Codes & Standards - Purchase
CAN/CSA-ISO/IEC 9796-94 (R1999)
Information Technology - Security Techniques - Digital Signature Scheme Giving Message Recovery (Adopted ISO/IEC 9796:1991)
SKU: 2410174
Published by CSA Group
Publication Year 1994
Reaffirmed in 1999
12 pages
Withdrawn
Product Details
1 Scope
This International Standard specifies a digital signature scheme giving message recovery for messages of limited length and using a public-key system.
This digital signature scheme includes
During the signature process, messages to be signed are padded and extended if necessary. Artificial redundancy is then added, depending upon the message itself. No assumption is made as to the possible presence of natural redundancy in the messages. The artificial redundancy is revealed by the verification process. The removal of this artificial redundancy gives message recovery.
This International Standard does not specify the key production process, the signature function and the verification function. Annex A gives an example of a public-key system including key production, signature function and verification function. The various steps of these operations are illustrated by examples in annex B.
Some parameters in the scheme are related to security: this International Standard does not specify the values to be used in order to reach a given level of security. However, this International Standard is specified in such a way as to minimize the required changes in its use if some of these parameters have to be modified.
This International Standard specifies a digital signature scheme giving message recovery for messages of limited length and using a public-key system.
This digital signature scheme includes
- a signature process using a secret signature key and a signature function for signing messages;
- a verification process using a public verification key and a verification function for checking signatures while recovering messages.
During the signature process, messages to be signed are padded and extended if necessary. Artificial redundancy is then added, depending upon the message itself. No assumption is made as to the possible presence of natural redundancy in the messages. The artificial redundancy is revealed by the verification process. The removal of this artificial redundancy gives message recovery.
This International Standard does not specify the key production process, the signature function and the verification function. Annex A gives an example of a public-key system including key production, signature function and verification function. The various steps of these operations are illustrated by examples in annex B.
Some parameters in the scheme are related to security: this International Standard does not specify the values to be used in order to reach a given level of security. However, this International Standard is specified in such a way as to minimize the required changes in its use if some of these parameters have to be modified.