CAN CSA-ISO IEC 14888-3-2007 Information technology - Security techniques - Digital signatures with appendix - Part 3 Discrete logarithm based mechanisms (Incorporating Corrigendum.pdf

上传人:inwarn120 文档编号:590577 上传时间:2018-12-15 格式:PDF 页数:104 大小:1.18MB
下载 相关 举报
CAN CSA-ISO IEC 14888-3-2007 Information technology - Security techniques - Digital signatures with appendix - Part 3 Discrete logarithm based mechanisms (Incorporating Corrigendum.pdf_第1页
第1页 / 共104页
CAN CSA-ISO IEC 14888-3-2007 Information technology - Security techniques - Digital signatures with appendix - Part 3 Discrete logarithm based mechanisms (Incorporating Corrigendum.pdf_第2页
第2页 / 共104页
CAN CSA-ISO IEC 14888-3-2007 Information technology - Security techniques - Digital signatures with appendix - Part 3 Discrete logarithm based mechanisms (Incorporating Corrigendum.pdf_第3页
第3页 / 共104页
CAN CSA-ISO IEC 14888-3-2007 Information technology - Security techniques - Digital signatures with appendix - Part 3 Discrete logarithm based mechanisms (Incorporating Corrigendum.pdf_第4页
第4页 / 共104页
CAN CSA-ISO IEC 14888-3-2007 Information technology - Security techniques - Digital signatures with appendix - Part 3 Discrete logarithm based mechanisms (Incorporating Corrigendum.pdf_第5页
第5页 / 共104页
亲,该文档总共104页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述

1、 Reference numberISO/IEC 14888-3:2006(E)ISO/IEC 2006INTERNATIONAL STANDARD ISO/IEC14888-3Second edition2006-11-15Information technology Security techniques Digital signatures with appendix Part 3: Discrete logarithm based mechanisms Technologies de linformation Techniques de scurit Signatures numriq

2、ues avec appendice Partie 3: Mcanismes bass sur un logarithme discret National Standard of CanadaCAN/CSA-ISO/IEC 14888-3:07(ISO/IEC 14888-3:2006)International Standard ISO/IEC 14888-3:2006 (second edition, 2006-11-15) has been adopted withoutmodification (IDT) as CSA Standard CAN/CSA-ISO/IEC 14888-3

3、:07, which has been approved as a NationalStandard of Canada by the Standards Council of Canada.ISBN 978-1-55436-598-2 November 2007 International Organization for Standardization (ISO), 2006. All rights reserved. International Electrotechnical Commission (IEC), 2006. All rights reserved. NOT FOR RE

4、SALE.Legal Notice for StandardsCanadian Standards Association (CSA) standards are developed through a consensus standards development process approved by the Standards Council of Canada. This process brings together volunteers representing varied viewpoints and interests to achieve consensus and dev

5、elop a standard. Although CSA administers the process and establishes rules to promote fairness in achieving consensus, it does not independently test, evaluate, or verify the content of standards.Disclaimer and exclusion of liabilityThis document is provided without any representations, warranties,

6、 or conditions of any kind, express or implied, including, without limitation, implied warranties or conditions concerning this documents fitness for a particular purpose or use, its merchantability, or its non-infringement of any third partys intellectual property rights. CSA does not warrant the a

7、ccuracy, completeness, or currency of any of the information published in this document. CSA makes no representations or warranties regarding this documents compliance with any applicable statute, rule, or regulation. IN NO EVENT SHALL CSA, ITS VOLUNTEERS, MEMBERS, SUBSIDIARIES, OR AFFILIATED COMPAN

8、IES, OR THEIR EMPLOYEES, DIRECTORS, OR OFFICERS, BE LIABLE FOR ANY DIRECT, INDIRECT, OR INCIDENTAL DAMAGES, INJURY, LOSS, COSTS, OR EXPENSES, HOWSOEVER CAUSED, INCLUDING BUT NOT LIMITED TO SPECIAL OR CONSEQUENTIAL DAMAGES, LOST REVENUE, BUSINESS INTERRUPTION, LOST OR DAMAGED DATA, OR ANY OTHER COMME

9、RCIAL OR ECONOMIC LOSS, WHETHER BASED IN CONTRACT, TORT (INCLUDING NEGLIGENCE), OR ANY OTHER THEORY OF LIABILITY, ARISING OUT OF OR RESULTING FROM ACCESS TO OR POSSESSION OR USE OF THIS DOCUMENT, EVEN IF CSA HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES, INJURY, LOSS, COSTS, OR EXPENSES.In pub

