관심표준 등록 : 표준업데이트 시 알림을 받을 수 있습니다.
PDF : 직접 파일 다운로드 및 인쇄 (마이페이지 확인)
PRINT : 인쇄본 우편발송, 2~3일 소요(PDF파일 미제공)
분야 | ISO/IEC JTC 1/SC 27 : Information security, cybersecurity and privacy protection |
---|---|
적용범위 | ISO/IEC 14888-3:2006 specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem. It provides a general description of a digital signature with appendix mechanism, and a variety of mechanisms that provide digital signatures with appendix. For each mechanism, ISO/IEC 14888-3:2006 specifies the process of generating keys, the process of producing signatures, and the process of verifying signatures. The verification of a digital signature requires the signing entity's verification key. It is thus essential for a verifier to be able to associate the correct verification key with the signing entity, or more precisely, with (parts of) the signing entity's identification data. This association may be provided by another means that is not covered in ISO/IEC 14888-3:2006. Whatever the nature of such means, the scheme is then said to be 'certificate-based'. If not, the association between the correct verification key and the signing entity's identification data is somehow inherent in the verification key itself. In such a case, the scheme is said to be 'identity-based'. Depending on the two different ways of checking the correctness of the verification keys, the digital signature mechanisms specified in ISO/IEC 14888-3:2006 are categorized in two groups: certificate-based and identity-based. |
국제분류(ICS)코드 | 35.030 : IT 보안 |
페이지수 | 68 |
Edition | 2.0 |
No. | 표준번호 | 표준명 | 발행일 | 상태 |
---|---|---|---|---|
1 | CSA ISO/IEC 14888-3:19 | IT Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms (Adopted ISO/IEC 14888-3:2018, fourth edition, 2018-11) | 2019-01-01 | 표준 |
2 | ISO/IEC 14888-3:2018 | IT Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms | 2018-11-12 | 표준 |
3 | ISO/IEC 14888-3:2018 | IT Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms | 2018-11-12 | 표준 |
4 | ISO/IEC 14888-3:2016 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms | 2016-03-17 | 구판 |
5 | ISO/IEC 14888-3:2016 | Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms | 2016-03-17 | 구판 |
6 | ISO/IEC 14888-3:2006/AMD2:2012 | Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms - Amendment 2: Optimizing hash inputs | 2012-06-27 | 구판 |
7 | ISO/IEC 14888-3:2006/Amd 2:2012 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 2: Optimizing hash inputs | 2012-06-27 | 구판 |
8 | ISO/IEC 14888-3:2006/Amd 1:2010 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 1: Elliptic Curve Russian Digital Signature Algorithm, Schnorr Digital Signature Algorithm, Elliptic Curve Schnorr Digital Signature Algorithm, and Elliptic Curve Full Schnorr Digital Signature Algorithm | 2010-06-04 | 구판 |
9 | ISO/IEC 14888-3:2006/AMD1:2010 | Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms - Amendment 1: Elliptic Curve Russian Digital Signature Algorithm, Schnorr Digital Signature Algorithm, Elliptic Curve Schnorr Digital Signature Algorithm, and Elliptic Curve Full Schnorr Digital Signature Algorithm | 2010-06-04 | 구판 |
10 | ISO/IEC 14888-3:2006/COR2:2009 | Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms - Technical Corrigendum 2 | 2009-02-16 | 구판 |
11 | ISO/IEC 14888-3:2006/Cor 2:2009 | 2009-02-16 | 구판 | |
12 | ISO/IEC 14888-3:2006/COR1:2007 | Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms - Technical Corrigendum 1 | 2007-08-16 | 구판 |
13 | ISO/IEC 14888-3:2006/Cor 1:2007 | 2007-08-16 | 구판 | |
14 | ISO/IEC 14888-3:2006 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms | 2006-11-13 | 구판 |
15 | ISO/IEC 14888-3:2006 | Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms | 2006-11-13 | 구판 |
16 | ISO/IEC 14888-3:1998/COR1:2001 | Information technology - Security techniques - Digital signatures with appendix - Part 3: Certificate-based mechanisms - Technical Corrigendum 1 | 2001-10-04 | 구판 |
17 | ISO/IEC 14888-3:1998/Cor 1:2001 | 2001-10-04 | 구판 | |
18 | ISO/IEC 14888-3:1998 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Certificate-based mechanisms | 1998-12-20 | 구판 |
19 | ISO/IEC 14888-3:1998 | Information technology - Security techniques - Digital signatures with appendix - Part 3: Certificate-based mechanisms | 1998-12-20 | 구판 |
ISO/IEC 14888-2:2008 - Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms 상세보기
ISO/IEC 14888-1:2008 - Information technology - Security techniques - Digital signatures with appendix - Part 1: General 상세보기
ISO/IEC 14888-1:2008 - Information technology — Security techniques — Digital signatures with appendix — Part 1: General 상세보기
ISO/IEC 14888-2:2008 - Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms 상세보기
CSA ISO/IEC 14888-2:09 (R2019) - Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms (Adopted ISO/IEC 14888-2:2008, second edition, 2008-04-15) 상세보기
함께 구입한 상품이 존재하지 않습니다.
IEC TS 63134:2020 - Active assisted living (AAL) use cases 상세보기
IEC 60034-5:2020 RLV - Rotating electrical machines - Part 5: Degrees of protection provided by the integral design of rotating electrical machines (IP code) - Classification 상세보기
KS B ISO TS 25740-1 - 에스컬레이터 및 무빙워크에 대한 안전요건 — 제1부: 세계공통 필수 안전요건(GESRs) 상세보기
KS B ISO TS 8100-21 - 승객 및 화물 운송용 엘리베이터 —제21부: 세계공통 필수안전요건(GESRs)을 충족하는 세계공통 안전 파라미터(GSPs) 상세보기
KS C IEC TS 62872 - 산업 시설과 스마트 그리드 사이의 산업 공정 측정, 제어 및 자동화 시스템 인터페이스 상세보기