ETSI TS 102 176-1-2011 Electronic Signatures and Infrastructures (ESI) Algorithms and Parameters for Secure Electronic Signatures Part 1 Hash functions and asymmetric algorithms (V_1.pdf
《ETSI TS 102 176-1-2011 Electronic Signatures and Infrastructures (ESI) Algorithms and Parameters for Secure Electronic Signatures Part 1 Hash functions and asymmetric algorithms (V_1.pdf》由会员分享,可在线阅读,更多相关《ETSI TS 102 176-1-2011 Electronic Signatures and Infrastructures (ESI) Algorithms and Parameters for Secure Electronic Signatures Part 1 Hash functions and asymmetric algorithms (V_1.pdf(66页珍藏版)》请在麦多课文档分享上搜索。
1、 ETSI TS 102 176-1 V2.1.1 (2011-07)Technical Specification Electronic Signatures and Infrastructures (ESI);Algorithms and Parameters for Secure Electronic Signatures;Part 1: Hash functions and asymmetric algorithmsETSI ETSI TS 102 176-1 V2.1.1 (2011-07)2Reference RTS/ESI-000080-1 Keywords e-commerce
2、, electronic signature, security ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice Individual cop
3、ies of the present document can be downloaded from: http:/www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format
4、(PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current stat
5、us of this and other ETSI documents is available at http:/portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced excep
6、t as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. European Telecommunications Standards Institute 2011. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are Trade Marks of ETSI registered for the benefit of its Me
7、mbers. 3GPPTM and LTE are Trade Marks of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. GSM and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI TS 102 176-1 V2.1.1 (2011-07)3Contents Intellectual Property Rights 6g3Foreword
8、 . 6g3Introduction 6g31 Scope 8g32 References 9g32.1 Normative references . 9g32.2 Informative references 12g33 Definitions and abbreviations . 13g33.1 Definitions 13g33.2 Abbreviations . 13g34 Maintenance of the document 14g35 Hash functions 15g35.1 General . 15g35.2 Recommended one way hash functi
9、ons 16g35.2.1 SHA-1 is no more recommended 16g35.2.2 RIPEMD-160 is no more recommended . 16g35.2.3 SHA-224 . 16g35.2.4 SHA-256 . 17g35.2.5 WHIRLPOOL . 17g35.2.6 SHA-384 . 17g35.2.7 SHA-512 . 17g35.2.8 SHA-3 . 17g36 Signature schemes 17g36.1 Signature algorithms. 17g36.1.1 General 17g36.1.2 Recommend
10、ed signature algorithms . 18g36.1.2.1 RSA . 18g36.1.2.2 DSA. 18g36.1.2.3 Elliptic curve analogue of DSA based on a group E(Fp) 19g36.1.2.4 Elliptic curve analogue of DSA based on a group E(F2m) 20g36.1.2.5 EC-GDSA based on a group E(Fp) . 20g36.1.2.6 EC-GDSA based on a group E(F2m) . 20g36.2 Recomme
11、nded key pair generation methods 21g36.2.1 General 21g36.2.2 Recommended key pair generation methods 21g36.2.2.1 Key and parameter generation algorithm rsagen1 . 21g36.2.2.2 Key and parameter generation algorithm dsagen1 22g36.2.2.3 Key and parameter generation algorithm ecgen1 for ecdsa-Fp . 22g36.
