BS-ISO-IEC-9796-2-2002-A1-2008.pdf
《BS-ISO-IEC-9796-2-2002-A1-2008.pdf》由会员分享,可在线阅读,更多相关《BS-ISO-IEC-9796-2-2002-A1-2008.pdf(62页珍藏版)》请在三一文库上搜索。
1、BRITISH STANDARD BS ISO/IEC 9796-2:2002 +A1:2008 Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms ICS 35.040 ? Copyright British Standards Institution Provided by IHS under license with BSI - Uncontrolled Copy
2、 Licensee=Boeing Co/5910770001 Not for Resale, 10/17/2008 23:31:52 MDTNo reproduction or networking permitted without license from IHS -,-,- BS ISO/IEC 9796-2:2002+A1:2008 This British Standard was published under the authority of the Standards Policy and Strategy Committee on 24 October 2002 BSI 20
3、08 ISBN 978 0 580 62019 5 National foreword This British Standard is the UK implementation of ISO/IEC 9796-2:2002+A1:2008. It supersedes BS ISO/IEC 9796-2:2002 which is withdrawn. The UK participation in its preparation was entrusted to Technical Committee IST/33, IT Security techniques. A list of o
4、rganizations represented on this committee can be obtained on request to its secretary. This publication does not purport to include all the necessary provisions of a contract. Users are responsible for its correct application. Compliance with a British Standard cannot confer immunity from legal obl
5、igations. Amendments/corrigenda issued since publication DateComments 30 May 2008Implementation of ISO/IEC amendment 1:2008, insertion of Annex E Copyright British Standards Institution Provided by IHS under license with BSI - Uncontrolled Copy Licensee=Boeing Co/5910770001 Not for Resale, 10/17/200
6、8 23:31:52 MDTNo reproduction or networking permitted without license from IHS -,-,- Reference number ISO/IEC 9796-2:2002(E) INTERNATIONAL STANDARD ISO/IEC 9796-2 Second edition 2002-10-01 Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer fa
7、ctorization based mechanisms Technologies de linformation Techniques de scurit Schmas de signature numrique rtablissant le message Partie 2: Mcanismes bass sur une factorisation entire BS ISO/IEC 9796-2:2002+A1:2008 Copyright British Standards Institution Provided by IHS under license with BSI - Unc
8、ontrolled Copy Licensee=Boeing Co/5910770001 Not for Resale, 10/17/2008 23:31:52 MDTNo reproduction or networking permitted without license from IHS -,-,- ii Copyright British Standards Institution Provided by IHS under license with BSI - Uncontrolled Copy Licensee=Boeing Co/5910770001 Not for Resal
9、e, 10/17/2008 23:31:52 MDTNo reproduction or networking permitted without license from IHS -,-,- Contents s Forewordv Introduction vi 1Scope.1 2Normative references 1 3Terms and definitions1 4Symbols and abbreviated terms.3 5Converting between bit strings and integers5 6Requirements.5 7Model for sig
10、nature and verification processes.6 7.1Signing a message.7 7.1.1Overview.7 7.1.2Message allocation7 7.1.3Message representative production 7 7.1.4Signature production.7 7.2Verifying a signature8 7.2.1Overview.8 7.2.2Signature opening8 7.2.3Message recovery8 7.2.4Message assembly.8 7.3Specifying a si
11、gnature scheme8 8Digital signature scheme 1 .9 8.1Parameters9 8.1.1Modulus length.9 8.1.2Trailer field options9 8.1.3Capacity 9 8.2Message representative production 9 8.2.1Hashing the message9 8.2.2Formatting 9 8.3Message recovery10 9Digital signature scheme 2 .11 9.1Parameters11 9.1.1Modulus length
12、.11 9.1.2Salt length.11 9.1.3Trailer field options11 9.1.4Capacity 12 9.2Message representative production 12 9.2.1Hashing the message12 9.2.2Formatting 12 9.3Message recovery12 10Digital signature scheme 3 .13 Annex A (normative) Public key system for digital signature14 Annex B (normative) Mask ge
13、neration function 18 Annex C (informative) On hash-function identifiers and the choice of the recoverable length of the message20 Annex D (informative) Examples21 Bibliography 50 Page Annex E (normative) ASN.1 module47 BS ISO/IEC 9796-2:2002+A1:2008 iii Copyright British Standards Institution Provid
14、ed by IHS under license with BSI - Uncontrolled Copy Licensee=Boeing Co/5910770001 Not for Resale, 10/17/2008 23:31:52 MDTNo reproduction or networking permitted without license from IHS -,-,- vi I SO/IE 2002 C All irhgts seredevr Foreword ISO (the International Organization for Standardization) and
15、 IEC (the International Electrotechnical Commission) form the specialized system for worldwide standardization. National bodies that are members of ISO or IEC participate in the development of International Standards through technical committees established by the respective organization to deal wit
16、h particular fields of technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information technology, ISO and IEC hav
17、e established a joint technical committee, ISO/IEC JTC 1. International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 3. The main task of the joint technical committee is to prepare International Standards. Draft International Standards adopted by the joint
18、 technical committee are circulated to national bodies for voting. Publication as an International Standard requires approval by at least 75 % of the national bodies casting a vote. ISO/IEC 9796-2 was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology, Subcommittee SC 27, IT
19、 Security techniques. This second edition cancels and replaces the first edition (ISO/IEC 9796-2:1997), which has been technically revised. Implementations which comply with ISO/IEC 9796-2 (1st edition), and which use a hash-code of at least 160 bits in length, will be compliant with ISO/IEC 9796-2
20、(2nd edition). Note, however, that implementations complying with ISO/IEC 9796-2 (1st edition) that use a hash-code of less than 160 bits in length will not be compliant with ISO/IEC 9796-2 (2nd edition). ISO/IEC 9796 consists of the following parts, under the general title Information technology Se
21、curity techniques Digital signature schemes giving message recovery: Part 1: Mechanisms using redundancy Part 2: Integer factorization based mechanisms Part 3: Discrete logarithm based mechanisms Further parts may follow. Annexes A and B form a normative part of this part of ISO/IEC 9796. Annexes C
22、and D are for information only. iv BS ISO/IEC 9796-2:2002+A1:2008 Copyright British Standards Institution Provided by IHS under license with BSI - Uncontrolled Copy Licensee=Boeing Co/5910770001 Not for Resale, 10/17/2008 23:31:52 MDTNo reproduction or networking permitted without license from IHS -
23、,-,- IS/OIE6979 C-2:2002(E) I SO/IE 2002 C All irhgts seredevr v Introduction Digital signature mechanisms can be used to provide services such as entity authentication, data origin authentication, non-repudiation, and integrity of data. A digital signature mechanism satisfies the following requirem
24、ents. Given the verification key but not the signature key it shall be computationally infeasible to produce a valid signature for any message. Given the signatures produced by a signer, it shall be computationally infeasible to produce a valid signature on a new message or to recover the signature
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- BS ISO IEC 9796 2002 A1 2008
链接地址:https://www.31doc.com/p-3748215.html