QUICK

TOP

해외표준 상세정보

관심표준 등록 : 표준업데이트 시 알림서비스

제공형태 더보기
  • subList_img01

    구판

    판매

    ISO/IEC 14888-3:2006

    Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
    • 발행일 : 2006-11-13
    • 발행기관 : ISO/IEC
    즐겨찾기 장바구니 담기
    닫기

    상품이 장바구니에 담겼습니다.

    장바구니로 이동
    • [영어]PDF 114,600원

    • [영어]PRINT 114,600원

상세정보

분야 ISO/IEC JTC 1/SC 27 : Information security, cybersecurity and privacy protection
적용범위

ISO/IEC 14888-3:2006 specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem. It provides a general description of a digital signature with appendix mechanism, and a variety of mechanisms that provide digital signatures with appendix.

For each mechanism, ISO/IEC 14888-3:2006 specifies the process of generating keys, the process of producing signatures, and the process of verifying signatures.

The verification of a digital signature requires the signing entity's verification key. It is thus essential for a verifier to be able to associate the correct verification key with the signing entity, or more precisely, with (parts of) the signing entity's identification data. This association may be provided by another means that is not covered in ISO/IEC 14888-3:2006. Whatever the nature of such means, the scheme is then said to be 'certificate-based'. If not, the association between the correct verification key and the signing entity's identification data is somehow inherent in the verification key itself. In such a case, the scheme is said to be 'identity-based'. Depending on the two different ways of checking the correctness of the verification keys, the digital signature mechanisms specified in ISO/IEC 14888-3:2006 are categorized in two groups: certificate-based and identity-based.

국제분류(ICS)코드 35.030 : IT 보안
페이지수 68
Edition 2

이력정보

No. 표준번호 표준명 발행일 상태
1 CSA ISO/IEC 14888-3:19상세보기 IT Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms (Adopted ISO/IEC 14888-3:2018, fourth edition, 2018-11) 2019-01-01 표준
2 ISO/IEC 14888-3:2018상세보기 IT Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms 2018-11-12 표준
3 ISO/IEC 14888-3:2018상세보기 IT Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms 2018-11-12 표준
4 CAN/CSA-ISO/IEC 14888-3:18상세보기 Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms (Adopted ISO/IEC 14888-3:2016, third edition, 2016-03-15) 2018-01-01 폐지
5 ISO/IEC 14888-3:2016상세보기 Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms 2016-03-17 구판
6 ISO/IEC 14888-3:2016상세보기 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms 2016-03-17 구판
7 ISO/IEC 14888-3:2006/AMD2:2012상세보기 Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms - Amendment 2: Optimizing hash inputs 2012-06-27 구판
8 ISO/IEC 14888-3:2006/Amd 2:2012상세보기 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 2: Optimizing hash inputs 2012-06-27 구판
9 ISO/IEC 14888-3:2006/AMD1:2010상세보기 Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms - Amendment 1: Elliptic Curve Russian Digital Signature Algorithm, Schnorr Digital Signature Algorithm, Elliptic Curve Schnorr Digital Signature Algorithm, and Elliptic Curve Full Schnorr Digital Signature Algorithm 2010-06-04 구판
10 ISO/IEC 14888-3:2006/Amd 1:2010상세보기 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 1: Elliptic Curve Russian Digital Signature Algorithm, Schnorr Digital Signature Algorithm, Elliptic Curve Schnorr Digital Signature Algorithm, and Elliptic Curve Full Schnorr Digital Signature Algorithm 2010-06-04 구판
11 ISO/IEC 14888-3:2006/COR2:2009상세보기 Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms - Technical Corrigendum 2 2009-02-16 구판
12 ISO/IEC 14888-3:2006/Cor 2:2009상세보기 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Technical Corrigendum 2 2009-02-16 구판
13 ISO/IEC 14888-3:2006/COR1:2007상세보기 Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms - Technical Corrigendum 1 2007-08-16 구판
14 ISO/IEC 14888-3:2006/Cor 1:2007상세보기 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Technical Corrigendum 1 2007-08-16 구판
15 ISO/IEC 14888-3:2006상세보기 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms 2006-11-13 구판
16 ISO/IEC 14888-3:2006상세보기 Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms 2006-11-13 구판
17 ISO/IEC 14888-3:1998/Cor 1:2001상세보기 Information technology — Security techniques — Digital signatures with appendix — Part 3: Certificate-based mechanisms — Technical Corrigendum 1 2001-10-04 구판
18 ISO/IEC 14888-3:1998/COR1:2001상세보기 Information technology - Security techniques - Digital signatures with appendix - Part 3: Certificate-based mechanisms - Technical Corrigendum 1 2001-10-04 구판
19 ISO/IEC 14888-3:1998상세보기 Information technology - Security techniques - Digital signatures with appendix - Part 3: Certificate-based mechanisms 1998-12-20 구판
20 ISO/IEC 14888-3:1998상세보기 Information technology — Security techniques — Digital signatures with appendix — Part 3: Certificate-based mechanisms 1998-12-20 구판
21 ISO/IEC 14888-3:2016/DAmd 1상세보기 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 1: SM2 digital signature mechanism 폐지

다른 사람이 함께 구입한 상품

  • 함께 구입한 상품이 존재하지 않습니다.

제공형태 닫기

  • PDF :

    직접 파일 다운로드 및 인쇄(마이페이지 확인)
  • 보안PDF :

    직접 파일 다운로드 및 인쇄(마이페이지 확인)* 단, 파일이동 및 복사 불가, 1회 다운로드 및 인쇄가능
  • PRINT :

    인쇄본 우편발송, 2~3일 소요(PDF파일 미제공)
  • BOOK :

    인쇄본 우편발송, 2~3일 소요(PDF파일 미제공)
  • ZIP :

    압축파일형태로 제공 (PDF, HTML, TXT, XLS 등으로 구성), 직접 파일 다운로드(마이페이지 확인)
  • CD/DVD :

    직접 파일 다운로드 및 인쇄(마이페이지 확인)
  • DB :

    별도 정보 제공
  • HARDCOPY :

    해외 배송 상품, 최대 3주 소요
  • 바인더 :

    바인더 우편발송, 2~3일 소요
  • 온라인구독 :

    WEB 접속 후 실시간 열람, 출력(1년간)