ISO IEC 9796-3-2006 Information technology - Security techniques - Digital signature schemes giving message recovery - Part 3 Discrete logarithm based mechanism.pdf
《ISO IEC 9796-3-2006 Information technology - Security techniques - Digital signature schemes giving message recovery - Part 3 Discrete logarithm based mechanism.pdf》由会员分享,可在线阅读,更多相关《ISO IEC 9796-3-2006 Information technology - Security techniques - Digital signature schemes giving message recovery - Part 3 Discrete logarithm based mechanism.pdf(78页珍藏版)》请在麦多课文档分享上搜索。
1、 Reference number ISO/IEC 9796-3:2006(E) ISO/IEC 2006INTERNATIONAL STANDARD ISO/IEC 9796-3 Second edition 2006-09-15 Corrected version 2013-09-15 Information technology Security techniques Digital signature schemes giving message recovery Part 3: Discrete logarithm based mechanisms Technologies de l
2、information Techniques des scurit Schmas de signature numrique rtablissant le message Partie 3: Mcanismes bass sur les logarithmes discrets ISO/IEC 9796-3:2006(E) PDF disclaimer This PDF file may contain embedded typefaces. In accordance with Adobes licensing policy, this file may be printed or view
3、ed but shall not be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In downloading this file, parties accept therein the responsibility of not infringing Adobes licensing policy. The ISO Central Secretariat accepts no liability in
4、this area. Adobe is a trademark of Adobe Systems Incorporated. Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-creation parameters were optimized for printing. Every care has been taken to ensure that the file is suitable f
5、or use by ISO member bodies. In the unlikely event that a problem relating to it is found, please inform the Central Secretariat at the address given below. ISO/IEC 2006 All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any m
6、eans, electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or ISOs member body in the country of the requester. ISO copyright office Case postale 56 CH-1211 Geneva 20 Tel. + 41 22 749 01 11 Fax + 41 22 749 09 47 E-mail cop
7、yrightiso.org Web www.iso.org Published in Switzerland ii ISO/IEC 2006 All rights reservedISO/IEC 9796-3:2006(E) ISO/IEC 2006 All rights reserved iiiContents Foreword v Introduction . vi 1 Scope . 1 2 Normative references . 1 3 Terms and definitions 1 4 Symbols, notation and conventions . 4 4.1 Symb
8、ols and notation 4 4.2 Conversion functions and mask generation functions 6 4.3 Legend for figures 6 5 Binding between signature mechanisms and hash-functions 7 6 Framework for digital signatures giving message recovery . 7 6.1 Processes 7 6.2 Parameter generation process 8 6.3 Signature generation
9、process . 8 6.4 Signature verification process 9 7 General model for digital signatures giving message recovery . 9 7.1 Requirements 9 7.2 Summary of functions and procedures . 10 7.3 User key generation process 11 7.4 Signature generation process . 11 7.5 Signature verification process 14 8 NR (Nyb
10、erg-Rueppel message recovery signature) . 17 8.1 Domain parameter and user keys . 17 8.2 Signature generation process . 17 8.3 Signature verification process 18 9 ECNR (Elliptic Curve Nyberg-Rueppel message recovery signature) 19 9.1 Domain parameter and user keys . 19 9.2 Signature generation proce
11、ss . 19 9.3 Signature verification process 20 10 ECMR (Elliptic Curve Miyaji message recovery signature) 21 10.1 Domain parameter and user keys . 21 10.2 Signature generation process . 22 10.3 Signature verification process 23 11 ECAO (Elliptic Curve Abe-Okamoto message recovery signature) 23 11.1 D
12、omain parameter 23 11.2 User keys . 24 11.3 Signature generation process . 24 11.4 Signature verification process 26 12 ECPV (Elliptic Curve Pintsov-Vanstone message recovery signature) 27 12.1 Domain and user parameters 27 12.2 Signature generation process . 28 12.3 Signature verification process 2
13、9 13 ECKNR (Elliptic Curve KCDSA/Nyberg-Rueppel message recovery signature) 31 13.1 Domain parameter and user keys . 31 13.2 Signature generation process . 31 13.3 Signature verification process 32 ISO/IEC 9796-3:2006(E) iv ISO/IEC 2006 All rights reservedAnnex A (informative) Mathematical conventio
14、ns . 34 A.1 Bit strings . 34 A.2 Octet strings . 34 A.3 Finite fields . 34 A.4 Elliptic curves . 35 Annex B (normative) Conversion functions . 36 B.1 Octet string / bit string conversion: OS2BSP and BS2OSP 36 B.2 Bit string / integer conversion: BS2IP and I2BSP 36 B.3 Octet string / integer conversi
15、on: OS2IP and I2OSP . 36 B.4 Finite field element / integer conversion: FE2IP F. 36 B.5 Octet string / finite field element conversion: OS2FEP Fand FE2OSP F. 37 B.6 Elliptic curve / octet string conversion: EC2OSP Eand OS2ECP E37 Annex C (normative) Mask generation functions (Key derivation function
16、s) . 39 C.1 Allowable mask generation functions . 39 C.2 MGF1 . 39 C.3 MGF2 . 39 Annex D (informative) Example method for producing the data input 40 D.1 Splitting the message and producing the data input . 40 D.2 Checking the redundancy . 40 Annex E (normative) ASN.1 module 42 E.1 Formal definition
17、 42 E.2 Use of subsequent object identifiers . 43 Annex F (informative) Numerical examples 44 F.1 Numerical examples for NR 44 F.2 Numerical examples for ECNR . 47 F.3 Numerical examples for ECMR . 51 F.4 Numerical examples for ECAO . 54 F.5 Numerical examples for ECPV . 59 F.6 Numerical examples fo
18、r ECKNR 62 Annex G (informative) Summary of properties of mechanisms . 66 Annex H (informative) Correspondence of schemes . 68 Bibliography 69 ISO/IEC 9796-3:2006(E) ISO/IEC 2006 All rights reserved vForeword ISO (the International Organization for Standardization) and IEC (the International Electro
19、technical Commission) form the specialized system for worldwide standardization. National bodies that are members of ISO or IEC participate in the development of International Standards through technical committees established by the respective organization to deal with particular fields of technica
20、l activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information technology, ISO and IEC have established a joint technical
21、 committee, ISO/IEC JTC 1. International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2. The main task of the joint technical committee is to prepare International Standards. Draft International Standards adopted by the joint technical committee are circul
22、ated to national bodies for voting. Publication as an International Standard requires approval by at least 75 % of the national bodies casting a vote. ISO/IEC 9796-3 was prepared by Joint Technical Committee ISO/IEC /JTC 1, Information technology, Subcommittee SC 27, IT Security techniques. This sec
23、ond edition cancels and replaces the first edition (ISO/IEC 9796-3:2000), which has been technically revised. New mechanisms and object identifiers have been specified. ISO/IEC 9796 consists of the following parts, under the general title Information technology Security techniques Digital signature
24、schemes giving message recovery: Part 2: Integer factorization based mechanisms Part 3: Discrete logarithm based mechanisms This corrected version of ISO/IEC 9796-3:2006 incorporates the following corrections: The year of publication has been removed from references to ISO/IEC 15946-1. The last para
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ISOIEC979632006INFORMATIONTECHNOLOGYSECURITYTECHNIQUESDIGITALSIGNATURESCHEMESGIVINGMESSAGERECOVERYPART3DISCRETELOGARITHMBASEDMECHANISMPDF

链接地址:http://www.mydoc123.com/p-1257318.html