• There are no items in your cart

CSA ISO/IEC 14888-2 : 2009 : INC : COR 1 : 2016 : R201400

Superseded
Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by
superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 2: INTEGER FACTORIZATION BASED MECHANISMS
Available format(s)

Hardcopy , PDF

Superseded date

07-26-2021

Language(s)

English

Published date

01-01-2014

Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 General
6 RSA and RW schemes
7 GQ1 scheme (identity-based scheme)
8 GQ2 scheme
9 GPS1 scheme
10 GPS2 scheme
11 ESIGN scheme
Annex A (normative) - Object identifiers
Annex B (informative) - Guidance on parameter choice
        and comparison of signature schemes
Annex C (informative) - Numerical examples
Annex D (informative) - Two other format mechanisms for
        RSA/RW schemes
Annex E (informative) - Products allowing message recovery for
        RSA/RW verification mechanisms
Annex F (informative) - Products allowing two-pass authentication
        for GQ/GPS schemes
Bibliography

Defines digital signatures with appendix whose security is based on the difficulty of factoring the modulus in use.

DocumentType
Standard
Pages
90
ProductNote
Reconfirmed EN
PublisherName
Canadian Standards Association
Status
Superseded
SupersededBy

Standards Relationship
ISO/IEC 14888-2:2008 Identical

ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
ISO/IEC 18032:2005 Information technology Security techniques Prime number generation
ISO/IEC 9798-3:1998 Information technology Security techniques Entity authentication Part 3: Mechanisms using digital signature techniques
ISO/IEC 14888-3:2016 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
ISO/IEC 8825-1:2015 Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1:
ISO/IEC 15945:2002 Information technology — Security techniques — Specification of TTP services to support the application of digital signatures
ISO/IEC 9594-8:2017 Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks
ISO/IEC 9798-5:2009 Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques
ISO/IEC 14888-1:2008 Information technology Security techniques Digital signatures with appendix Part 1: General
ISO/IEC 8824-1:2015 Information technology Abstract Syntax Notation One (ASN.1): Specification of basic notation Part 1:

View more information
US$246.00
Excluding Tax where applicable

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.