Language:
    • Available Formats
    •  
    • Availability
    • Priced From ( in USD )
    • Secure PDF 🔒
    • Immediate download
    • $210.00
    • Add to Cart
    • Printed Edition
    • Ships in 1-2 business days
    • $210.00
    • Add to Cart

Customers Who Bought This Also Bought

 

About This Item

 

Full Description

Scope:

This document specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem.

This document provides
  • a general description of a digital signature with appendix mechanism, and
  • a variety of mechanisms that provide digital signatures with appendix.
For each mechanism, this document specifies
  • the process of generating a pair of keys,
  • the process of producing signatures, and
  • the process of verifying signatures.
Annex A defines object identifiers assigned to the digital signature mechanisms specified in this document, and defines algorithm parameter structures.

Annex B defines conversion functions of FE2I, I2FE, FE2BS, BS2I, I2BS, I2OS and OS2I used in this document.

Annex D defines how to generate DSA domain parameters.
 

Document History

  1. CAN/CSA-ISO/IEC 14888-3:19

    👀 currently
    viewing


    IT Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms (Adopted ISO/IEC 14888-3:2018, fourth edition, 2018-11)

    • Most Recent
  2. CAN/CSA-ISO/IEC 14888-3:18


    Information Technology - Security Techniques - Digital Signatures with Appendix - Part 3: Discrete Logarithm Based Mechanisms (Adopted ISO/IEC 14888-3:2016, third edition, 2016-03-15)

    • Historical Version
  3. CAN/CSA-ISO/IEC 14888-3-07 (R2017)


    Information Technology - Security Techniques - Digital Signatures with Appendix - Part 3: Discrete Logarithm Based Mechanisms (Adopted ISO/IEC 14888-3:2006, second edition, 2006-11-15)

    • Historical Version