• CSA ISO/IEC 15946-3 : 2004

    Withdrawn A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

    INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 3: KEY ESTABLISHMENT

    Available format(s):  Hardcopy, PDF

    Withdrawn date:  25-01-2010

    Language(s):  English

    Published date:  31-12-2003

    Publisher:  Canadian Standards Association

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    1 Scope
    2 Normative references
    3 Terms and definitions
    4 Symbols and abbreviated terms
    5 Key derivation functions
    6 Cofactor multiplication
    7 Key commitment
    8 Key agreement mechanisms
       8.1 Common information
       8.2 Non-interactive key agreement of Diffie-Hellman
            type (KANIDH)
            8.2.1 Setup
            8.2.2 Mechanism
            8.2.3 Properties
       8.3 Key agreement of ElGamal type (KAEG)
            8.3.1 Setup
            8.3.2 Mechanism
            8.3.3 Properties
       8.4 Key agreement of Diffie-Hellman type
            8.4.1 Setup
            8.4.2 Mechanism
            8.4.3 Properties
       8.5 Key agreement of Diffie-Hellman type with
            2 key pairs (KADH2KP)
            8.5.1 Setup
            8.5.2 Mechanism
            8.5.3 Properties
       8.6 Key agreement of Diffie-Hellman type with 2
            signatures and key confirmation (KADH2SKC)
            8.6.1 Setup
            8.6.2 Mechanism
            8.6.3 Properties
    9 Key agreement mechanisms not included in ISO/IEC 11770-3
       9.1 Common information
       9.2 The Full Unified Model
            9.2.1 Setup
            9.2.2 Mechanism
            9.2.3 Properties
       9.3 Key agreement of MQV type with 1 pass (KAMQV1P)
            9.3.1 Setup
            9.3.2 Mechanism
            9.3.3 Properties
       9.4 Key agreement of MQV type with 2 passes (KAMQV2P)
            9.4.1 Setup
            9.4.2 Mechanism
            9.4.3 Properties
    10 Key transport mechanisms
       10.1 Common information
       10.2 Key transport of ElGamal type (KTEG)
            10.2.1 Setup
            10.2.2 Mechanism
            10.2.3 Properties
       10.3 Key transport of ElGamal type with originator
            signature (KTEGOS)
            10.3.1 Setup
            10.3.2 Mechanism
            10.3.3 Properties
    11 Key Confirmation
    Annex A (informative) - Examples of key derivation functions
          A.1 The IEEE P1363 key derivation function
              A.1.1 Preconditions
              A.1.2 Input
              A.1.3 Actions
              A.1.4 Output
          A.2 The ANSI X9.42 key derivation function
              A.2.1 Prerequisites
              A.2.2 Input
              A.2.3 Actions
              A.2.4 Output
              A.2.5 ASN.1 syntax
          A.3 The ANSI X9.63 key derivation function
              A.3.1 Prerequisites
              A.3.2 Input
              A.3.3 Actions
              A.3.4 Output
    Annex B (informative) - A comparison of the claimed properties
                            of the mechanisms in this standard
          B.1 Security Properties
          B.2 Performance Considerations
    Bibliography

    Abstract - (Show below) - (Hide below)

    Describes public key cryptographic techniques based on elliptic curves. Includes the establishment of keys for secret key systems and digital signature mechanisms.

    General Product Information - (Show below) - (Hide below)

    Document Type Standard
    Publisher Canadian Standards Association
    Status Withdrawn

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 15946-1:2016 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General
    ISO/IEC 9796-3:2006 Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms
    IEEE DRAFT 1363 : D13 99 DRAFT STANDARD SPECIFICATIONS FOR PUBLIC KEY CRYPTOGRAPHY
    ISO/IEC 9796-2:2010 Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms
    ISO/IEC 15946-2:2002 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 2: Digital signatures
    ANSI X9.63 : 2011 FINANCIAL SERVICES - PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY, KEY AGREEMENT AND KEY TRANSPORT USING ELLIPTIC CURVE CRYPTOGRAPHY
    ANSI X9.42 : 2003(R2013) PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES: AGREEMENT OF SYMMETRIC KEYS USING DISCRETE LOGARITHM CRYPTOGRAPHY
    ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective