ISO/IEC 14888-3:1998
Information technology - Security techniques - Digital signatures with appendix - Part 3: Certificate-based mechanisms

Standard No.
ISO/IEC 14888-3:1998
Release Date
1998
Published By
International Organization for Standardization (ISO)
Status
 2006-11
Replace By
ISO/IEC 14888-3:1998/Cor 1:2001
Latest
ISO/IEC 14888-3:2018
Scope
ISO/IEC 14888 specifies digital signature mechanisms with appendix for messages of arbitrary length and is applicable for providing data origin authentication, non-repudiation, and integrity of data. This part of ISO/IEC 14888 specifies certificate-based digital signature mechanisms with appendix. In particular, this part of ISO/IEC 14888 provides 1) a general description of certificate-based digital signature mechanisms whose security is based on the difficulty of the discrete logarithm problem in the underlying commutative group (see Clause 6), 2) a general description of certificate-based digital signature mechanisms whose security is based on the difficulty of factoring (see Clause 7), and 3) a variety of normative digital signature mechanisms with appendix using certificate-based mechanisms for messages of arbitrary length (see Annex A and B).

ISO/IEC 14888-3:1998 history

  • 2018 ISO/IEC 14888-3:2018 IT Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
  • 2016 ISO/IEC 14888-3:2016 Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms
  • 2012 ISO/IEC 14888-3:2006/Amd 2:2012 Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms - Amendment 2: Optimizing hash inputs
  • 2010 ISO/IEC 14888-3:2006/Amd 1:2010 Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms - Amendment 1: Elliptic Curve Russian Digital Signature Algorithm, Schnorr Digital Signature Algorithm, Elliptic Curve Schnorr Di
  • 2009 ISO/IEC 14888-3:2006/Cor 2:2009 Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms; Technical Corrigendum 2
  • 2007 ISO/IEC 14888-3:2006/Cor 1:2007 Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms; Technical Corrigendum 1
  • 2006 ISO/IEC 14888-3:2006 Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms
  • 2001 ISO/IEC 14888-3:1998/Cor 1:2001 Information technology - Security techniques; Digital signatures with appendix - Part 3: Certificate-based mechanisms; Technical Corrigendum 1
  • 1998 ISO/IEC 14888-3:1998 Information technology - Security techniques - Digital signatures with appendix - Part 3: Certificate-based mechanisms



Copyright ©2024 All Rights Reserved