Share by email

ISO/IEC 14888-3

ISO/IEC 14888-3:2018
IT Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms
This document specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem.
This document provides
— a general description of a digital signature with appendix mechanism, and
— a variety of mechanisms that provide digital signatures with appendix.
For each mechanism, this document specifies
— the process of generating a pair of keys,
— the process of producing signatures, and
— the process of verifying signatures.
Annex A defines object identifiers assigned to the digital signature mechanisms specified in this document, and defines algorithm parameter structures.
Annex B defines conversion functions of FE2I, I2FE, FE2BS, BS2I, I2BS, I2OS and OS2I used in this document.
Annex D defines how to generate DSA domain parameters.
BASE PUBLICATION
English
  CHF 221.-

Technical committee

ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection

Keywords

Cyber security - Smart city
Publication typeInternational Standard
Publication date2018-11-12
Edition4.0
ICS

35.030

Pages155
File size14.54 MB
EditionDatePublicationEditionStatus
Edition 42018-11-12ISO/IEC 14888-3:20184.0Valid
Edition 32016-03-17ISO/IEC 14888-3:20163.0Revised
Edition 22012-06-27ISO/IEC 14888-3:2006/AMD2:20122.0Revised
Edition 12001-10-04ISO/IEC 14888-3:1998/COR1:20011.0Revised
  • IEC 62680-1-4:2018
    TC 100/TA 18

Related publications