Specials

All specials

IEEE 1363 : 2000

IEEE 1363 : 2000

IEEE STANDARD SPECIFICATIONS FOR PUBLIC-KEY CRYPTOGRAPHY

Institute of Electrical & Electronics Engineers

More details

Download

PDF AVAILABLE FORMATS IMMEDIATE DOWNLOAD
$34.32

$78.00

(price reduced by 56 %)

Table of Contents

1 Overview
1.1 Scope
1.2 Purpose
1.3 Organization of the document
2 References
3 Definitions
4 Types of cryptographic techniques
4.1 General model
4.2 Primitives
4.3 Schemes
4.4 Additional methods
4.5 Table summary
5 Mathematical conventions
5.1 Mathematical notation
5.2 Bit strings and octet strings
5.3 Finite fields
5.4 Elliptic curves and points
5.5 Data type conversion
6 Primitives based on the discrete logarithm problem
6.1 The DL setting
6.2 Primitives
7 Primitives based on the elliptic curve discrete
    logarithm problem
7.1 The EC setting
7.2 Primitives
8 Primitives based on the integer factorization problem
8.1 The IF setting
8.2 Primitives
9 Key agreement schemes
9.1 General model
9.2 DL/ECKAS-DH1
9.3 DL/ECKAS-DH2
9.4 DL/ECKAS-MQV
10 Signature schemes
10.1 General model
10.2 DL/ECSSA
10.3 IFSSA
11 Encryption schemes
11.1 General model
11.2 IFES
12 Message-encoding methods
12.1 Message-encoding methods for signatures with
       appendix
12.2 Message-encoding methods for encryption
13 Key derivation functions
13.1 KDFI
14 Auxiliary functions
14.1 Hash functions
14.2 Mask generation functions
Annex A (informative) Number-theoretic background
A.1 Integer and modular arithmetic: overview
A.2 Integer and modular arithmetic: algorithms
A.3 Binary finite fields: overview
A.4 Binary finite fields: algorithms
A.5 Polynomials over a finite field
A.6 General normal bases for binary fields
A.7 Basis conversion for binary fields
A.8 Bases for binary fields: tables and algorithms
A.9 Elliptic curves: overview
A.10 Elliptic curves: algorithms
A.11 Functions for elliptic curve parameter and key
      generation
A.12 Functions for elliptic curve parameter and key
      validation
A.13 Class group calculations
A.14 Complex multiplication
A.15 Primarily tests and proofs
A.16 Generation and validation of parameters and keys
Annex B (normative) Conformance
B.1 General model
B.2 Conformance requirements
B.3 Examples
Annex C (informative) Rationale

C.1 General
C.2 Keys and domain parameters
C.3 Schemes
Annex D (informative) Security considerations
D.1 Introduction
D.2 General principles
D.3 Key management considerations
D.4 Family-specific considerations
D.5 Scheme-specific considerations
D.6 Random number generation
D.7 Implementation considerations
Annex E (informative) Formats
E.1 Overview
E.2 Representing basic data types as octet strings
E.3 Representing outputs of schemes as octet strings
Annex F (informative) Bibliography

Abstract

Defines the specifications for public-key cryptography techniques, including public-key encryption and digital signatures, mathematical primitives for secret value (key) derivation, and cryptographic schemes based on those primitives. NOTE:- As of the date of this standards publication IEEE project P1363a, is underway to specify additional techniques. Its intent is to be an amendment to this standard. Its scope is similar to that of this standard, with the addition of identification schemes. (See note in 1.2 for a description of the purpose of P1363a).

General Product Information

Document Type Standard
Status Current
Publisher Institute of Electrical & Electronics Engineers
Supersedes
  • IEEE DRAFT 1363 : D13 99

Contact us