• Shopping Cart
    There are no items in your cart

IEEE 1363.2 : 2008

Withdrawn

Withdrawn

A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

SPECIFICATION FOR PASSWORD-BASED PUBLIC-KEY CRYPTOGRAPHIC TECHNIQUES

Withdrawn date

17-10-2023

Published date

01-01-2008

Sorry this product is not available in your region.

1 Overview
   1.1 Scope
   1.2 Purpose
   1.3 Organization of the document
   1.4 Document conventions
2 Normative references
3 Definitions, acronyms, and abbreviations
   3.1 Definitions
   3.2 Acronyms and abbreviations
4 Types of cryptographic techniques
   4.1 Brief history of the field
   4.2 Variations of the network password problem
   4.3 General model
   4.4 Primitives
   4.5 Schemes
   4.6 Additional methods
   4.7 Table summary
5 Mathematical conventions
   5.1 Mathematical notation
   5.2 Bit strings and octet strings
   5.3 Data type conversion
6 The DL setting
   6.1 The DL setting
7 The EC setting
   7.1 The EC setting
8 Primitives
   8.1 Notation and definitions
   8.2 Primitives
9 Password-authenticated key agreement schemes
   9.1 General model
   9.2 BPKAS-PAK
   9.3 BPKAS-PPK
   9.4 BPKAS-SPEKE
   9.5 APKAS-AMP
   9.6 APKAS-BSPEKE2
   9.7 APKAS-PAKZ
   9.8 [DL] APKAS-SRP3, APKAS-SRP6
   9.9 [EC] APKAS-SRP5
   9.10 APKAS-WSPEKE
10 Password-authenticated key retrieval schemes
   10.1 General model
   10.2 PKRS-1
11 Key derivation functions
   11.1 KDF1
   11.2 KDF2
12 Auxiliary techniques
   12.1 Hash functions
   12.2 Mask generation functions
   12.3 Key confirmation functions
   12.4 Converting between private keys and their octet
        string representations
   12.5 Multiplier value creation functions for APKAS-SRP6
Annex A (informative) Number-theoretic background
Annex B (normative) Conformance
Annex C (informative) Rationale
Annex D (informative) Security considerations
Annex E (informative) Formats
Annex F (informative) Bibliography

Describes specifications of common public-key cryptographic techniques for performing password-based authentication and key establishment, supplemental to the techniques described in IEEE Std 1363-2000 and IEEE Std 1363a-2004.

DocumentType
Standard
PublisherName
Institute of Electrical & Electronics Engineers
Status
Withdrawn

INCITS/ISO/IEC 11770-4 : 2008 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS
ISO/IEC 11770-4:2017 Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets
BS ISO/IEC 11770-4:2017 Information technology. Security techniques. Key management Mechanisms based on weak secrets
16/30335688 DC : 0 BS ISO/IEC 11770-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS
CSA ISO/IEC 11770-4 : 2007 : R2017 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS
CSA ISO/IEC 11770-4 : 2007 : INC : COR 1 : 2010 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS
CSA ISO/IEC 11770-4 : 2007 : R2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS
CSA ISO/IEC 11770-4 : 2007 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS

ANSI X9.30.1 : 1997 PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY - PART 1: THE DIGITAL SIGNATURE ALGORITHM (DSA)
ISO/IEC 11770-4:2006 Information technology Security techniques Key management Part 4: Mechanisms based on weak secrets
FIPS PUB 186 : 0 DIGITAL SIGNATURE STANDARD (DSS)
ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
FIPS PUB 180 : 2002 SECURE HASH STANDARD
ANSI X9.42 : 2003(R2013) PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES: AGREEMENT OF SYMMETRIC KEYS USING DISCRETE LOGARITHM CRYPTOGRAPHY

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.