Customer Service:
Mon - Fri: 8:30 am - 6 pm EST

 Most recent

ISO/IEC 14888-3:2018

IT Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms

This document specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem.

This document provides

— a general description of a digital signature with appendix mechanism, and

— a variety of mechanisms that provide digital signatures with appendix.

For each mechanism, this document specifies

— the process of generating a pair of keys,

— the process of producing signatures, and

— the process of verifying signatures.

Annex A defines object identifiers assigned to the digital signature mechanisms specified in this document, and defines algorithm parameter structures.

Annex B defines conversion functions of FE2I, I2FE, FE2BS, BS2I, I2BS, I2OS and OS2I used in this document.

Annex D defines how to generate DSA domain parameters.

Content Provider
International Organization for Standardization [ISO]

Others Also Bought

ISO/IEC 10118-3:2018
IT Security techniques - Hash-functions - Part 3: Dedicated hash-functions
ISO/IEC 18033-4:2011
Information technology - Security techniques - Encryption algorithms - Part 4: Stream ciphers
ISO/IEC 18031:2011
Information technology - Security techniques - Random bit generation

As the voice of the U.S. standards and conformity assessment system, the American National Standards Institute (ANSI) empowers its members and constituents to strengthen the U.S. marketplace position in the global economy while helping to assure the safety and health of consumers and the protection of the environment.