12、2.2.4 Key and parameter generation algorithm ecgen2 for ecdsa-F2m 22g36.2.2.5 Key and parameter generation algorithm ecgen1 for ecgdsa-Fp . 22g36.2.2.6 Key and parameter generation algorithm ecgen2 for ecgdsa-F2m 23g37 Signature suites 23g37.1 General . 23g37.2 Padding methods 23g37.3 Recommended si
13、gnature suites 24g38 Random number generation methods . 25g38.1 General . 25g38.2 Recommended random number generation methods . 25g38.2.1 Random generator requirements trueran . 26g38.2.2 Random generator requirements pseuran 27g3ETSI ETSI TS 102 176-1 V2.1.1 (2011-07)49 Recommended hash functions
14、and key sizes versus time 28g39.1 Basis for the recommendations 28g39.2 Recommended hash functions versus time . 29g39.3 Recommended key sizes versus time . 29g310 Time period resistance of hash functions and keys 32g310.1 Time period resistance for hash functions 32g310.2 Time period resistance for
15、 signers key 32g310.3 Time period resistance for trust anchors . 32g310.4 Time period resistance for other keys . 32g311 Practical ways to identify hash functions and signature algorithms . 33g311.1 Hash functions and signature algorithms objects identified using OIDs 33g311.1.1 Hash functions 33g31
16、1.1.2 Signature algorithms . 33g311.1.3 Signature suites . 34g311.2 Hash functions and signature algorithms identified objects using URNs . 35g311.2.1 Hash functions 35g311.2.2 Signature algorithms . 35g311.2.3 Signature suites . 35g311.3 Recommended hash functions and signature algorithms objects t
17、hat do not yet have an OID or a description 36g311.4 Recommended hash functions and signature algorithms objects that do not yet have a URN or a description 36g3Annex A (normative): Algorithms for various data structures 37g3A.1 Advanced Electronic Signatures based on TS 101 733 37g3A.2 Advanced Ele
18、ctronic Signatures based on TS 101 903 38g3A.3 Signers certificates . 38g3A.4 CRLs. 39g3A.5 OCSP responses . 39g3A.6 CA certificates 40g3A.7 Self-signed certificates for CA issuing CA certificates 40g3A.8 TSTs based on RFC 3161 and TS 101 861 41g3A.9 TSU certificates 41g3A.10 Self-signed certificate
19、s for CAs issuing TSU certificates 41g3A.11 Attribute certificates . 42g3A.12 AA certificates 42g3Annex B (informative): Recommended key sizes (historical) . 43g3B.1 Changes in 2005 . 43g3B.2 Changes in 2007 . 45g3B.3 Changes in 2011 . 45g3Annex C (informative): Generation of RSA modulus . 46g3Annex
20、 D (informative): Generation of elliptic curve domain parameters 47g3D.1 ECDSA and ECGDSA based on a group E(Fp) . 47g3D.2 ECDSA and ECGDSA based on a group E(F2m) 48g3D.3 The class number condition 49g3ETSI ETSI TS 102 176-1 V2.1.1 (2011-07)5Annex E (informative): On the generation of random data .
21、 51g3E.1 Classes of random number generators 51g3E.2 On tests for NRNGs . 52g3Annex F (informative): Algorithm identifiers defined in various documents . 53g3F.1 Algorithm identifiers defined in RFC 3278 53g3F.2 Algorithm identifiers defined in RFC 3279 53g3F.3 Algorithm identifiers defined in RFC 3
22、370 54g3F.4 Algorithm identifiers defined in RFC 3447 54g3F.5 Algorithm identifier defined in RFC 3874 . 54g3F.6 Algorithm identifiers defined in XML-Signature Syntax and Processing W3C Recommendation . 54g3F.7 Algorithm identifiers defined in XML Encryption Syntax and Processing. W3C Recommendation
23、 55g3F.8 Algorithm identifiers defined in RFC 4050 55g3F.9 Algorithm identifiers defined in RFC 4051 55g3F.10 Algorithm identifiers defined in RFC 4055 56g3Annex G (informative): Abstracts of ISO/IEC 10118-3 and ISO/IEC 9796-2 57g3Annex H (informative): Signature maintenance 58g3Annex I (informative
24、): Major changes from previous versions . 59g3Annex J (informative): National Bodies . 60g3Annex K (informative): Bibliography . 64g3History 66g3ETSI ETSI TS 102 176-1 V2.1.1 (2011-07)6Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ETSITS10217612011ELECTRONICSIGNATURESANDINFRASTRUCTURESESIALGORITHMSANDPARAMETERSFORSECUREELECTRONICSIGNATURESPART1HASHFUNCTIONSANDASYMMETRICALGORITHMSV_1PDF

链接地址:http://www.mydoc123.com/p-738781.html