PRICES include / exclude VAT
Homepage>BS Standards>35 INFORMATION TECHNOLOGY. OFFICE MACHINES>35.030 IT Security>BS ISO/IEC 14888-2:2008 Information technology. Security techniques. Digital signatures with appendix Integer factorization based mechanisms
Sponsored link
immediate downloadReleased: 2015-10-31
BS ISO/IEC 14888-2:2008 Information technology. Security techniques. Digital signatures with appendix Integer factorization based mechanisms

BS ISO/IEC 14888-2:2008

Information technology. Security techniques. Digital signatures with appendix Integer factorization based mechanisms

Format
Availability
Price and currency
English Secure PDF
Immediate download
376.80 EUR
You can read the standard for 1 hour. More information in the category: E-reading
Reading the standard
for 1 hour
37.68 EUR
You can read the standard for 24 hours. More information in the category: E-reading
Reading the standard
for 24 hours
113.04 EUR
English Hardcopy
In stock
376.80 EUR
Standard number:BS ISO/IEC 14888-2:2008
Pages:76
Released:2015-10-31
ISBN:978 0 580 90344 1
Status:Standard
DESCRIPTION

BS ISO/IEC 14888-2:2008


This standard BS ISO/IEC 14888-2:2008 Information technology. Security techniques. Digital signatures with appendix is classified in these ICS categories:
  • 35.030 IT Security

This part of ISO/IEC 14888 specifies digital signatures with appendix whose security is based on the difficulty of factoring the modulus in use. For each signature scheme, it specifies:

  1. the relationships and constraints between all the data elements required for signing and verifying;

  2. a signature mechanism, i.e., how to produce a signature of a message with the data elements required for signing;

  3. a verification mechanism, i.e., how to verify a signature of a message with the data elements required for verifying.

The production of key pairs requires random bits and prime numbers. The production of signatures often requires random bits. Techniques for producing random bits and prime numbers are outside the scope of this part of ISO/IEC 14888. For further information, see ISO/IEC 18031 [33] and ISO/IEC 18032 [34].

Various means are available to obtain a reliable copy of the public verification key, e.g., a public key certificate. Techniques for managing keys and certificates are outside the scope of this part of ISO/IEC 14888. For further information, see ISO/IEC 9594-8 [27], ISO/IEC 11770 [31] and ISO/IEC 15945 [32].