ISO/IEC 14888-3:2018

IT Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms

Publication date:   Nov 12, 2018

General information

90.93 Standard confirmed   May 3, 2024

ISO/IEC

ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection

International Standard

35.030   IT Security

Buying

  Published

PDF - €261.36

  English  



Buy

Scope

This document specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem.
This document provides
— a general description of a digital signature with appendix mechanism, and
— a variety of mechanisms that provide digital signatures with appendix.
For each mechanism, this document specifies
— the process of generating a pair of keys,
— the process of producing signatures, and
— the process of verifying signatures.
Annex A defines object identifiers assigned to the digital signature mechanisms specified in this document, and defines algorithm parameter structures.
Annex B defines conversion functions of FE2I, I2FE, FE2BS, BS2I, I2BS, I2OS and OS2I used in this document.
Annex D defines how to generate DSA domain parameters.

Life cycle

PREVIOUSLY

WITHDRAWN
ISO/IEC 14888-3:2016

ABANDON
ISO/IEC 14888-3:2016/DAmd 1

NOW

PUBLISHED
ISO/IEC 14888-3:2018
90.93 Standard confirmed
May 3, 2024

CORRIGENDA / AMENDMENTS

IN_DEVELOPMENT
ISO/IEC 14888-3:2018/AWI Amd 1