• IEEE 1363.2 : 2008

    Withdrawn A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

    SPECIFICATION FOR PASSWORD-BASED PUBLIC-KEY CRYPTOGRAPHIC TECHNIQUES

    Available format(s): 

    Withdrawn date:  17-10-2023

    Language(s): 

    Published date:  01-01-2008

    Publisher:  Institute of Electrical & Electronics Engineers

    Sorry this product is not available in your region.

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    1 Overview
       1.1 Scope
       1.2 Purpose
       1.3 Organization of the document
       1.4 Document conventions
    2 Normative references
    3 Definitions, acronyms, and abbreviations
       3.1 Definitions
       3.2 Acronyms and abbreviations
    4 Types of cryptographic techniques
       4.1 Brief history of the field
       4.2 Variations of the network password problem
       4.3 General model
       4.4 Primitives
       4.5 Schemes
       4.6 Additional methods
       4.7 Table summary
    5 Mathematical conventions
       5.1 Mathematical notation
       5.2 Bit strings and octet strings
       5.3 Data type conversion
    6 The DL setting
       6.1 The DL setting
    7 The EC setting
       7.1 The EC setting
    8 Primitives
       8.1 Notation and definitions
       8.2 Primitives
    9 Password-authenticated key agreement schemes
       9.1 General model
       9.2 BPKAS-PAK
       9.3 BPKAS-PPK
       9.4 BPKAS-SPEKE
       9.5 APKAS-AMP
       9.6 APKAS-BSPEKE2
       9.7 APKAS-PAKZ
       9.8 [DL] APKAS-SRP3, APKAS-SRP6
       9.9 [EC] APKAS-SRP5
       9.10 APKAS-WSPEKE
    10 Password-authenticated key retrieval schemes
       10.1 General model
       10.2 PKRS-1
    11 Key derivation functions
       11.1 KDF1
       11.2 KDF2
    12 Auxiliary techniques
       12.1 Hash functions
       12.2 Mask generation functions
       12.3 Key confirmation functions
       12.4 Converting between private keys and their octet
            string representations
       12.5 Multiplier value creation functions for APKAS-SRP6
    Annex A (informative) Number-theoretic background
    Annex B (normative) Conformance
    Annex C (informative) Rationale
    Annex D (informative) Security considerations
    Annex E (informative) Formats
    Annex F (informative) Bibliography

    Abstract - (Show below) - (Hide below)

    Describes specifications of common public-key cryptographic techniques for performing password-based authentication and key establishment, supplemental to the techniques described in IEEE Std 1363-2000 and IEEE Std 1363a-2004.

    General Product Information - (Show below) - (Hide below)

    Document Type Standard
    Publisher Institute of Electrical & Electronics Engineers
    Status Withdrawn

    Standards Referenced By This Book - (Show below) - (Hide below)

    CSA ISO/IEC 11770-4 : 2007 : R2017 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS
    INCITS/ISO/IEC 11770-4 : 2008 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS
    ISO/IEC 11770-4:2017 Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets
    BS ISO/IEC 11770-4:2017 Information technology. Security techniques. Key management Mechanisms based on weak secrets
    CSA ISO/IEC 11770-4 : 2007 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS
    16/30335688 DC : 0 BS ISO/IEC 11770-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS
    CSA ISO/IEC 11770-4 : 2007 : INC : COR 1 : 2010 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS
    CSA ISO/IEC 11770-4 : 2007 : R2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS

    Standards Referencing This Book - (Show below) - (Hide below)

    ANSI X9.30.1 : 1997 PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY - PART 1: THE DIGITAL SIGNATURE ALGORITHM (DSA)
    ISO/IEC 11770-4:2006 Information technology Security techniques Key management Part 4: Mechanisms based on weak secrets
    FIPS PUB 186 : 0 DIGITAL SIGNATURE STANDARD (DSS)
    ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
    FIPS PUB 180 : 2002 SECURE HASH STANDARD
    ANSI X9.42 : 2003(R2013) PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES: AGREEMENT OF SYMMETRIC KEYS USING DISCRETE LOGARITHM CRYPTOGRAPHY
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective