ISO/IEC 14888-3:2018

IT Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms ISO/IEC 14888-3:2018

Publication date:   Nov 12, 2018

General information

90.93 Standard confirmed   May 3, 2024

ISO/IEC

ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection

International Standard

35.030   IT Security

Buying

Published

Language in which you want to receive the document.

Scope

This document specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem.
This document provides
— a general description of a digital signature with appendix mechanism, and
— a variety of mechanisms that provide digital signatures with appendix.
For each mechanism, this document specifies
— the process of generating a pair of keys,
— the process of producing signatures, and
— the process of verifying signatures.
Annex A defines object identifiers assigned to the digital signature mechanisms specified in this document, and defines algorithm parameter structures.
Annex B defines conversion functions of FE2I, I2FE, FE2BS, BS2I, I2BS, I2OS and OS2I used in this document.
Annex D defines how to generate DSA domain parameters.

Life cycle

PREVIOUSLY

WITHDRAWN
ISO/IEC 14888-3:2016

ABANDON
ISO/IEC 14888-3:2016/DAmd 1

NOW

PUBLISHED
ISO/IEC 14888-3:2018
90.93 Standard confirmed
May 3, 2024

CORRIGENDA / AMENDMENTS

IN_DEVELOPMENT
ISO/IEC 14888-3:2018/AWI Amd 1