CSA ISO/IEC 15946-2 : 2004
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 2: DIGITAL SIGNATURES
Hardcopy , PDF
01-26-2010
English
01-01-2004
Foreword
Introduction
1 Scope
2 Normative references
3 Symbols and abbreviated terms
3.1 Terms and definitions
3.2 Symbols and notation
4 General Model for Digital Signatures with Appendix
4.1 Parameter Generation Process
4.1.1 Domain Parameter
4.1.2 User Parameters
4.1.3 Validity of Parameters
4.2 Signature Generation Process
4.2.1 Randomizer
4.3 Signature Verification Process
5 EC-GDSA Signature Algorithm
5.1 Domain and User Parameters
5.2 Signature Generation Process
5.2.1 Calculation of the message digest
5.2.2 Elliptic Curve Computations (Arithmetic
operations in the underlying field)
5.2.3 Computations modulo the group order of
G (Arithmetic operations in F(n))
5.3 The Signature
5.4 Signature Verification Process
5.4.1 Signature Size Verification
5.4.2 Calculation of the message digest
5.4.3 Elliptic Curve Computations
5.4.4 Signature Checking
6 EC-DSA
6.1 Domain and User Parameters
6.2 Signature Generation Process
6.2.1 Calculation of the message digest
6.2.2 Elliptic Curve Computations (Arithmetic
operations in the underlying field)
6.2.3 Computations modulo the group order of
G (Arithmetic operations in F(n))
6.3 The Signature
6.4 Signature Verification Process
6.4.1 Signature Size Verification
6.4.2 Calculation of the message digest
6.4.3 Elliptic Curve Computations
6.4.4 Signature Checking
7 EC-KCDSA
7.1 Domain and User Parameters
7.2 Signature Generation Process
7.2.1 Calculation of the message digest
7.2.2 Elliptic Curve Computations (Arithmetic operations
in the underlying field)
7.2.3 Computations modulo the group order of
G (Arithmetic operations in F(n))
7.3 The Signature
7.4 Signature Verification Process
7.4.1 Signature Size Verification
7.4.2 Calculation of the message digest
7.4.3 Elliptic Curve Computation
7.4.4 Signature Checking
Annex A (informative) - Comparison
Annex B (informative) - Examples
Bibliography
Provides public-key cryptographic techniques based on elliptic curves. Includes the establishment of keys for secret-key systems, and digital signature mechanisms.
DocumentType |
Standard
|
Pages |
40
|
PublisherName |
Canadian Standards Association
|
Status |
Withdrawn
|
Standards | Relationship |
ISO/IEC 15946-2:2002 | Identical |
ISO/IEC 15946-1:2016 | Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General |
IEEE DRAFT 1363 : D13 99 | DRAFT STANDARD SPECIFICATIONS FOR PUBLIC KEY CRYPTOGRAPHY |
ANSI X9.63 : 2011 | FINANCIAL SERVICES - PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY, KEY AGREEMENT AND KEY TRANSPORT USING ELLIPTIC CURVE CRYPTOGRAPHY |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.