• There are no items in your cart

BS ISO/IEC 15945:2002

Current
Current

The latest, up-to-date edition.

Information technology. Security techniques. Specification of TTP services to support the application of digital signatures
Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

03-15-2002

1 Scope
2 Normative references
  2.1 Identical Recommendations/International Standards
  2.2 Additional references
3 Definitions
4 Abbreviations
5 Descriptive classification of services
  5.1 Certificate management services
  5.2 Key management services
  5.3 Other services
6 Minimal certificate and CRL profile
  6.1 Minimal certificate profile
  6.2 Minimal CRL profile
7 Certificate management messages
  7.1 Overview of certificate management services and
      messages
  7.2 Assumptions and restrictions for some of the services
8 Data structures for certificate management messages
  8.1 Overall message
  8.2 Common Data Structures
  8.3 Data structures specific for Certificate Request
      Messages of type CertReq
  8.4 Data structures specific for other messages
  8.5 Transport protocols
  8.6 Complete ASN.1 Module
9 Online Certificate Status Protocol
  9.1 Protocol Overview
  9.2 Functional Requirements
  9.3 Detailed Protocol
  9.4 ASN.1 Module for OCSP
Annex A - Interworking
Annex B - Algorithms
      B.1 Hash Algorithms
      B.2 Digital Signature Algorithms
Annex C - Bibliography

Defines those TTP services needed to support the application of digital signatures for the purpose of non-repudiation of creation of documents. Also defines interfaces and protocols to enable interoperability between entities associated with these TTP services. Focuses on implementation and interoperability, service specifications and technical requirements. Does not describe the management of TTPs or other organizational, operational or personal issues.

This Recommendation | International Standard will define those TTP services needed to support the application of digital signatures for the purpose of non-repudiation of creation of documents. This Recommendation | International Standard will also define interfaces and protocols to enable interoperability between entities associated with these TTP services. Definitions of technical services and protocols are required to allow for the implementation of TTP services and related commercial applications. This Recommendation | International Standard focuses on: implementation and interoperability; service specifications; and technical requirements. This Recommendation | International Standard does not describe the management of TTPs or other organizational, operational or personal issues. Those topics are mainly covered in ITU-T Rec. X.842 | ISO/IEC TR 14516, Information technology - Security techniques - Guidelines on the use and management of Trusted Third Party services. NOTE 1 - Because interoperability is the main issue of this Recommendation | International Standard, the following restrictions hold: Only those services which may be offered by a TTP, either to end entities or to another TTP, are covered in this Recommendation | International Standard. Only those services which may be requested and/or delivered by means of standardizable digital messages are covered. Only those services for which widely acceptable standardized messages can be agreed upon at the time this Recommendation | International Standard is published are specified in detail. Further services will be specified in separate documents when widely acceptable standardized messages are available for them. In particular, time stamping services will be defined in a separate document. NOTE 2 - The data structures and messages in this Recommendation | International Standard will be specified in accordance to RFC documents, RFC 2510 and RFC 2511 (for certificate management services) and to RFC 2560 (for OCSP services). The certificate request format also allows interoperability with PKCS#10. See Annex C for references to the documents mentioned in this Note. NOTE 3 - Other standardization efforts for TTP services in specific environments and applications, like SET or EDIFACT, exist. These are outside of the scope of this Recommendation | International Standard. NOTE 4 - This Recommendation | International Standard defines technical specifications for services. These specifications are independent of policies, specific legal regulations, and organizational models (which, for example, might define how duties and responsibilities are shared between Certification Authorities and Registration Authorities). Of course, the policy of TTPs offering the services described in this Recommendation | International Standard will need to specify how legal regulations and the other aspects mentioned before will be fulfilled by the TTP. In particular, the policy has to specify how the validity of digital signatures and certificates is determined.

Committee
IST/33
DevelopmentNote
Supersedes 99/652585 DC. (04/2002)
DocumentType
Standard
Pages
62
PublisherName
British Standards Institution
Status
Current
Supersedes

Standards Relationship
ISO/IEC 15945:2002 Identical

ISO/IEC 13888-2:2010 Information technology Security techniques Non-repudiation Part 2: Mechanisms using symmetric techniques
ISO/IEC 15408-2:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components
ISO/IEC 10181-7:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Security audit and alarms framework
ISO/IEC 14888-3:2016 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
ISO/IEC 8825-1:2015 Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1:
ISO/IEC 11770-2:2008 Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques
ISO/IEC 15945:2002 Information technology — Security techniques — Specification of TTP services to support the application of digital signatures
ISO/IEC 15408-3:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components
ISO/IEC 9796-3:2006 Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms
ISO/IEC 8824-2:2015 Information technology Abstract Syntax Notation One (ASN.1): Information object specification Part 2:
ISO/IEC 13888-3:2009 Information technology Security techniques Non-repudiation Part 3: Mechanisms using asymmetric techniques
ISO/IEC 10181-3:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Access control framework
ISO/IEC 10181-1:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Overview
ISO/IEC 9594-8:2017 Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks
ISO/IEC 9594-3:2017 Information technology Open Systems Interconnection The Directory Part 3: Abstract service definition
ISO/IEC 9594-6:2017 Information technology Open Systems Interconnection The Directory Part 6: Selected attribute types
ISO/IEC 8824-4:2015 Information technology Abstract Syntax Notation One (ASN.1): Parameterization of ASN.1 specifications Part 4:
ISO/IEC 14888-1:2008 Information technology Security techniques Digital signatures with appendix Part 1: General
ISO/IEC 10118-1:2016 Information technology Security techniques Hash-functions Part 1: General
ISO/IEC 13888-1:2009 Information technology Security techniques Non-repudiation Part 1: General
ISO/IEC 10181-4:1997 Information technology Open Systems Interconnection Security frameworks for open systems: Non-repudiation framework Part 4:
ISO/IEC 10181-2:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Authentication framework
ISO/IEC 9796-2:2010 Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms
ISO/IEC 15946-2:2002 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 2: Digital signatures
ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
ISO/IEC 10181-5:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Confidentiality framework
ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
ISO/IEC 8824-1:2015 Information technology Abstract Syntax Notation One (ASN.1): Specification of basic notation Part 1:
ISO/IEC 9594-2:2017 Information technology Open Systems Interconnection The Directory Part 2: Models
ISO/IEC 10181-6:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Integrity framework
ISO/IEC 10118-2:2010 Information technology Security techniques Hash-functions Part 2: Hash-functions using an n-bit block cipher
ISO/IEC 14888-2:2008 Information technology Security techniques Digital signatures with appendix Part 2: Integer factorization based mechanisms
ISO/IEC 8824-3:2015 Information technology Abstract Syntax Notation One (ASN.1): Constraint specification Part 3:
ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
ISO/IEC 9594-5:2017 Information technology Open Systems Interconnection The Directory Part 5: Protocol specifications
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques

View more information
US$311.44
Excluding Tax where applicable

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.