{"id":396401,"date":"2024-10-20T04:24:28","date_gmt":"2024-10-20T04:24:28","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-1363-2000-2\/"},"modified":"2024-10-26T08:11:53","modified_gmt":"2024-10-26T08:11:53","slug":"ieee-1363-2000-2","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-1363-2000-2\/","title":{"rendered":"IEEE 1363-2000"},"content":{"rendered":"

New IEEE Standard – Inactive-Reserved. This standard specifies common public-key cryptographic techniques, including mathematical primitives for secret value (key) derivation, public-key encryption, and digital signatures, and cryptographic schemes based on those primitives. It also specifies related cryptographic parameters, public keys, and private keys. The purpose of this standard is to provide a reference for specifications on a variety of techniques from which applications may select.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
1<\/td>\nTitle page <\/td>\n<\/tr>\n
3<\/td>\nIntroduction <\/td>\n<\/tr>\n
4<\/td>\nParticipants <\/td>\n<\/tr>\n
6<\/td>\nCONTENTS <\/td>\n<\/tr>\n
9<\/td>\n1. Overview
1.1 Scope
1.2 Purpose <\/td>\n<\/tr>\n
10<\/td>\n1.3 Organization of the document
2. References <\/td>\n<\/tr>\n
11<\/td>\n3. Definitions <\/td>\n<\/tr>\n
15<\/td>\n4. Types of cryptographic techniques
4.1 General model <\/td>\n<\/tr>\n
16<\/td>\n4.2 Primitives
4.3 Schemes <\/td>\n<\/tr>\n
17<\/td>\n4.4 Additional methods
4.5 Table summary <\/td>\n<\/tr>\n
18<\/td>\n5. Mathematical conventions <\/td>\n<\/tr>\n
19<\/td>\n5.1 Mathematical notation <\/td>\n<\/tr>\n
20<\/td>\n5.2 Bit strings and octet strings <\/td>\n<\/tr>\n
21<\/td>\n5.3 Finite fields <\/td>\n<\/tr>\n
22<\/td>\n5.4 Elliptic curves and points
5.5 Data type conversion <\/td>\n<\/tr>\n
25<\/td>\n6. Primitives based on the discrete logarithm problem
6.1 The DL setting <\/td>\n<\/tr>\n
27<\/td>\n6.2 Primitives <\/td>\n<\/tr>\n
35<\/td>\n7. Primitives based on the elliptic curve discrete logarithm problem
7.1 The EC setting <\/td>\n<\/tr>\n
37<\/td>\n7.2 Primitives <\/td>\n<\/tr>\n
45<\/td>\n8. Primitives based on the integer factorization problem
8.1 The IF setting <\/td>\n<\/tr>\n
47<\/td>\n8.2 Primitives <\/td>\n<\/tr>\n
54<\/td>\n9. Key agreement schemes
9.1 General model <\/td>\n<\/tr>\n
55<\/td>\n9.2 DL\/ECKAS-DH1 <\/td>\n<\/tr>\n
57<\/td>\n9.3 DL\/ECKAS-DH2 <\/td>\n<\/tr>\n
58<\/td>\n9.4 DL\/ECKAS-MQV <\/td>\n<\/tr>\n
59<\/td>\n10. Signature schemes
10.1 General model <\/td>\n<\/tr>\n
61<\/td>\n10.2 DL\/ECSSA <\/td>\n<\/tr>\n
63<\/td>\n10.3 IFSSA <\/td>\n<\/tr>\n
64<\/td>\n11. Encryption schemes
11.1 General model <\/td>\n<\/tr>\n
65<\/td>\n11.2 IFES <\/td>\n<\/tr>\n
66<\/td>\n12. Message-encoding methods <\/td>\n<\/tr>\n
67<\/td>\n12.1 Message-encoding methods for signatures with appendix <\/td>\n<\/tr>\n
69<\/td>\n12.2 Message-encoding methods for encryption <\/td>\n<\/tr>\n
71<\/td>\n13. Key derivation functions <\/td>\n<\/tr>\n
72<\/td>\n13.1 KDF1
14. Auxiliary functions
14.1 Hash functions <\/td>\n<\/tr>\n
73<\/td>\n14.2 Mask generation functions <\/td>\n<\/tr>\n
75<\/td>\nAnnex A\u2014Number-theoretic background
A.1 Integer and modular arithmetic: overview <\/td>\n<\/tr>\n
80<\/td>\nA.2 Integer and modular arithmetic: algorithms <\/td>\n<\/tr>\n
85<\/td>\nA.3 Binary finite fields: overview <\/td>\n<\/tr>\n
93<\/td>\nA.4 Binary finite fields: algorithms <\/td>\n<\/tr>\n
99<\/td>\nA.5 Polynomials over a finite field <\/td>\n<\/tr>\n
102<\/td>\nA.6 General normal bases for binary fields <\/td>\n<\/tr>\n
106<\/td>\nA.7 Basis conversion for binary fields <\/td>\n<\/tr>\n
112<\/td>\nA.8 Bases for binary fields: tables and algorithms <\/td>\n<\/tr>\n
123<\/td>\nA.9 Elliptic curves: overview <\/td>\n<\/tr>\n
129<\/td>\nA.10 Elliptic curves: algorithms <\/td>\n<\/tr>\n
139<\/td>\nA.11 Functions for elliptic curve parameter and key generation <\/td>\n<\/tr>\n
142<\/td>\nA.12 Functions for elliptic curve parameter and key validation <\/td>\n<\/tr>\n
151<\/td>\nA.13 Class group calculations <\/td>\n<\/tr>\n
155<\/td>\nA.14 Complex multiplication <\/td>\n<\/tr>\n
165<\/td>\nA.15 Primality tests and proofs <\/td>\n<\/tr>\n
170<\/td>\nA.16 Generation and validation of parameters and keys <\/td>\n<\/tr>\n
178<\/td>\nAnnex B\u2014Conformance
B.1 General model <\/td>\n<\/tr>\n
179<\/td>\nB.2 Conformance requirements <\/td>\n<\/tr>\n
181<\/td>\nB.3 Examples <\/td>\n<\/tr>\n
185<\/td>\nAnnex C\u2014Rationale
C.1 General <\/td>\n<\/tr>\n
186<\/td>\nC.2 Keys and domain parameters <\/td>\n<\/tr>\n
187<\/td>\nC.3 Schemes <\/td>\n<\/tr>\n
190<\/td>\nAnnex D\u2014Security considerations
D.1 Introduction
D.2 General principles <\/td>\n<\/tr>\n
192<\/td>\nD.3 Key management considerations <\/td>\n<\/tr>\n
196<\/td>\nD.4 Family-specific considerations <\/td>\n<\/tr>\n
206<\/td>\nD.5 Scheme-specific considerations <\/td>\n<\/tr>\n
216<\/td>\nD.6 Random number generation <\/td>\n<\/tr>\n
220<\/td>\nD.7 Implementation considerations <\/td>\n<\/tr>\n
221<\/td>\nAnnex E\u2014Formats
E.1 Overview
E.2 Representing basic data types as octet strings <\/td>\n<\/tr>\n
224<\/td>\nE.3 Representing outputs of schemes as octet strings <\/td>\n<\/tr>\n
225<\/td>\nAnnex F\u2014Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

IEEE Standard Specifications for Public-Key Cryptography<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
IEEE<\/b><\/a><\/td>\n2000<\/td>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":396405,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2644],"product_tag":[],"class_list":{"0":"post-396401","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-ieee","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/396401","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/396405"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=396401"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=396401"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=396401"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}