Location: Home > IEC > ISO IEC 29150:2011 pdfダウンロード

ISO IEC 29150:2011 pdfダウンロード

IEC 08-29
ISO IEC 29150:2011 pdfダウンロード

ISO IEC 29150:2011 pdfダウンロード。Information technology — Security techniques — Signcryption
1 Scope
This International Standard specifies four mechanisms for signcryption that employ public key cryptographic techniques requiring both the originator and the recipient of protected data to have their own public and private key pairs. This International Standard is not applicable to infrastructures for management of public keys which are defined in ISO/IEC 11770-1 and ISO/IEC 9594.
NOTE 1 Signcryption mechanisms are defined ways of processing a data string with the following security objectives:  data confidentiality, i.e. protection against unauthorized disclosure of data;  data integrity, i.e. protection that enables the recipient of data to verify that it has not been modified;  data origin authentication, i.e. protection that enables the recipient of data to verify the identity of the data originator;  data unforgeability, i.e. protection against unauthorized modification of data, even by a recipient of the data. These four security objectives are not necessarily mutually exclusive. The fourth objective, data unforgeability, in particular is a stronger notion of security that implies both data integrity and data origin authentication.
NOTE 2 Two of the mechanisms specified in this International Standard, namely mechanisms DLSC and ECDLSC, require the employment of system wide public key parameters for both the sender and the recipient of data. In a system where a multiple number of pairs of senders and recipients exist, the same system wide parameters are required to be used by all these users. The two remaining specified mechanisms, namely IFSC and EtS, do not require the use of such system wide public key parameters.
NOTE 3 In selecting the four signcryption mechanisms for inclusion in this International Standard from the large variety of such techniques published and in use, the same seven criteria as those stated in ISO/IEC 18033-1:2005, Annex A, have been followed. The exclusion of particular methods does not imply that those methods are insecure.
NOTE 4 This International Standard bears a conceptual similarity to ISO/IEC 19772 [14] which specifies a number of mechanisms for authenticated encryption, that is, simultaneously achieving message integrity and confidentiality. Major differences between ISO/IEC 19772 and this International Standard include (1) mechanisms specified in ISO/IEC 19772 fall into the category of symmetric cryptographic techniques, whereas those specified in this International Standard are representatives of asymmetric cryptographic techniques; (2) while all mechanisms specified in ISO/IEC 19772 and this International Standard offer the capability of data integrity and origin authentication, mechanisms specified in this International Standard further offer the capability of data unforgeability, even by a recipient of the data.
2 Normative references
The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies.
ISO/IEC 9796-2:2010, Information technology ― Security techniques ― Digital signature schemes giving message recovery ― Part 2: Integer factorization based mechanisms

Download