PRICES include / exclude VAT
Homepage>BS Standards>35 INFORMATION TECHNOLOGY. OFFICE MACHINES>35.030 IT Security>BS ISO/IEC 14888-3:2018 IT Security techniques. Digital signatures with appendix Discrete logarithm based mechanisms
immediate downloadReleased: 2018-11-15
BS ISO/IEC 14888-3:2018 IT Security techniques. Digital signatures with appendix Discrete logarithm based mechanisms

BS ISO/IEC 14888-3:2018

IT Security techniques. Digital signatures with appendix Discrete logarithm based mechanisms

Format
Availability
Price and currency
English Secure PDF
Immediate download
486.20 USD
You can read the standard for 1 hour. More information in the category: E-reading
Reading the standard
for 1 hour
48.62 USD
You can read the standard for 24 hours. More information in the category: E-reading
Reading the standard
for 24 hours
145.86 USD
English Hardcopy
In stock
486.20 USD
Standard number:BS ISO/IEC 14888-3:2018
Pages:166
Released:2018-11-15
ISBN:978 0 539 01614 7
Status:Standard
DESCRIPTION

BS ISO/IEC 14888-3:2018


This standard BS ISO/IEC 14888-3:2018 IT Security techniques. Digital signatures with appendix is classified in these ICS categories:
  • 35.030 IT Security
  • 35.040.01 Information coding in general

This document specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem.

This document provides

  • a general description of a digital signature with appendix mechanism, and

  • a variety of mechanisms that provide digital signatures with appendix.

For each mechanism, this document specifies

  • the process of generating a pair of keys,

  • the process of producing signatures, and

  • the process of verifying signatures.

Annex A defines object identifiers assigned to the digital signature mechanisms specified in this document, and defines algorithm parameter structures.

Annex B defines conversion functions of FE2I, I2FE, FE2BS, BS2I, I2BS, I2OS and OS2I used in this document.

Annex D defines how to generate DSA domain parameters.