1、 KSKSKSKSKSKSKSK KSKSKS KSKSK KSKS KSK KS KS X ISO/IEC 14888 1 1:KS X ISO/IEC 14888 1:2011 2011 12 29 http:/www.kats.go.krKS X ISO/IEC 14888 1:2011 : e- ( ) ( ) () () ( ) : () () KISA KISA ETRI ETRI : (http:/www.standard.go.kr) : :2001 9 26 :2011 12 29 2011-0659 : e- : ( 02-509-7262) (http:/www.kats
2、.go.kr). 10 5 , . KS X ISO/IEC 14888 1:2011 i ii . iv 1 1 2 1 3 .1 4 , .3 4.1 .3 4.2 4 4.3 4 5 .5 6 .5 7 .6 8 .7 9 .7 9.1 .7 9.2 8 9.3 8 9.4 .8 10 .8 A( ) 10 12 KS X ISO/IEC 14888 1:2011 .13 KS X ISO/IEC 14888 1:2011 ii , , . . . , . . 1 . . . . . , ( ) . KS X ISO/IEC 14888 1 . , . ( ) , . . “ ” . (
3、KS X ISO/IEC 14888 ) “ ” . KS X ISO/IEC 9796( ) 2 KS X ISO/IEC 9796( ) . . , , . KS X ISO/IEC 9796( ) KS X ISO/IEC 14888 1:2011 iii . , . / , . ( ) . KS X ISO/IEC 10118 . KS X ISO/IEC 14888 1:2011 iv 2008 2 ISO/IEC 14888 1, Information technology Security techniques Digital signatures with appendix
4、Part 1: General . KS X ISO/IEC 14888 1:2011 1: Information technology Security techniques Digital signature with appendix Part 1: General 1 . . . KS X ISO/IEC 14888 . KS X ISO/IEC 9594 84, KS X ISO/IEC 11770 33 KS X ISO/IEC 159455 . 2 . . ( ) . . 3 . 3.1 (appendix) 3.2 (collision resistant hash-func
5、tion) KS X ISO/IEC 10118 1 : . . KS X ISO/IEC 14888 1:2011 2 3.3 (data element) , , 3.4 (domain) . 3.5 (domain parameter) 3.6 (hash-code) KS X ISO/IEC 10118 1 3.7 (hash-function) KS X ISO/IEC 10118 1 : , , 2 1 . 2 . 3.8 (identification data) , . , , , , . 3.9 (Key pair) . . KS X ISO/IEC 14888 1:2011
6、 3 3.10 (message) 3.11 (parameter) , 3.12 (signature) 3.13 (signature key) . KS X ISO/IEC 9796 2, KS X ISO/IEC 9796 3 KS X ISO/IEC 9798 3 . 3.14 (signature process) , 3.15 (signed message) , , KS X ISO/IEC 14888 , . 3.16 (verification key) KS X ISO/IEC 9796 2, KS X ISO/IEC 9796 3 KS X ISO/IEC 9798 3
7、 . 3.17 (verification process) , 4 , 4.1 KS X ISO/IEC 14888 . KS X ISO/IEC 14888 1:2011 4 H K M R R . R S X Y Z A mod N B 0 N 1 N A B AB (mod N) A B N . , (A B) mod N 0. 4.2 KS X ISO/IEC 14888 ( , ) . 4.3 KS X ISO/IEC 14888 1:2011 5 5 KS X ISO/IEC 14888 . . , . . . . . . ( ) . “ ” . . “-” . 6 . ; ;
8、. . . . KS X ISO/IEC 14888 1:2011 6 M 1 . . . . M . : . . . . 7 , . ( ) . , . a) . . b) . . . , , . . c) (: ). tM KS X ISO/IEC 14888 1:2011 7 . , . c) - , . . , - . , 1 ( A ), , . . . 8 . ; . . Z . X Y . , X . . . 9 9.1 : Z X M ( ) ( ) . 7. . . KS X ISO/IEC 14888 1:2011 8 9.2 M, X, Z . , R, S . 2 .
9、9.3 , , (, t) . . . . , . 9.4 M M, (, t) . 2 10 . Z Y M Id( ) MMXXZ SRt t KS X ISO/IEC 14888 1:2011 9 (7. ) t( ). M, Z, Y, Id . 3 Yes( ) No( ) . . a) , b) , c) , , - , , 3 M Y Z Id Yes( )/No( )M R S YIdKS X ISO/IEC 14888 1:2011 10 A ( ) 7. , . , - , . 3 , - ( , ). 3 . KS X ISO/IEC 14888 “-” . - - ,
10、. - . . . , 1 , - , , - . - , , - , - . ( - - , ). 1 . a) - , . , - M . , - - . b) , T, . T T Pad HID H , Pad . HID H . H M . (Pad) , HID , . , - . , - , - , , - . , . - , - . KS X ISO/IEC 14888 1:2011 11 KS X ISO/IEC 14888 , - (7. a) ), - (7. b) ). . . KS X ISO/IEC 14888 1:2011 12 1 B. Kaliski, On
11、hash function firewalls in signature schemes, in Proc. Cryptographers Track RSA Conference 2002, B. Preneel, Ed, Lecture Notes in Computer Science, Vol. 2271, pp. 1-16, Berlin, Springer-Verlag, 2002 2 KS X ISO/IEC 9796 ( ), 3 KS X ISO/IEC 11770 3: 2008, 3: 4 KS X ISO/IEC 9594 8: 2001, : 5 KS X ISO/I
12、EC 15945: 2002, TTP 6 KS X ISO/IEC 10118 ( ), KS X ISO/IEC 14888 1:2011 13 KS X ISO/IEC 14888 1:2011 . 1. . 2. KS X ISO/IEC 14888 1: 2001 1. . 2. 3. . 3. 4. , . 7. 9. . 10. . . 3. ISO/IEC 14888 1: 2008 , . 4. ISO/IEC 14888 1: 2008 , . 1: 153787 1 92 3(13) (02)26240114 (02)262401489 http:/ Korean Agency for Technology and Standards http:/www.kats.go.kr KS X ISO/IEC 14888 1:2011 KSKSKS SKSKS KSKS SKS KS SKS KSKS SKSKS KSKSKS Information technologySecurity techniquesDigital signatures with appendixPart 1:General ICS 35.040