Hello. Sign In
Standards Store




CSA ISO/IEC 15946-4

2005 Edition, October 1, 2005

Complete Document

Information technology Security techniques Cryptographic techniques based on elliptic curves Part 4: Digital signatures giving message recovery



View Abstract
Product Details
Document History

Detail Summary

Not Active, See comments below

EN
Additional Comments:
W/D NO S/S
Format
Details
Price (USD)
Secure PDF
Single User
$219.00
Print
In Stock
$219.00
Add to Cart

Product Details:

  • Revision: 2005 Edition, October 1, 2005
  • Published Date: October 2005
  • Status: Not Active, See comments below
  • Document Language: English
  • Published By: CSA Group (CSA)
  • Page Count: 58
  • ANSI Approved: No
  • DoD Adopted: No

Description / Abstract:

ISO/IEC 15946 specifies public-key cryptographic techniques based on elliptic curves. These techniques include methods for the establishment of keys for symmetric cryptographic techniques, and digital signature mechanisms.

The scope of this part of ISO/IEC 15946 is restricted to cryptographic techniques based on elliptic curves defined over finite fields (including the special cases of prime order and characteristic two). The representation of elements of the underlying finite field (i.e. which basis is used) is outside the scope of this part of ISO/IEC 15946.

This part of ISO/IEC 15946 specifies five different mechanisms for digital signatures giving message recovery. The mathematical background and general techniques necessary for implementing the mechanisms are described in ISO/IEC 15946-1.

Digital signature mechanisms can be divided into the following two categories.


  • When the whole message has to be stored and/or transmitted with the signature, the mechanism is named a ‘signature mechanism with appendix’. 


  • When the whole message, or part of it, can be recovered from the signature, the mechanism is named a ‘signature mechanism giving message recovery’. The mechanisms specified in this part of ISO/IEC 15946 fall into the second category, i.e. they give either total or partial message recovery. [For elliptic curve based digital signature schemes with appendix, see ISO/IEC 15946-2.]


NOTE In applications where a combination of algorithms is used to provide security services or when an algorithm is parameterised by the choice of a combination of other algorithms such a combination may be specified as a sequence of object identifiers assigned to these algorithms or by including the object identifiers of lower layer algorithms in the parameters field of the algorithm identifier structure specifying higher layer algorithms (for example by specifying the object identifier of a hash function as a parameter in the algorithm identifier structure of a signature scheme). The algorithm identifier structure is defined in ISO/IEC 9594-8.

NOTE The encoding of object identifiers is application dependent.
CSA B51