ISO

Available (778)

Showing 637 - 648 per page



Digital signatures with appendix -- Part 3: Discrete logarithm based mechanisms

This document specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem.
This document provides
— a general description of a digital signature with appendix mechanism, and
— a variety of mechanisms that provide digital signatures with appendix.

ISO/IEC 14888-3:2018

Digital signatures with appendix -- Part 2: Integer factorization based mechanisms

This part of ISO/IEC 14888 specifies digital signatures with appendix whose security is based on the difficulty of factoring the modulus in use. For each signature scheme, it specifies:
a) the relationships and constraints between all the data elements required for signing and verifying;
b) a signature mechanism, i.e., how to produce a signature of a message with the data elements required for signing;
c) a verification mechanism, i.e., how to verify a signature of a message with the data elements required for verifying.

ISO/IEC 14888-2:2008

Digital signatures with appendix -- Part 1: General

ISO/IEC 14888 specifies several digital signature mechanisms with appendix for messages of arbitrary length.
This part of ISO/IEC 14888 contains general principles and requirements for digital signatures with appendix. It also contains definitions and symbols which are used in all parts of ISO/IEC 14888.

ISO/IEC 14888-1:2008

Guidelines for the use and management of Trusted Third Party services

Associated with the provision and operation of a Trusted Third Party (TTP) are a number of security-related issues for which general guidance is necessary to assist business entities, developers and providers of systems and services, etc. This includes guidance on issues regarding the roles, positions and relationships of TTPs and the entities using TTP services, the generic security requirements, who should provide what type of security, what the possible security solutions are, and the operational use and management of TTP service security.

ISO/IEC TR 14516:2002

Digital signature schemes giving message recovery -- Part 3: Discrete logarithm based mechanisms

This part of ISO/IEC 9796 specifies six digital signature schemes giving message recovery. The security of these schemes is based on the difficulty of the discrete logarithm problem, which is defined on a finite field or an elliptic curve over a finite field.

ISO/IEC 9796-3:2006

Security assurance framework -- Part 2: Analysis

This part of ISO/IEC TR 15443 builds on the concepts presented in ISO/IEC TR 15443-1. It provides a discussion of the attributes of security assurance conformity assessment methods that contribute towards making assurance claims and providing assurance evidence to fulfil meeting the assurance requirements for a deliverable.

ISO/IEC TR 15443-2:2012

Security information objects for access control

The scope of this Recommendation | International Standard is:
a) the definition of guidelines for specifying the abstract syntax of generic and specific Security Information Objects (SIOs) for Access Control;
b) the specification of generic SIOs for Access Control;
c) the specification of specific SIOs for Access Control.

ISO/IEC 15816:2002

Time-stamping services -- Part 4: Traceability of time sources

This part of ISO/IEC 18014
— defines the functionality of the time assessment authority (TAA),
— describes an overall architecture for providing the time to the time-stamping authority (TSA) and to guarantee the correctness of it through the use of the TAA, and
— gives technical guidelines for the TAA to provide, and to provide assurance in, a trusted time source to the TSA.
 

ISO/IEC 18014-4:2015

Prime number generation

This International Standard specifies methods for generating and testing prime numbers as required in cryptographic protocols and algorithms.
Firstly, this International Standard specifies methods for testing whether a given number is prime. The testing methods included in this International Standard can be divided into two groups:
• Probabilistic primality tests, which have a small error probability. All probabilistic tests described here may declare a composite to be a prime. One test described here may declare a prime to be composite.
• Deterministic methods, which are guaranteed to give the right verdict. These methods use so-called primality certificates.

ISO/IEC 18032:2005

Random bit generation

This International Standard specifies a conceptual model for a random bit generator for cryptographic purposes, together with the elements of this model.
This International Standard
• specifies the characteristics of the main elements required for a non-deterministic random bit generator,
• specifies the characteristics of the main elements required for a deterministic random bit generator,
• establishes the security requirements for both the non-deterministic and the deterministic random bit generator.

ISO/IEC 18031:2011

Time-stamping services -- Part 2: Mechanisms producing independent tokens

This part of ISO/IEC 18014 presents a general framework for the provision of time-stamping services.
Time-stamping services may generate, renew and verify time-stamp tokens.
Time-stamp tokens are associations between data and points in time, and are created in a way that aims to provide evidence that the data existed at the associated date and time. In addition, the evidence may be used by non-repudiation services.

ISO/IEC 18014-2:2009

Time-stamping services -- Part 1: Framework

"This part of ISO/IEC 18014: — identifies the objective of a time-stamping authority; — describes a general model on which time-stamping services are based; — defines time-stamping services; — defines the basic protocols between the involved entities. "

ISO/IEC 18014-1:2008