ISO/IEC 14888-3:2018 

IT Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms


Do you need a multi-user copy?




ISO/IEC 14888-3:2018 This document specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem.
This document provides
- a general description of a digital signature with appendix mechanism, and
- a variety of mechanisms that provide digital signatures with appendix.
For each mechanism, this document specifies
- the process of generating a pair of keys,
- the process of producing signatures, and
- the process of verifying signatures.
Annex A defines object identifiers assigned to the digital signature mechanisms specified in this document, and defines algorithm parameter structures.
Annex B defines conversion functions of FE2I, I2FE, FE2BS, BS2I, I2BS, I2OS and OS2I used in this document.
Annex D defines how to generate DSA domain parameters.

Look inside

Relevant for

cyber security

smart city

Additional information

Publication typeInternational Standard
Publication date2018-11-12
Available language(s)English
TC/SCISO/IEC JTC 1/SC 27 - Information security, cybersecurity and privacy protectionrss
ICS35.030 - IT Security
File size3558 KB

The following test report forms are related:

Related publications

Share this page

Share your publications

Learn how to share your publications with your colleagues, using networking options.

Payment information

Our prices are in Swiss francs (CHF). We accept all major credit cards (American Express, Mastercard and Visa, JCB and CUP), PayPal and bank transfers as form of payment.

Keep in touch

Keep up to date with new publication releases and announcements with our free IEC Just Published email newsletter.

Contact customer services

Please send your enquiry by email or call us on +41 22 919 02 11 between 09:00 – 17:00 CET Monday to Friday.