CAN/CSA-ISO/IEC 14888-3-07 (R2017) PDF

CAN/CSA-ISO/IEC 14888-3-07 (R2017) PDF

Name:
CAN/CSA-ISO/IEC 14888-3-07 (R2017) PDF

Published Date:
11/01/2007

Status:
Active

Description:

Information Technology - Security Techniques - Digital Signatures with Appendix - Part 3: Discrete Logarithm Based Mechanisms (Adopted ISO/IEC 14888-3:2006, second edition, 2006-11-15)

Publisher:
Canada National Standard/Canadian Standards - ISO/IEC

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
Need Help?
CSA Preface

Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the Canadian Advisory Committee (CAC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T).

1 Scope

This part of ISO/IEC 14888 specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem. This part of ISO/IEC 14888 provides
- a general description of a digital signature with appendix mechanism;
- a variety of mechanisms that provide digital signatures with appendix.

For each mechanism, this part of ISO/IEC 14888 specifies
- the process of generating a pair of keys;
- the process of producing signatures;
- the process of verifying signatures.

The verification of a digital signature requires the signing entity's verification key. It is thus essential for a verifier to be able to associate the correct verification key with the signing entity, or more precisely, with (parts of) the signing entity's identification data. This association between the signer's identification data and the signer's public verification key can either be guaranteed by an outside entity or mechanism, or the association can be somehow inherent in the verification key itself. In the former case, the scheme is said to be "certificatebased." In the latter case, the scheme is said to be "identity based." Typically, in an identity-based scheme, the verifier can derive the signer's public verification key from the signer's identification data. The digital signature mechanisms specified in this part of ISO/IEC 14888 are classified into certificate-based and identitybased mechanisms.
NOTE - For certificate-based mechanisms, various PKI standards can be used for key management. For further information, see ISO/IEC 11770-3, ISO/IEC 9594-8 (also known as X.509) and ISO/IEC 15945.
Edition : 2nd
ISBN(s) : 9781554365982
Number of Pages : 90
Published : 11/01/2007

History

CAN/CSA-ISO/IEC 14888-3:19
Published Date: 10/01/2019
IT Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms (Adopted ISO/IEC 14888-3:2018, fourth edition, 2018-11)
$63
CAN/CSA-ISO/IEC 14888-3:18
Published Date: 01/01/2018
Information Technology - Security Techniques - Digital Signatures with Appendix - Part 3: Discrete Logarithm Based Mechanisms (Adopted ISO/IEC 14888-3:2016, third edition, 2016-03-15)
$68.7
CAN/CSA-ISO/IEC 14888-3-07 (R2017)
Published Date: 11/01/2007
Information Technology - Security Techniques - Digital Signatures with Appendix - Part 3: Discrete Logarithm Based Mechanisms (Adopted ISO/IEC 14888-3:2006, second edition, 2006-11-15)

Related products

CAN/CSA-ISO/IEC 14165-115-06 (R2021)
Published Date: 12/01/2006
Information Technology - Fibre Channel - Part 115: Physical Interfaces (FC-PI) (Adopted ISO/IEC 14165-115:2006, first edition, 2006-02)
$76.2
CAN/CSA-ISO/IEC 14443-4:19
Published Date: 10/01/2019
Cards and security devices for personal identification - Contactless proximity objects - Part 4: Transmission protocol (Adopted ISO/IEC 14443-4:2018, fourth edition, 2018-07)
$57
CAN/CSA-ISO/IEC 29169:18 (R2022)
Published Date: 01/01/2018
Information technology - Automatic identification and data capture techniques - Part 19: Crypto suite RAMON security services for air interface communications (Adopted ISO/IEC 29167-19:2016, first edition, 2016-05-15)
$31.5

Best-Selling Products

ISO/TTA 1:1994
Published Date: 04/01/1994
Advanced technical ceramics - Unified classification system
$55.5
ISO/TTA 2:1997
Published Date: 04/01/1997
Tensile tests for discontinuously reinforced metal matrix composites at ambiant temperatures
$33.3
ISO/TTA 3:2001
Published Date: 09/01/2001
Polycrystalline materials - Determination of residual stresses by neutron diffraction
$55.5
ISO/TTA 4:2002
Published Date: 11/01/2002
Measurement of thermal conductivity of thin films on silicon substrates
$41.4
ISO/TTA 5:2007
Published Date: 10/01/2007
Code of practice for creep/fatigue testing of cracked components
$75