BS ISO/IEC 14888-2:2008
Current
The latest, up-to-date edition.
Information technology. Security techniques. Digital signatures with appendix Integer factorization based mechanisms
Hardcopy , PDF
English
10-31-2015
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 General
6 RSA and RW schemes
7 GQ1 scheme (identity-based scheme)
8 GQ2 scheme
9 GPS1 scheme
10 GPS2 scheme
11 ESIGN scheme
Annex A (normative) Object identifiers
Annex B (informative) Guidance on parameter choice
and comparison of signature schemes
Annex C (informative) Numerical examples
Annex D (informative) Two other format mechanisms
for RSA/RW schemes
Annex E (informative) Products allowing message
recovery for RSA/RW verification mechanisms
Annex F (informative) Products allowing two-pass
authentication for GQ/GPS schemes
Bibliography
Describes digital signatures with appendix whose security is based on the difficulty of factoring the modulus in use.
Committee |
IST/33/2
|
DevelopmentNote |
Supersedes 99/652300 DC. (08/2005) Supersedes 06/30108758 DC. (05/2008)
|
DocumentType |
Standard
|
Pages |
76
|
PublisherName |
British Standards Institution
|
Status |
Current
|
Supersedes |
This part of ISO/IEC 14888 specifies digital signatures with appendix whose security is based on the difficulty of factoring the modulus in use. For each signature scheme, it specifies: the relationships and constraints between all the data elements required for signing and verifying; a signature mechanism, i.e., how to produce a signature of a message with the data elements required for signing; a verification mechanism, i.e., how to verify a signature of a message with the data elements required for verifying. The production of key pairs requires random bits and prime numbers. The production of signatures often requires random bits. Techniques for producing random bits and prime numbers are outside the scope of this part of ISO/IEC 14888. For further information, see ISO/IEC 18031 [33] and ISO/IEC 18032 [34]. Various means are available to obtain a reliable copy of the public verification key, e.g., a public key certificate. Techniques for managing keys and certificates are outside the scope of this part of ISO/IEC 14888. For further information, see ISO/IEC 9594-8 [27], ISO/IEC 11770 [31] and ISO/IEC 15945 [32].
Standards | Relationship |
ISO/IEC 14888-2:2008 | Identical |
ISO/IEC 14888-2:2008/Cor 1:2015 | Identical |
ISO/IEC 18031:2011 | Information technology Security techniques Random bit generation |
ISO/IEC 18032:2005 | Information technology Security techniques Prime number generation |
ISO/IEC 9798-3:1998 | Information technology Security techniques Entity authentication Part 3: Mechanisms using digital signature techniques |
ISO/IEC 14888-3:2016 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms |
ISO/IEC 8825-1:2015 | Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1: |
ISO/IEC 15945:2002 | Information technology — Security techniques — Specification of TTP services to support the application of digital signatures |
ISO/IEC 9594-8:2017 | Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks |
ISO/IEC 9798-5:2009 | Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques |
ISO/IEC 14888-1:2008 | Information technology — Security techniques — Digital signatures with appendix — Part 1: General |
ISO/IEC 8824-1:2015 | Information technology Abstract Syntax Notation One (ASN.1): Specification of basic notation Part 1: |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.