CAN/CSA-ISO/IEC 14888-2:09 (R2019) PDF

CAN/CSA-ISO/IEC 14888-2:09 (R2019) PDF

Name:
CAN/CSA-ISO/IEC 14888-2:09 (R2019) PDF

Published Date:
10/01/2009

Status:
Active

Description:

Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms (Adopted ISO/IEC 14888-2:20008, second edition, 2008-04-15), Includes Technical Corrigendum 1:2016

Publisher:
Canada National Standard/Canadian Standards - ISO/IEC

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
$67.8
Need Help?
Scope:

This part of ISO/IEC 14888 specifies digital signatures with appendix whose security is based on the difficulty of factoring the modulus in use. For each signature scheme, it specifies:
a) the relationships and constraints between all the data elements required for signing and verifying;
b) a signature mechanism, i.e., how to produce a signature of a message with the data elements required for signing;
c) a verification mechanism, i.e., how to verify a signature of a message with the data elements required for verifying.

The production of key pairs requires random bits and prime numbers. The production of signatures often requires random bits. Techniques for producing random bits and prime numbers are outside the scope of this part of ISO/IEC 14888. For further information, see ISO/IEC 18031 [33] and ISO/IEC 18032 [34].

Various means are available to obtain a reliable copy of the public verification key, e.g., a public key certificate. Techniques for managing keys and certificates are outside the scope of this part of ISO/IEC 14888. For further information, see ISO/IEC 9594-8 [27], ISO/IEC 11770 [31] and ISO/IEC 15945 [32].
File Size : 1 file , 3.7 MB
ISBN(s) : 9781554911806
Number of Pages : 90
Product Code(s) : 2419925, 2419925
Published : 10/01/2009

History

CAN/CSA-ISO/IEC 14888-2:09 (R2019)
Published Date: 10/01/2009
Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms (Adopted ISO/IEC 14888-2:20008, second edition, 2008-04-15), Includes Technical Corrigendum 1:2016
$67.8
CAN/CSA-ISO/IEC 14888-2-02
Published Date: 03/01/2002
Information Technology - Security Techniques - Digital Signatures with Appendix - Part 2: Identity-Based Mechanisms (Adopted ISO/IEC 14888-2:1999, first edition, 1999-12-15)
$21.9

Related products

CAN/CSA-ISO/IEC 16485-04 (R2019)
Published Date: 12/01/2004
Information Technology - Mixed Raster Content (MRC) (Adopted ISO/IEC 16485:2000, first edition, 2000-09-15)
$45.6
CAN/CSA-ISO/IEC 15459-6:19
Published Date: 06/01/2019
Information technology - Unique identifiers - Part 6:Unique identifier for product groupings (Adopted ISO/IEC 15459-6:2007 ,first edition, 2007-06-15)
$20.7
CAN/CSA-ISO/IEC 21000-4-07 (R2022)
Published Date: 11/01/2007
Information Technology - Multimedia Framework (MPEG-21) - Part 4: Intellectual Property Management and Protection Components (Adopted ISO/IEC 21000-4:2006, first edition, 2006-04-01), Includes Tecnical Corrigendum 1:2013
$72.9

Best-Selling Products

JIS A 0005:1966
Published Date: 01/01/1966
Standard nominal size of opening components for buildings
$25.5
JIS A 0007:1967
Published Date: 01/01/1967
Standard nominal size of steel framed wall component for buildings
$14.1
JIS A 0008:1967
Published Date: 01/01/1967
Standard nominal size of steel framed roof component for buildings
$11.7
JIS A 0012:1980
Published Date: 01/01/1980
Modular co-ordination -- Sizes of sanitary unit for dwellings
$15.3
JIS A 0015:1976
Published Date: 01/01/1976
Modular co-ordinating sizes of piping unit for dwellings
$12.9
JIS A 0016:1979
Published Date: 01/01/1979
Modular coordination-coordinating size of opening for built-in appliances in storage furniture
$19.2