• There are no items in your cart

IEEE DRAFT 1363 : D13 99

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

DRAFT STANDARD SPECIFICATIONS FOR PUBLIC KEY CRYPTOGRAPHY

Superseded date

29-08-2000

Published date

12-01-2013

Sorry this product is not available in your region.

1 Overview
    1.1 Scope
    1.2 Purpose
    1.3 Organization of the document
2 References
3 Definitions
4 Types of cryptographic techniques
    4.1 General model
    4.2 Primitives
    4.3 Schemes
    4.4 Additional methods
    4.5 Table summary
5 Mathematical conventions
    5.1 Mathematical notation
    5.2 Bit strings and octet strings
    5.3 Finite fields
    5.4 Elliptic curves and points
    5.5 Data type conversion
6 Primitives based on the discrete logarithm problem
    6.1 The DL setting
    6.2 Primitives
7 Primitives based on the elliptic curve discrete
    logarithm problem
    7.1 The EC setting
    7.2 Primitives
8 Primitives based on the integer factorization problem
    8.1 The IF setting
    8.2 Primitives
9 Key agreement schemes
    9.1 General model
    9.2 DL/ECKAS-DH1
    9.3 DL/ECKAS-DH2
    9.4 DL/ECKAS-MQV
10 Signature schemes
    10.1 General model
    10.2 DL/ECSSA
    10.3 IFSSA
11 Encryption schemes
    11.1 General model
    11.2 IFES
12 Message encoding methods
    12.1 Message encoding methods for signatures with
          appendix
    12.2 Message encoding methods for encryption
13 Key derivation functions
    13.1 KDF1
14 Auxiliary functions
    14.1 Hash-functions
    14.2 Mask generation functions
Annex A (informative) Number-theoretic background
Annex B (normative) Conformance
Annex C (informative) Rationale
Annex D (informative) Security considerations
Annex E (informative) Formats
Annex F (informative) Bibliography

Specifies common public-key cryptographic techniques, including mathematical primitives for secret value (key) derivation, public-key encryption, and digital signatures, and cryptographic schemes based on those primitives. Transition from paper to electronic media brings with it the need for electronic privacy, public-key cryptography techniques offer fundamental technology to meet this need.

DocumentType
Draft
PublisherName
Institute of Electrical & Electronics Engineers
Status
Superseded

CSA ISO/IEC 15946-2 : 2004 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 2: DIGITAL SIGNATURES
03/103592 DC : DRAFT MAR 2003 BS EN 14615 - POSTAL SERVICES - AUTOMATED PROCESSING OF MAIL ITEMS - DIGITAL POSTAGE MARKS
04/30105372 DC : DRAFT DEC 2004 ISO/IEC 11770-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS
CSA ISO/IEC 15946-3 : 2004 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 3: KEY ESTABLISHMENT
TR 102 272 : 1.1.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); ASN.1 FORMAT FOR SIGNATURE POLICIES

ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.