标准编号:ISO/IEC 14888-2:2008
中文名称:信息技术 安全技术 带附件的数字签名 第2部分:以整数分解为基础的机制
英文名称:Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms
发布日期:2008-04
标准范围
This part of ISO/IEC 14888 specifies digital signatures with appendix whose security is based on the difficultyof factoring the modulus in use. For each signature scheme, it specifies:a) the relationships and constraints between all the data elements required for signing and verifying;b) a signature mechanism, i.e., how to produce a signature of a message with the data elements required forsigning;c) a verification mechanism, i.e., how to verify a signature of a message with the data elements required forverifying.The production of key pairs requires random bits and prime numbers. The production of signatures oftenrequires random bits. Techniques for producing random bits and prime numbers are outside the scope of thispart of ISO/IEC 14888. For further information, see ISO/IEC 18031 [33] and ISO/IEC 18032 [34].Various means are available to obtain a reliable copy of the public verification key, e.g., a public key certificate.Techniques for managing keys and certificates are outside the scope of this part of ISO/IEC 14888. For furtherinformation, see ISO/IEC 9594-8 [27], ISO/IEC 11770 [31] and ISO/IEC 15945 [32].