Customer Support: 131 242

  • There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

SR 002 176 : 1.1.1

Current

Current

The latest, up-to-date edition.

ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); ALGORITHMS AND PARAMETERS FOR SECURE ELECTRONIC SIGNATURES

Available format(s)

Hardcopy , PDF

Language(s)

English

Intellectual Property Rights
Foreword
Introduction
1 Scope
2 References
3 Definitions and abbreviations
  3.1 Definitions
  3.2 Abbreviations
4 Algorithms and Parameters for Secure Electronic Signatures
  4.1 Management activities
  4.2 Signature suites for secure electronic signatures
  4.3 Cryptographic hash functions
  4.4 Padding methods
  4.5 Signature algorithms
  4.6 Random number generation
Annex A (normative): Updating algorithms and parameters
      A.1 Introduction
      A.2 Management Process
Annex B (informative): Algorithm Object Identifiers
Annex C (informative): Generation of RSA keys for signatures
      C.1 Generation of random prime numbers
      C.2 Generation of RSA modulus
      C.3 Generation of RSA keys
Annex D (informative): On the generation of random data
      D.1 Why cryptography needs random numbers
      D.2 Generation of truly random bits
      D.3 Statistical tests
      D.4 Pseudorandom bit generation
      D.5 Conclusion
Annex E (informative): Verification
Annex F (informative): Bibliography
History

Describes an initial set of algorithms and the corresponding parameters to be included in a list of approved methods for producing or verifying Electronic Signatures in Secure Signature-Creating Devices (SSCD), to be referenced in the Certificate Policy documents, during the signature creation and validation process and environment, in trusted CSP components (Certification Service Provider) and other technical components and related areas.

Committee
ESI
DocumentType
Standard
Pages
28
PublisherName
European Telecommunications Standards Institute
Status
Current

S.R. CWA 14167-4:2004 CRYPTOGRAPHIC MODULE FOR CSP SIGNING OPERATIONS - PROTECTION PROFILE - CMCSO PP
TR 102 206 : 1.1.3 MOBILE COMMERCE (M-COMM); MOBILE SIGNATURE SERVICE; SECURITY FRAMEWORK
TS 102 280 : 1.1.1 X.509 V.3 CERTIFICATE PROFILE FOR CERTIFICATES ISSUED TO NATURAL PERSONS

ISO/IEC 14888-3:2016 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
ISO/IEC 9796-3:2006 Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms
ISO/IEC 9979:1999 Information technology Security techniques Procedures for the registration of cryptographic algorithms
ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
ANSI X9.17 : 1995 FINANCIAL INSTITUTION KEY MANAGEMENT (WHOLESALE),

View more information
$39.71
Including GST where applicable

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.

Need help?
Call us on 131 242, then click here to start a Screen Sharing session
so we can help right away! Learn more