10、lishing and making this document available, CSA is not undertaking to render professional or other services for or on behalf of any person or entity or to perform any duty owed by any person or entity to another person or entity. The information in this document is directed to those who have the app

11、ropriate degree of experience to use and apply its contents, and CSA accepts no responsibility whatsoever arising in any way from any and all use of or reliance on the information contained in this document. CSA is a private not-for-profit company that publishes voluntary standards and related docum

12、ents. CSA has no power, nor does it undertake, to enforce compliance with the contents of the standards or other documents it publishes. Intellectual property rights and ownershipAs between CSA and the users of this document (whether it be in printed or electronic form), CSA is the owner, or the aut

13、horized licensee, of all works contained herein that are protected by copyright, all trade-marks (except as otherwise noted to the contrary), and all inventions and trade secrets that may be contained in this document, whether or not such inventions and trade secrets are protected by patents and app

14、lications for patents. Without limitation, the unauthorized use, modification, copying, or disclosure of this document may violate laws that protect CSAs and/or others intellectual property and may give rise to a right in CSA and/or others to seek legal redress for such use, modification, copying, o

15、r disclosure. To the extent permitted by licence or by law, CSA reserves all intellectual property rights in this document.Patent rightsAttention is drawn to the possibility that some of the elements of this standard may be the subject of patent rights. CSA shall not be held responsible for identify

16、ing any or all such patent rights. Users of this standard are expressly advised that determination of the validity of any such patent rights is entirely their own responsibility.Authorized use of this documentThis document is being provided by CSA for informational and non-commercial use only. The u

17、ser of this document is authorized to do only the following:If this document is in electronic form:.load this document onto a computer for the sole purpose of reviewing it;.search and browse this document; and.print this document. Limited copies of this document in print or paper form may be distrib

18、uted only to persons who are authorized by CSA to have such copies, and only if this Legal Notice appears on each such copy.In addition, users may not and may not permit others to.alter this document in any way or remove this Legal Notice from the attached standard;.sell this document without author

19、ization from CSA; or.make an electronic copy of this document.If you do not agree with any of the terms and conditions contained in this Legal Notice, you may not load or use this document or make any copies of the contents hereof, and if you do make such copies, you are required to destroy them imm

20、ediately. Use of this document constitutes your acceptance of the terms and conditions of this Legal Notice.Information technology Security techniques Digital signatures with appendix Part 3: Discrete logarithm based mechanismsTechnical Corrigendum 2:2010 (IDT) toNational Standard of CanadaCAN/CSA-I

21、SO/IEC 14888-3-07(ISO/IEC 14888-3:2006, IDT)NOT FOR RESALE.PUBLICATION NON DESTINE LA REVENTE.CSA Standards Update ServiceTechnical Corrigendum 2:2010 toCAN/CSA-ISO/IEC 14888-3-07December 2010Title: Information technology Security techniques Digital signatures with appendix Part 3: Discrete logarith

22、m based mechanismsPagination:2 pagesTo register for e-mail notification about any updates to this publicationgo to www.ShopCSA.caclick on E-mail Services under MY ACCOUNTclick on CSA Standards Update ServiceThe List ID that you will need to register for updates to this publication is 2418670.If you

23、require assistance, please e-mail techsupportcsa.ca or call 416-747-2233.Visit CSAs policy on privacy at www.csagroup.org/legal to find out how we protect your personal information.ICS 35.040 Ref. No. ISO/IEC 14888-3:2006/Cor.2:2009(E) ISO/IEC 2009 All rights reserved INTERNATIONAL STANDARD ISO/IEC

24、14888-3:2006 TECHNICAL CORRIGENDUM 2 Published 2009-02-15 INTERNATIONAL ORGANIZATION FOR STANDARDIZATION ORGANISATION INTERNATIONALE DE NORMALISATIONINTERNATIONAL ELECTROTECHNICAL COMMISSION COMMISSION LECTROTECHNIQUE INTERNATIONALEInformation technology Security techniques Digital signatures with a

25、ppendix Part 3: Discrete logarithm based mechanisms TECHNICAL CORRIGENDUM 2 Technologies de linformation Techniques de scurit Signatures numriques avec appendice Partie 3: Mcanismes bass sur un logarithme discret RECTIFICATIF TECHNIQUE 2 Technical Corrigendum 2 to ISO/IEC 14888-3:2006 was prepared b

26、y Joint Technical Committee ISO/IEC JTC 1, Information technology, Subcommittee SC 27, IT Security techniques. Page 50, F.3.4 Replace the numerical example of h(R|M) with the following: “h(R|M) = 2048680B 36D19516 CF78E869 BEAE7BC9 AB5DC543” Page 52, F.5.1 Replace the first two sentences with the fo

