ETSI SR 002 176-2003 Electronic Signatures and Infrastructures (ESI) Algorithms and Parameters for Secure Electronic Signatures《电子签名和基础结构(ESI) 安全电子签名的算法和参数(版本1 1 1)》.pdf
《ETSI SR 002 176-2003 Electronic Signatures and Infrastructures (ESI) Algorithms and Parameters for Secure Electronic Signatures《电子签名和基础结构(ESI) 安全电子签名的算法和参数(版本1 1 1)》.pdf》由会员分享,可在线阅读,更多相关《ETSI SR 002 176-2003 Electronic Signatures and Infrastructures (ESI) Algorithms and Parameters for Secure Electronic Signatures《电子签名和基础结构(ESI) 安全电子签名的算法和参数(版本1 1 1)》.pdf(28页珍藏版)》请在麦多课文档分享上搜索。
1、ETSI SR 002 176 1.1.1 (2003-03) Special Repor Electronic Signatures and Infrastructures (ESI); Algorithms and Parameters for Secure Electronic Signatures 2 ETSI SR 002 176 VI .I .I (2003-03) Reference DSR/ESI-000016 Keywords e-commerce, electronic signature, security ETSI 650 Route des Lucioles F-O6
2、921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 O0 Fax: +33 4 93 65 47 16 Siret No 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-prfecture de Grasse (06) No 7803/88 Important notice Individual copies of the present document can be downloaded from: http:lwmv.e
3、tsi .arq The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing
4、 on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at ha p:/pa r
5、ta I. etsi I a rgltbistat uslstatus .as p If you find errors in the present document, send your comment to: Cori vriaht Notifica tion No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. O European Tele
6、communications Standards Institute 2003. All rights reserved. DECTTM, PLUGTESTSTMand UMTSTMare Trade Marks of ETSI registered for the benefit of its Members. TIPHONTM and the TIPHON logo are Trade Marks currently being registered by ETSI for the benefit of its Members. 3GPPTM is a Trade Mark of ETSI
7、 registered for the benefit of its Members and of the 3GPP Organizational Partners. ETSI 3 ETSI SR 002 176 VI . 1 . 1 (2003-03) Contents Intellectual Property Rights 5 Foreword . 5 Introduction 5 1 Scope 6 2 References 6 3 Definitions and abbreviations . 7 3.1 Definitions 7 3.2 Abbreviations 8 4 Alg
8、orithms and Parameters for Secure Electronic Signatures 8 4.1 4.2 4.3 4.4 4.5 4.5.1 4.5.2 4.5.2.1 4.5.2.2 4.5.3 4.5.3.1 4.5.3.2 4.5.4 4.5.4.1 4.5.4.2 4.5.5 4.5.5.1 4.5.5.2 4.5.6 4.5.6.1 4.5.6.2 4.5.7 4.5.7.1 4.5.7.2 4.6 4.6.1 4.6.2 4.6.3 4.6.4 4.6.5 . Management activities 8 Signature suites for sec
9、ure electronic signatures 8 Cryptographic hash functions . 9 Padding methods 10 Signature algorithms . 10 General comments 10 RSA 11 Parameters . 11 Key and parameter generation algorithm rsagenl . 12 DSA 12 Parameters . 12 Key and parameter generation algorithm dsagenl 12 Elliptic curve analogue of
10、 DSA based on a group E(F, ) . 12 Parameters . 12 Key and parameter generation algorithm ecgenl for ecdsa-Fp 13 13 13 14 14 14 14 14 14 14 15 General comments 15 Random generator requirements trueran . 15 Random generator requirements pseuran 15 Random number generator cr-toX9.30-x . 15 Random numbe
11、r generator cr-toX9.30-k . 16 Annex A (normative): Updating algorithms and parameters 17 A . 1 Introduction 17 A.2 Management Process 17 Annex B (informative): Algorithm Object Identifiers 19 Annex C (informative): Generation of RSA keys for signatures 20 C . 1 Generation of random prime numbers 20
12、C . 1.1 Probabilistic primality test 20 C . 1.2 Strong prime numbers 20 C.2 Generation of RSA modulus 21 . ETSI 4 ETSI SR 002 176 VI .I .I (2003-03) C.3 Generation of RSA keys. . .2 1 Annex D (informative): On the generation of random data . 22 Why cryptography needs random numbers 22 Generation of
13、truly random bits .22 D.3 Statistical tests 23 Pseudorandom bit generation. . .24 D. 1 D.2 D.4 24 D.4.1 General . . 24 D.4.2 ANSI X9.17 generator . . 24 D.4.3 FIPS 186 generator . 25 D.4.4 RSA PRNG and Blum-Blum-Shub PRNG . D.5 Conclusion. .25 Annex E (informative): Verification . 26 Annex F (inform
14、ative): Bibliography . 27 History .28 . ETSI 5 ETSI SR 002 176 VI .I .I (2003-03) Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI me
15、mbers and non-members, and can be found in ETSI SR 000 314: “Intellectual Property Rights (7PRs); Essential, orpotentially Essential, IPRs notlJied to ETSI in respect ofETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (5). All publish
16、ed ETSI deliverables shall include information which directs the reader to the above source of information. Foreword This Special Report (SR) has been produced by ETSI Technical Committee Electronic Signatures and Infrastructures (ESI). I n t rod uct ion The present document provides for security an
17、d interoperability for the application of the underlying mathematical algorithms and related parameters for secure electronic signatures in accordance with the Directive 1999/93/EC of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures i.
18、 The present document will be handed to the EC via the EESSI-SG through ICTSB as a substantial contribution to be discussed further at the A9C (Article 9 Committee) level. The final decision on how to respect and how to handle this contribution and its future handling process will be the responsibil
19、ity of the EC and A9C. The present document defines a list of approved cryptographic algorithms together with the requirements on their parameters, as well as the approved combinations of algorithms in the form of “signature suites“. The approved algorithms and parameters shall be referenced in the
20、corresponding Protection Profiles (e.g. for SSCDs or trusted CSP components). The present document contains several informative annexes which provide useful information on a number of subjects mentioned in the text. ETSI 6 ETSI SR 002 176 VI .I .I (2003-03) 1 Scope The present document defines an in
21、itial set of algorithms and the corresponding parameters to be included in a list of approved methods for producing or verif$ng Electronic Signatures in Secure Signature-Creating Devices (SSCD) (EESSI-work area F: CWA 14168 / 14169 Secure Signature-Creation Devices), to be referenced in the Certific
22、ate Policy documents (EESSI-work area A: TS 10 1 456: Policy requirements for certification authorities issuing qualified certificates), during the signature creation and validation process and environment (EESSI-work area G1/2: CWA 14170: Security Requirements for Signature Creation Systems; CWA 14
23、171 Procedures for Electronic Signature Verification), in trusted CSP components (Certification Service Provider) (EESSI-work-area D: CWA 14167-1: Security Requirements for Trustworthy Systems Managing Certificates for Electronic Signatures) and other technical components and related areas. The pres
24、ent document defines a list of approved cryptographic algorithms combined with the requirements on their parameters, as well as the approved combinations of algorithms in the form of “signature suites“. The approved algorithms and parameters shall be referenced in the corresponding Protection Profil
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ETSISR0021762003ELECTRONICSIGNATURESANDINFRASTRUCTURESESIALGORITHMSANDPARAMETERSFORSECUREELECTRONICSIGNATURES

链接地址:http://www.mydoc123.com/p-734963.html