• Shopping Cart
    There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

BS ISO/IEC 29192-4 : 2013

Current

Current

The latest, up-to-date edition.

INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES

Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

01-01-2013

£260.00
Excluding VAT

Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 Unilateral authentication mechanism based
  on discrete logarithms on elliptic curves
6 Unilateral authenticated key exchange mechanism
  based on encryption
7 Identity-based signature mechanism
8 Unilateral authentication mechanism based on discrete
  logarithms on elliptic curves over finite fields of
  characteristic two
Annex A (normative) - Object identifiers
Annex B (normative) - Memory-Computation Trade-Off
        Technique
Annex C (informative) - Numerical examples
Annex D (informative) - Features
Annex E (normative) - ELLI_163.1 and ELLI_193.1
Annex F (informative) - Some special properties of elliptic
        curves over F(2g)
Annex G (informative) - ELLI - Security Considerations
Annex H (informative) - ELLI - Implementation options
Bibliography

Defines three lightweight mechanisms using asymmetric techniques: - a unilateral authentication mechanism based on discrete logarithms on elliptic curves; - an authenticated lightweight key exchange (ALIKE) mechanism for unilateral authentication and establishment of a session key; - an identity-based signature mechanism.

Committee
IST/33
DevelopmentNote
Supersedes 12/30228421 DC. (07/2013) 2013 Edition Re-Issued in February 2016 & incorporates AMD 1 2016. Supersedes 14/30287699 DC. (03/2016)
DocumentType
Standard
Pages
54
PublisherName
British Standards Institution
Status
Current
Supersedes

Standards Relationship
ISO/IEC 29192-4:2013 Identical

ISO/IEC 18031:2011 Information technology — Security techniques — Random bit generation
ISO/IEC 15946-1:2016 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General
ISO/IEC 29192-2:2012 Information technology Security techniques Lightweight cryptography Part 2: Block ciphers
ISO/IEC 14888-3:2016 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
ISO/IEC 8825-1:2015 Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1:
ISO/IEC 18033-3:2010 Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers
ISO/IEC 9796-3:2006 Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms
ISO/IEC 9798-5:2009 Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques
ISO/IEC 10118-1:2016 Information technology Security techniques Hash-functions Part 1: General
ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
ISO/IEC 29192-1:2012 Information technology — Security techniques — Lightweight cryptography — Part 1: General
ISO/IEC 9798-1:2010 Information technology Security techniques Entity authentication Part 1: General

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.