Most recent

ISO/IEC 14888-3:2018

IT Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms


This document specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem.

This document provides

— a general description of a digital signature with appendix mechanism, and

— a variety of mechanisms that provide digital signatures with appendix.

For each mechanism, this document specifies

— the process of generating a pair of keys,

— the process of producing signatures, and

— the process of verifying signatures.

Annex A defines object identifiers assigned to the digital signature mechanisms specified in this document, and defines algorithm parameter structures.

Annex B defines conversion functions of FE2I, I2FE, FE2BS, BS2I, I2BS, I2OS and OS2I used in this document.

Annex D defines how to generate DSA domain parameters.


CONTENT PROVIDER
International Organization for Standardization [iso]

Others Also Bought
IT Security techniques - Hash-functions - Part 3: Dedicated hash-functions
Information technology - Security techniques - Encryption algorithms - Part 4: Stream ciphers
Information technology - Security techniques - Random bit generation
Document History
Revises:
Included in Packages
Amendments & Corrections
We have no amendments or corrections for this standard.