QUICK

TOP

해외표준 상세정보

관심표준 등록 : 표준업데이트 시 알림서비스

제공형태 더보기
  • subList_img01

    표준

    판매

    ISO/IEC 14888-2:2008

    Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms
    • 발행일 : 2008-04-01
    • 발행기관 : ISO/IEC
    즐겨찾기 장바구니 담기
    닫기

    상품이 장바구니에 담겼습니다.

    장바구니로 이동
    • [영어]PDF 350,900원

    • [영어]PRINT 350,900원

상세정보

분야 ISO/IEC JTC 1/SC 27 : Information security, cybersecurity and privacy protection
적용범위

ISO/IEC 14888 specifies digital signature with appendix. As no part of the message is recovered from the signature (the recoverable part of the message is empty), the signed message consists of the signature and the whole message.

NOTE ISO/IEC 9796 specifies digital signature giving message recovery. As all or part of the message is recovered from the signature, the recoverable part of the message is not empty. The signed message consists of either the signature only (when the non-recoverable part of the message is empty), or both the signature and the non-recoverable part.

ISO/IEC 14888-2:2008 specifies digital signatures with appendix whose security is based on the difficulty of factoring the modulus in use. For each signature scheme, it specifies:

  • the relationships and constraints between all the data elements required for signing and verifying;
  • a signature mechanism, i.e. how to produce a signature of a message with the data elements required for signing;
  • a verification mechanism, i.e. how to verify a signature of a message with the data elements required for verifying.

The title of ISO/IEC 14888-2 has changed from Identity-based mechanisms (first edition) to Integer factorization based mechanisms (second edition).

  1. ISO/IEC 14888-2:2008 includes the identity-based scheme specified in ISO/IEC 14888-2:1999, namely the GQ1 scheme. This scheme has been revised due to the withdrawal of ISO/IEC 9796:1991 in 1999.
  2. Among the certificate-based schemes specified in ISO/IEC 14888-3:1998, it includes all the schemes based on the difficulty of factoring the modulus in use, namely, the RSA, RW and ESIGN schemes. These schemes have been revised due to the withdrawal of ISO/IEC 9796:1991 in 1999.
  3. It takes into account ISO/IEC 14888-3:1998/Cor.1:2001, technical corrigendum of the ESIGN scheme.
  4. It includes a format mechanism, namely the PSS mechanism, also specified in ISO/IEC 9796-2:2002, and details of how to use it in each of the RSA, RW, GQ1 and ESIGN schemes.
  5. It includes new certificate-based schemes that use no format mechanism, namely, the GQ2, GPS1 and GPS2 schemes.
  6. For each scheme and its options, as needed, it provides an object identifier.
국제분류(ICS)코드 35.030 : IT 보안
페이지수 66
Edition 2

이력정보

No. 표준번호 표준명 발행일 상태
1 ISO/IEC 14888-2:2008/COR1:2015상세보기 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms - Technical Corrigendum 1: To ISO/IEC 14888-2:2008 2015-09-15 표준
2 ISO/IEC 14888-2:2008/Cor 1:2015상세보기 Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms — Technical Corrigendum 1: To ISO/IEC 14888-2:2008 2015-09-15 표준
3 CSA ISO/IEC 14888-2:09 (R2019)상세보기 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms (Adopted ISO/IEC 14888-2:2008, second edition, 2008-04-15) 2009-01-01 표준
4 ISO/IEC 14888-2:2008상세보기 Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms 2008-04-01 표준
5 ISO/IEC 14888-2:2008상세보기 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms 2008-04-01 표준
6 ISO/IEC 14888-2:1999상세보기 Information technology — Security techniques — Digital signatures with appendix — Part 2: Identity-based mechanisms 1999-12-16 구판
7 ISO/IEC 14888-2:1999상세보기 Information technology - Security techniques - Digital signatures with appendix - Part 2: Identity-based mechanisms 1999-12-16 구판

제공형태 닫기

  • PDF :

    직접 파일 다운로드 및 인쇄(마이페이지 확인)
  • 보안PDF :

    직접 파일 다운로드 및 인쇄(마이페이지 확인)* 단, 파일이동 및 복사 불가, 1회 다운로드 및 인쇄가능
  • PRINT :

    인쇄본 우편발송, 2~3일 소요(PDF파일 미제공)
  • BOOK :

    인쇄본 우편발송, 2~3일 소요(PDF파일 미제공)
  • ZIP :

    압축파일형태로 제공 (PDF, HTML, TXT, XLS 등으로 구성), 직접 파일 다운로드(마이페이지 확인)
  • CD/DVD :

    직접 파일 다운로드 및 인쇄(마이페이지 확인)
  • DB :

    별도 정보 제공
  • HARDCOPY :

    해외 배송 상품, 최대 3주 소요
  • 바인더 :

    바인더 우편발송, 2~3일 소요
  • 온라인구독 :

    WEB 접속 후 실시간 열람, 출력(1년간)