27、llowing: “This example uses RIPEMD-160 as the hash-function h. The hash-code is simply the value of RIPEMD-160.” Technical Corrigendum 2:2010 to CAN/CSA-ISO/IEC 14888-3-07ISO/IEC 14888-3:2006/Cor.2:2009(E) 2 ISO/IEC 2009 All rights reservedPage 53, F.5.2 Replace the first two sentences with the foll

28、owing: “This example uses the Secure Hash Algorithm (SHA-1) as the hash-function h. The hash-code is simply the value of SHA-1.” Technical Corrigendum 2:2010 to CAN/CSA-ISO/IEC 14888-3-07Copyright NoticeThis Amendment to the International Standard contains information copyright protected by the Inte

29、rnational Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). Except as permitted under the laws of Canada, no extract of this Amendment to the International Standard may be reproduced, stored in any retrieval system, or transmitted in any form or by any m

30、eans, electronic, photocopying, recording, or otherwise, without prior permission from the Standards Council of Canada (SCC). Requests for permission to reproduce this Amendment to the International Standard or parts thereof should be addressed to Manager, Technical Document Centre Standards Council

31、 of Canada 270 Albert Street, Suite 200 Ottawa, Ontario K1P 6N7 The Canadian adoption of this Amendment to the International Standard contains information copyright protected by the Canadian Standards Association. All rights reserved. No part of this adopted Amendment may be reproduced in any form w

32、hatsoever without the prior permission of the publisher. ISO/IEC material is reprinted with permission. Requests for permission to reproduce this adopted Amendment or parts thereof should be addressed to Manager, Sales Canadian Standards Association 5060 Spectrum Way, Suite 100 Mississauga, Ontario

33、L4W 5N6Copyright violators will be prosecuted to the full extent of the law.PRINTED IN CANADAIMPRIMEAU CANADA100%The Canadian Standards Association (CSA) prints its publications on Rolland Enviro100, which contains 100% recycled post-consumer fibre, is EcoLogo and Processed Chlorine Free certified,

34、and was manufactured using biogas energy.Information technology Security techniques Digital signatures with appendix Part 3: Discrete logarithm based mechanismsTechnical Corrigendum 1:2010 (IDT) toNational Standard of CanadaCAN/CSA-ISO/IEC 14888-3-07(ISO/IEC 14888-3:2006, IDT)NOT FOR RESALE.PUBLICAT

35、ION NON DESTINE LA REVENTE.CSA Standards Update ServiceTechnical Corrigendum 1:2010 toCAN/CSA-ISO/IEC 14888-3-07December 2010Title: Information technology Security techniques Digital signatures with appendix Part 3: Discrete logarithm based mechanismsPagination:4 pagesTo register for e-mail notifica

36、tion about any updates to this publicationgo to www.ShopCSA.caclick on E-mail Services under MY ACCOUNTclick on CSA Standards Update ServiceThe List ID that you will need to register for updates to this publication is 2418670.If you require assistance, please e-mail techsupportcsa.ca or call 416-747

37、-2233.Visit CSAs policy on privacy at www.csagroup.org/legal to find out how we protect your personal information.ICS 35.040 Ref. No. ISO/IEC 14888-3:2006/Cor.1:2007(E) ISO/IEC 2007 All rights reserved INTERNATIONAL STANDARD ISO/IEC 14888-3:2006 TECHNICAL CORRIGENDUM 1 Published 2007-09-01 INTERNATI

38、ONAL ORGANIZATION FOR STANDARDIZATION ORGANISATION INTERNATIONALE DE NORMALISATIONINTERNATIONAL ELECTROTECHNICAL COMMISSION COMMISSION LECTROTECHNIQUE INTERNATIONALEInformation technology Security techniques Digital signatures with appendix Part 3: Discrete logarithm based mechanisms TECHNICAL CORRI

39、GENDUM 1 Technologies de linformation Techniques de scurit Signatures numriques avec appendice Partie 3: Mcanismes bass sur un logarithme discret RECTIFICATIF TECHNIQUE 1 Technical Corrigendum 1 to ISO/IEC 14888-3:2006 was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology,

40、Subcommittee SC 27, Security techniques. Annex F Replace the text in F.1 DSA mechanism by the following text. Technical Corrigendum 1:2010 to CAN/CSA-ISO/IEC 14888-3-07ISO/IEC 14888-3:2006/Cor.1:2007(E) 2 ISO/IEC 2007 All rights reservedF.1 DSA mechanism F.1.1 Example 1 A complete explanation of the

