ISO/IEC 14888-3:2018 PDF

ISO/IEC 14888-3:2018 PDF

Name:
ISO/IEC 14888-3:2018 PDF

Published Date:
11/01/2018

Status:
Active

Description:

IT Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms

Publisher:
International Organization for Standardization/International Electrotechnical Commission

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
$83.4
Need Help?

This document specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem.

This document provides

— a general description of a digital signature with appendix mechanism, and

— a variety of mechanisms that provide digital signatures with appendix.

For each mechanism, this document specifies

— the process of generating a pair of keys,

— the process of producing signatures, and

— the process of verifying signatures.

Annex A defines object identifiers assigned to the digital signature mechanisms specified in this document, and defines algorithm parameter structures.

Annex B defines conversion functions of FE2I, I2FE, FE2BS, BS2I, I2BS, I2OS and OS2I used in this document.

Annex D defines how to generate DSA domain parameters.


Edition : 4th
File Size : 1 file , 15 MB
Note : This product is unavailable in Russia, Ukraine, Belarus
Number of Pages : 166
Published : 11/01/2018
Same As : ISO/IEC 14888-3:2018

History

ISO/IEC 14888-3:2018
Published Date: 11/01/2018
IT Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms
$83.4
ISO/IEC 14888-3:1998
Published Date: 12/01/1998
Information technology - Security techniques - Digital signatures with appendix - Part 3: Certificate-based mechanisms
$32.1

Related products

ISO/IEC 15945:2002
Published Date: 02/01/2002
Information technology - Security techniques - Specification of TTP services to support the application of digital signatures
$75
ISO/IEC 11770-3:2021
Published Date: 10/01/2021
Information security - Key management - Part 3: Mechanisms using asymmetric techniques
$83.4
ISO/IEC 27031:2011
Published Date: 03/01/2011
Information technology - Security techniques - Guidelines for information and communication technology readiness for business continuity
$60

Best-Selling Products

IEEE/CSA 844.1/CSA C22.2 No.293.1-2017
Published Date: 11/15/2017
IEEE/CSA Standard for Skin Effect Trace Heating of Pipelines, Vessels, Equipment, and Structures - General, Testing, Marking, and Documentation Requirements
$31.2
IEEE/CSA 844.3-2019
Published Date: 04/28/2019
IEEE/CSA Standard for Impedance Heating of Pipelines and Equipment - General, Testing, Marking, and Documentation Requirements
$31.8
IEEE/CSA 844.4-2019
Published Date: 04/28/2019
IEEE/CSA Standard for Impedance Heating of Pipelines and Equipment - Application Guide for Design, Installation, Testing, Commissioning, and Maintenance
$24.9