ISO/IEC 14888-3:2018 Preview

IT Security techniques -- Digital signatures with appendix -- Part 3: Discrete logarithm based mechanisms

This document specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem.

This document provides

— a general description of a digital signature with appendix mechanism, and

— a variety of mechanisms that provide digital signatures with appendix.

For each mechanism, this document specifies

— the process of generating a pair of keys,

— the process of producing signatures, and

— the process of verifying signatures.

Annex A defines object identifiers assigned to the digital signature mechanisms specified in this document, and defines algorithm parameter structures.

Annex B defines conversion functions of FE2I, I2FE, FE2BS, BS2I, I2BS, I2OS and OS2I used in this document.

Annex D defines how to generate DSA domain parameters.


General information

  • Status :  Published
    Publication date : 2018-11
  • Edition : 4
    Number of pages : 155
  • :
    ISO/IEC JTC 1/SC 27
    Information Security, cybersecurity and privacy protection
  • 35.030
    IT Security

Buy this standard

Format Language
PDF + ePub
Paper
  • CHF198

Got a question?

Check out our FAQs

Customer care
+41 22 749 08 88

Opening hours:
Monday to Friday - 09:00-12:00, 14:00-17:00 (UTC+1)

Keep up to date with ISO

Sign up to our newsletter for the latest news, views and product information

 Subscribe