IEEE 1363.2 : 2008
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
SPECIFICATION FOR PASSWORD-BASED PUBLIC-KEY CRYPTOGRAPHIC TECHNIQUES
17-10-2023
01-01-2008
1 Overview
1.1 Scope
1.2 Purpose
1.3 Organization of the document
1.4 Document conventions
2 Normative references
3 Definitions, acronyms, and abbreviations
3.1 Definitions
3.2 Acronyms and abbreviations
4 Types of cryptographic techniques
4.1 Brief history of the field
4.2 Variations of the network password problem
4.3 General model
4.4 Primitives
4.5 Schemes
4.6 Additional methods
4.7 Table summary
5 Mathematical conventions
5.1 Mathematical notation
5.2 Bit strings and octet strings
5.3 Data type conversion
6 The DL setting
6.1 The DL setting
7 The EC setting
7.1 The EC setting
8 Primitives
8.1 Notation and definitions
8.2 Primitives
9 Password-authenticated key agreement schemes
9.1 General model
9.2 BPKAS-PAK
9.3 BPKAS-PPK
9.4 BPKAS-SPEKE
9.5 APKAS-AMP
9.6 APKAS-BSPEKE2
9.7 APKAS-PAKZ
9.8 [DL] APKAS-SRP3, APKAS-SRP6
9.9 [EC] APKAS-SRP5
9.10 APKAS-WSPEKE
10 Password-authenticated key retrieval schemes
10.1 General model
10.2 PKRS-1
11 Key derivation functions
11.1 KDF1
11.2 KDF2
12 Auxiliary techniques
12.1 Hash functions
12.2 Mask generation functions
12.3 Key confirmation functions
12.4 Converting between private keys and their octet
string representations
12.5 Multiplier value creation functions for APKAS-SRP6
Annex A (informative) Number-theoretic background
Annex B (normative) Conformance
Annex C (informative) Rationale
Annex D (informative) Security considerations
Annex E (informative) Formats
Annex F (informative) Bibliography
Describes specifications of common public-key cryptographic techniques for performing password-based authentication and key establishment, supplemental to the techniques described in IEEE Std 1363-2000 and IEEE Std 1363a-2004.
DocumentType |
Standard
|
PublisherName |
Institute of Electrical & Electronics Engineers
|
Status |
Withdrawn
|
INCITS/ISO/IEC 11770-4 : 2008 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
ISO/IEC 11770-4:2017 | Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets |
BS ISO/IEC 11770-4:2017 | Information technology. Security techniques. Key management Mechanisms based on weak secrets |
16/30335688 DC : 0 | BS ISO/IEC 11770-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
CSA ISO/IEC 11770-4 : 2007 : R2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
CSA ISO/IEC 11770-4 : 2007 : INC : COR 1 : 2010 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
CSA ISO/IEC 11770-4 : 2007 : R2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
CSA ISO/IEC 11770-4 : 2007 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
ANSI X9.30.1 : 1997 | PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY - PART 1: THE DIGITAL SIGNATURE ALGORITHM (DSA) |
ISO/IEC 11770-4:2006 | Information technology Security techniques Key management Part 4: Mechanisms based on weak secrets |
FIPS PUB 186 : 0 | DIGITAL SIGNATURE STANDARD (DSS) |
ISO/IEC 10118-3:2004 | Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions |
FIPS PUB 180 : 2002 | SECURE HASH STANDARD |
ANSI X9.42 : 2003(R2013) | PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES: AGREEMENT OF SYMMETRIC KEYS USING DISCRETE LOGARITHM CRYPTOGRAPHY |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.