41、 generation of all values is given in FIPS 186-3. This example is sample value for DSA with = 2048 and = 224. All hashing, including generation of domain parameters, is performed with SHA-224. F.1.1.1 Parameters = 2048 = 224 SEED = 0C088E11 2F88B186 90421876 5614496E C2AF9770 C71D0A56 87F489B6 F = 2

42、 P = B4865EFC 44BFB4CB 7EE034F0 EAE8A72D 25897819 9BF9BA28 8462FD97 19F33272 C010A11B 33BCE4E8 481B6EC7 AB1229D9 FC7BEA43 8055907F F1E28FAC 33716089 DCED277F 9036440A 887D4B22 CAC5BABD ECD6A1B3 A1731594 20371025 BAAB5F18 D5FDE928 CE4F5EE4 5352785F 20057782 2C20756E 171CBDD8 1CEB932A E0F29109 5CFFD9C

43、2 3A07AC6B C2F5250B B9F8E2E6 5AF85215 6E8EEBF8 31C098FB 010057BD 425132B8 0A46BB5C E801E241 05058E58 091383F1 6F124894 FB6DE9CD 3BCC4C6E 64901743 AF8F47C3 5CC2177E B15ED172 B4969174 FE3F645A 9D3BEFC6 811A9074 BF702024 98E5E157 ECDBED3C 1FDF3C4F 00DAB43A CBA49802 79392E18 B515851F Q = B4D0963C 40D741

44、38 69F42710 BBEF73CB C6C1C4E6 35C6B9F3 CF7A6255 Counter = 24 G = A92434D5 6752B028 CF11954E 0F3B1BED 8804EB74 8DEED793 E2932E80 8F37C34A 15444A06 9A8B17E5 4BF7FB82 7D6FE959 428BA0CC 1F3B2B8E EA0A25A2 CAF73A0C 68C7DC48 093374A3 CD1F2250 8EF05038 9E8AE58C E6A8AD50 2510B4CA C42528B7 BCA0993C C959C630 6

45、1D7BA3A 885E9C6D CA6EAE44 E2D3C050 A236645F FBDE4BA6 1ECEB17B 941F85E9 C5234A28 FAD461DE 8B55F033 DB7E0CB4 DA5E115F FFCD416D 5A8BC9CD 9DAA6816 010841CC 9F416A6F E109A40A 823874F0 EDD92F45 738918AC 0CB925E7 AB8E692A 9336DB36 697E6C75 5B0243CA EBB61A38 79EABAF6 AC53F166 2740D6ED 3E3DB9BF A629390A 6A51

46、7FB0 B50D02E2 57178145 AF964626 57ABA465 F.1.1.2 Signature key and verification key X = A279D0A3 A4243A2B 16909C9E 0BBFEC32 0589E4DF 1BDDAE72 3BA7353B Y = 31246FA1 CB8D1430 BDCDEBF0 5BB8C967 D24E6728 BA5C900C 50852741 3AFD496A F12EA9CC D80D8916 62A7B9B3 C2023212 08943D85 5D7EA110 B9512D1B 9E4AABAB 7

47、2B99005 25127129 EAB2CC8E 66B6E09C 49341ABF 184B2733 9114E39E FED6B90B 8D7BA182 3E3512D3 EB82F720 76C2815D A642DE61 D808DCF0 22A76077 1E22AA42 26997E41 EA142BAD BFD00011 F7D27677 08A0313E 42255286 0D184F18 C4890ED3 A6CE8134 E1647DDC B292B5FD 5C5ED61C 1BF9567A E1E40CC5 F85F5B7D 1A09AAA1 08CFCFE2 4693

48、60A9 48F61B4D 1CDCA791 1BB64070 94D9A78B A34ED943 97057791 Technical Corrigendum 1:2010 to CAN/CSA-ISO/IEC 14888-3-07ISO/IEC 14888-3:2006/Cor.1:2007(E) ISO/IEC 2007 All rights reserved 3DFC56691 1B4F7DD9 61A7EBB8 74923C59 2458D43D F171CB81 698AB7EE 2E9B92E6 F.1.1.3 Per message data M = ASCII form of “abc“ = 61 62 63 K = 2973C724 7F9BD6DB 3C08CD7A 1DA427DF 6780A7DD F3E09362 E8BA1293 h(M) = 23097D22 3405D822 8642A477 BDA255B3 2AADBCE4 BDA0B3F7 E36C9DA7 F.1.1.4 Signature R = 1DFAAA6F 87DA6148 6529A2F3 4EBC7D89 3D42F405 F8DCBB33 93CC1A00 S = 4A3E6377 D09

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 标准规范 > 国际标准 > 其他

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1