Architecture |
ISO/IEC 18367:2016 | Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing |
ISO/IEC 11889-2:2015 | Information technology — Trusted Platform Module Library — Part 2: Structures |
ISO/IEC 18014-1:2008 | Information technology Security techniques Time-stamping services Part 1: Framework |
CEN/TS 16702-1:2014 | Electronic fee collection - Secure monitoring for autonomous toll systems - Part 1: Compliance checking |
BS ISO/IEC 11889-1:2009 | Information technology. Trusted platform module Overview |
BS ISO/IEC 17960:2015 | Information technology. Programming languages, their environments and system software interfaces. Code signing for source code |
PD CEN/TS 16702-2:2015 | Electronic fee collection. Secure monitoring for autonomous toll systems Trusted recorder |
ISO/IEC 29167-17:2015 | Information technology Automatic identification and data capture techniques Part 17: Crypto suite cryptoGPS security services for air interface communications |
07/30163724 DC : 0 | BS ISO/IEC 24727-4 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS PROGRAMMING INTERFACE - PART 4: API ADMINISTRATION |
12/30228421 DC : 0 | BS ISO/IEC 29192-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES |
BS ISO 11568-4:2007 | Banking. Key management (retail) Asymmetric cryptosystems. Key management and life cycle |
TR 102 272 : 1.1.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); ASN.1 FORMAT FOR SIGNATURE POLICIES |
BS ISO/IEC 15946-5:2017 | Information technology. Security techniques. Cryptographic techniques based on elliptic curves Elliptic curve generation |
PD CEN/TS 16702-1:2014 | Electronic fee collection. Secure monitoring for autonomous toll system Compliance checking |
BS EN 419212-3:2017 | Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services Device authentication protocols |
14/30302807 DC : 0 | BS ISO/IEC 11889-4 - INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 4: SUPPORTING ROUTINES |
07/30135157 DC : 0 | BS ISO/IEC 18014-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TIME-STAMPING SERVICES - PART 1: FRAMEWORK |
07/30161079 DC : 0 | BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
16/30345808 DC : 0 | BS EN 419212-1 - APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 1: INTRODUCTION AND COMMON DEFINITIONS |
BS ISO/IEC 29150:2011 | Information technology. Security techniques. Signcryption |
CSA ISO/IEC 9798-1 :2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 1: GENERAL |
SR 002 176 : 1.1.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); ALGORITHMS AND PARAMETERS FOR SECURE ELECTRONIC SIGNATURES |
IEEE 802.11-2016 | IEEE Standard for Information technology--Telecommunications and information exchange between systems Local and metropolitan area networks--Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications |
S.R. CEN/TS 16702-1:2014 | ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 1: COMPLIANCE CHECKING |
BS ISO/IEC 29192-4 : 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES |
BS ISO/IEC 11770-3 : 2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
S.R. CEN ISO/TS 19299:2015 | ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
CAN/CSA-ISO/IEC 17960:16 | Information technology Programming languages, their environments and system software interfaces Code signing for source code (Adopted ISO/IEC 17960:2015, first edition, 2015-09-01) |
CAN/CSA-ISO/IEC 11889-4:16 | Information technology Trusted Platform Module Library Part 4: Supporting Routines (Adopted ISO/IEC 11889-4:2015, second edition, 2015-12-15) |
ISO/TR 14742:2010 | Financial services Recommendations on cryptographic algorithms and their use |
ISO/TS 19299:2015 | Electronic fee collection Security framework |
UNI EN 419212-1 : 2015 | APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
PREN 419212-1 : DRAFT 2016 | APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 1: INTRODUCTION AND COMMON DEFINITIONS |
14/30302798 DC : 0 | BS ISO/IEC 11889-1 - INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 1: ARCHITECTURE |
16/30348455 DC : 0 | BS EN 419212-3 - APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 3: DEVICE AUTHENTICATION PROTOCOLS |
BS ISO/IEC 11889-4:2009 | Information technology. Trusted platform module Commands |
CSA ISO/IEC 18014-1 : 2009 : R2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TIME-STAMPING SERVICES - PART 1: FRAMEWORK |
BS EN 419212-2:2017 | Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services Signature and Seal Services |
UNI CEN/TS 16702-1 : 2014 | ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 1: COMPLIANCE CHECKING |
DIN CEN ISO/TS 19299;DIN SPEC 74125:2016-02 | ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
16/30345811 DC : 0 | BS EN 419212-2 - APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 2: SIGNATURE AND SEAL SERVICES |
14/30302801 DC : 0 | BS ISO/IEC 11889-2 - INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 2: STRUCTURES |
