GB/T 17902.1-2023 English PDFUS$274.00 ยท In stock
Delivery: <= 3 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 17902.1-2023: Information technology - Security techniques - Digital signatures with appendix - Part 1: General Status: Valid GB/T 17902.1: Historical versions
Basic dataStandard ID: GB/T 17902.1-2023 (GB/T17902.1-2023)Description (Translated English): Information technology - Security techniques - Digital signatures with appendix - Part 1: General Sector / Industry: National Standard (Recommended) Classification of Chinese Standard: L80 Classification of International Standard: 35.030 Word Count Estimation: 14,117 Date of Issue: 2023-03-17 Date of Implementation: 2023-10-01 Older Standard (superseded by this standard): GB/T 17902.1-1999 Issuing agency(ies): State Administration for Market Regulation, China National Standardization Administration GB/T 17902.1-2023: Information technology - Security techniques - Digital signatures with appendix - Part 1: General---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order. ICS 35.030 CCSL80 National Standards of People's Republic of China Replace GB/T 17902.1-1999 Information technology security technology digital signature with appendix Part 1.Overview (ISO /IEC 14888-1.2008, IDT) Released on 2023-03-17 2023-10-01 implementation State Administration for Market Regulation Released by the National Standardization Management Committee table of contentsPreface III Introduction IV 1 Scope 1 2 Normative references 1 3 Terms and Definitions 1 4 Symbols, conventions and legends 3 5 General 4 6 General model 4 7 Option 5 of signature mechanism and hash function binding method 8 Key generation 5 9 Signature Process 5 10 Verification process 7 Appendix A (informative) about hash function identifiers 8 Reference 9forewordThis document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for Standardization Work Part 1.Structure and Drafting Rules for Standardization Documents" drafting. This document is Part 1 of GB/T 17902 "Information Technology Security Technology Digital Signature with Appendix". GB/T 17902 has The following parts have been published. --- Part 1.Overview; --- Part 2.Identity-based mechanisms; --- Part 3.Certificate-based mechanism. This document replaces GB/T 17902.1-1999 "Information Technology Security Technology Digital Signature with Appendix - Part 1.Overview Compared with GB/T 17902.1-1999, except for structural adjustment and editorial changes, the main technical changes are as follows. --- Adjust the original "Overview" part to Chapter 5 (see Chapter 5, Chapter 3 of the.1999 edition); --- Removed "Assignment" "Collision-Free Hash Function" "Deterministic" "Hash Token" "Hash Code" "Pre-Signed" "Randomize" "Random Terms such as "value", "signature equation", "signature function" and "assignment" (see Chapter 4 of the.1999 edition), added "collision-resistant hash function terms such as "number", "data element", "field", "hash code", "key pair" and "message" (see Chapter 3); ---Deleted symbols such as "recalculated hash token", "prepared partial message", "assignment", "pre-signature", "recalculated pre-signature" number and the legend of "comparison" (see Chapter 5 of the.1999 edition), added the legend of "optional data" (see 4.3), and added "Usual" content (see 4.2); ---Added the chapter "Binding Options of Signature Mechanism and Hash Function", which describes several types of options for binding signature mechanism and hash function (see Chapter 7); --- Merge the content of the signature process into Chapter 9, and use a general model to describe the existing mechanism uniformly, which is more universal than the original content (see Chapter 9, Chapter 8 and Chapter 9 of the.1999 edition); --- Merge the verification process into Chapter 10, and update the general model to describe the existing mechanism, which is more universal than the original content (see Chapter 10 Chapter 10, Chapter 9 of the.1999 edition). This document is equivalent to ISO /IEC 14888-1.2008 "Information Technology Security Technology Digital Signature with Appendix Part 1. Overview". The following minimal editorial changes have been made to this document. ---Chapter 10 The signature verification section adds a note for easy understanding. Please note that some contents of this document may refer to patents. The issuing agency of this document assumes no responsibility for identifying patents. This document is proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260). This document was drafted by. Institute of Software, Chinese Academy of Sciences, Chengdu Westone Information Industry Co., Ltd., Beijing Digital Certification Co., Ltd. Co., Ltd., China Electronics Standardization Research Institute, and China Information and Communication Research Institute. The main drafters of this document. Zhang Zhenfeng, He Shuangyu, Zhang Yan, Bai Kunpeng, Hao Chunliang, Zhang Liting, Wang Xianfang, Fu Dapeng, Wang Huili, Wang Rong. The release status of previous versions of this document and the documents it replaces are as follows. ---First published as GB/T 17902.1-1999 in.1999; --- This is the first revision.IntroductionDigital signature mechanism is a kind of asymmetric cryptographic mechanism, which is widely used in entity authentication, data source authentication, data integrity and non-repudiation. Serve. There are two digital signature mechanisms. --- If a message is required as part of the input during the verification process, this type of mechanism is called "digital signature with appendix", and the appendix counts The calculation needs to use the hash function; ---If all or part of the message is disclosed during the verification process, this type of mechanism is called "digital signature with message recovery", and the signature generates Completion and verification also use hash functions. Digital signatures with appendices are regulated in GB/T 17902, digital signatures with message recovery are regulated in ISO 10118 Specifications, hash functions are specified in GB/T 18238 (all parts). GB/T 17902 "Information Technology Security Technology Digital Signature with Appendix" consists of three parts. --- Part 1.Overview. The purpose is to standardize the general framework and general model of digital signature with appendix. --- Part 2.Identity-based mechanisms. The purpose is to standardize the identity-based digital signature mechanism with appendices. --- Part 3.Certificate-based mechanism. The purpose is to standardize the digital signature mechanism based on the certificate. Information technology security technology digital signature with appendix Part 1.Overview1 ScopeGB/T 17902 specifies several digital signature mechanisms with appendices for signing messages of arbitrary length. This document includes the general principles and requirements of digital signatures with appendices, as well as the definitions and definitions used in various parts of GB/T 17902. symbol. Related technologies such as certificate and key management are outside the specification scope of this document. For more information of this kind, see GB/T 16264.8- 2005[2], ISO /IEC 11770-3[8] and ISO /IEC 15945.2002[9].2 Normative referencesThis document has no normative references.3 Terms and DefinitionsThe following terms and definitions apply to this document. 3.1 appendix appendix A bitstring consisting of a signature and an optional text field. 3.2 Anti-collision hash function colision-resistanthash-function Collision Resistant Hash Function A hash function that satisfies the property that it is computationally infeasible to find any two different inputs that map to the same output. Note. Whether the calculation is feasible depends on the specific security requirements and the environment. [Source. ISO /IEC 10118-1.2016, 3.1] 3.3 Data element dataelement Integer, bitstring, set of integers, or set of bitstrings. 3.4 domain domain A group of entities operating under a single security policy. Example. A public key certificate created by a single authority or a group of authorities adopting the same security policy. 3.5 Domain parameter domainparameter A data element that is common and known or accessible to all entities in the domain. ...... |