PD CEN ISO/TS 19299:2015 | Electronic fee collection. Security framework |
UNI CEN/TS 16439 : 2013 | ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK |
CAN/CSA-ISO/IEC 9798-1:12 (R2016) | Information technology - Security techniques - Entity authentication - Part 1: General (Adopted ISO/IEC 9798-1:2010, third edition, 2010-07-01) |
CSA ISO/IEC 15945 : 2004 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
CSA ISO/IEC 14888-2 :2009 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 2: INTEGER FACTORIZATION BASED MECHANISMS |
CAN/CSA-ISO/IEC 29167-17:16 | Information technology Automatic identification and data capture techniques Part 17: Crypto suite cryptoGPS security services for air interface communications (Adopted ISO/IEC 29167-17:2015, first edition, 2015-06-01) |
ISO/IEC 29150:2011 | Information technology — Security techniques — Signcryption |
ISO/IEC 14888-2:2008 | Information technology Security techniques Digital signatures with appendix Part 2: Integer factorization based mechanisms |
ISO/IEC 29167-16:2015 | Information technology — Automatic identification and data capture techniques — Part 16: Crypto suite ECDSA-ECDH security services for air interface communications |
ISO/IEC 9798-1:2010 | Information technology Security techniques Entity authentication Part 1: General |
ISO/IEC 15444-8:2007 | Information technology — JPEG 2000 image coding system: Secure JPEG 2000 — Part 8: |
UNE-ETSI/TS 101733 V1.2.2:2011 | Electronic signature formats. |
EN 419212-3:2017 | Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 3: Device authentication protocols |
EN 419212-1:2017 | Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 1: Introduction and common definitions |
EN 419212-2:2017 | Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 2: Signature and Seal Services |
INCITS/ISO/IEC 29192-4 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES |
ISO/IEC 29192-4:2013 | Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques |
ANSI X9.31 : 1998 | DIGITAL SIGNATURES USING REVERSIBLE PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY (RDSA) |
BS ISO/IEC 11889-2:2009 | Information technology. Trusted platform module Design principles |
PD ISO/IEC TR 29149:2012 | Information technology. Security techniques. Best practices for the provision and use of time-stamping services |
CAN/CSA-ISO/IEC 11770-3:16 | Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques (Adopted ISO/IEC 11770-3:2015, third edition, 2015-08-01) |
CSA ISO/IEC 15945 : 2004 : R2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
PD CEN/TS 16439:2013 | Electronic fee collection. Security framework |
CAN/CSA-ISO/IEC 11889-2:16 | Information technology Trusted Platform Module Library Part 2: Structures (Adopted ISO/IEC 11889-2:2015, second edition, 2015-12-15) |
INCITS/ISO/IEC 15945 : 2002 : R2007 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
CAN/CSA-ISO/IEC 11889-1:16 | Information technology Trusted Platform Module Library Part 1: Architecture (Adopted ISO/IEC 11889-1:2015, second edition, 2015-12-15) |
ISO/IEC 11770-3:2015 | Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
S.R. CEN/TS 16439:2013 | ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK |
TS 119 312 : 1.2.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); CRYPTOGRAPHIC SUITES |
CAN/CSA-ISO/IEC 29167-16:16 | Information technology Automatic identification and data capture techniques Part 16: Crypto suite ECDSA-ECDH security services for air interface communications (Adopted ISO/IEC 29167-16:2015, first edition, 2015-11-15) |
ISO/IEC 11889-4:2015 | Information technology Trusted Platform Module Library Part 4: Supporting Routines |
CEN/TS 16439:2013 | Electronic fee collection - Security framework |
CAN/CSA-ISO/IEC 18367:18 | Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing (Adopted ISO/IEC 18367:2016, first edition, 2016-12-15) |
ISO/IEC 18032:2005 | Information technology Security techniques Prime number generation |
ISO/IEC 15946-1:2016 | Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General |
ISO/IEC 15945:2002 | Information technology — Security techniques — Specification of TTP services to support the application of digital signatures |
ISO/IEC 18033-2:2006 | Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers |
ISO/IEC 9594-8:2017 | Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks |
ISO/IEC 14888-1:2008 | Information technology — Security techniques — Digital signatures with appendix — Part 1: General |
FIPS PUB 186 : 0 | DIGITAL SIGNATURE STANDARD (DSS) |
ISO/IEC 10118-3:2004 | Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions |
GOST R 34-10 : 2012 | INFORMATION TECHNOLOGY - CRYPTOGRAPHIC DATA SECURITY - SIGNATURE AND VERIFICATION PROCESSES OF [ELECTRONIC] DIGITAL SIGNATURE |
ISO/IEC 11770-3:2015 | Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.