IEEE 1363.2-2008
$62.83
IEEE Standard Specification for Password-Based Public-Key Cryptographic Techniques
Published By | Publication Date | Number of Pages |
IEEE | 2008 |
New IEEE Standard – Inactive-Reserved. This standard covers specifications of public-key cryptographic techniques for password-based authentication and key establishment, supplemental to the techniques described in IEEE Std 1363-2000 and IEEE Std 1363a-2004. It is intended as a companion standard to IEEE Std 1363-2000 and IEEE Std 1363a-2004. It includes specifications of primitives and schemes designed to utilize passwords and other low-grade secrets as a basis for securing electronic transactions, including schemes for password-authenticated key agreement and password-authenticated key retrieval.
PDF Catalog
PDF Pages | PDF Title |
---|---|
1 | IEEE Std 1363.2-2008 Front Cover |
3 | Title page |
4 | Abstract/Keywords/ISBNs |
6 | Introduction |
7 | Notice to users Laws and regulations Copyrights Updating of IEEE documents Errata Interpretations |
8 | Patents Participants |
10 | Contents |
13 | Important notice 1. Overview 1.1 Scope 1.2 Purpose |
14 | 1.3 Organization of the document |
15 | 1.4 Document conventions |
16 | 2. Normative references 3. Definitions, acronyms, and abbreviations 3.1 Definitions |
18 | 3.2 Acronyms and abbreviations |
19 | 4. Types of cryptographic techniques |
20 | 4.1 Brief history of the field 4.2 Variations of the network password problem 4.3 General model |
21 | 4.4 Primitives |
24 | 4.5 Schemes |
25 | 4.6 Additional methods |
26 | 4.7 Table summary |
27 | 5. Mathematical conventions |
28 | 5.1 Mathematical notation 5.2 Bit strings and octet strings |
29 | 5.3 Data type conversion |
30 | 6. The DL setting 6.1 The DL setting |
31 | 7. The EC setting 7.1 The EC setting |
32 | 8. Primitives 8.1 Notation and definitions |
36 | 8.2 Primitives |
58 | 9. Password-authenticated key agreement schemes 9.1 General model |
60 | 9.2 BPKAS-PAK |
63 | 9.3 BPKAS-PPK |
66 | 9.4 BPKAS-SPEKE |
72 | 9.6 APKAS-BSPEKE2 |
84 | 9.9 [EC] APKAS-SRP5 |
87 | 9.10 APKAS-WSPEKE |
91 | 10. Password-authenticated key retrieval schemes 10.1 General model 10.2 PKRS-1 |
94 | 11. Key derivation functions 11.1 KDF1 11.2 KDF2 |
95 | 12. Auxiliary techniques 12.1 Hash functions 12.2 Mask generation functions |
96 | 12.3 Key confirmation functions 12.4 Converting between private keys and their octet string representations |
97 | 12.5 Multiplier value creation functions for APKAS-SRP6 |
99 | Annex A (informative) Number-theoretic background A.1 Generation and validation of parameters and keys |
104 | Annex B (normative) Conformance B.1 Conformance requirements |
106 | B.2 Examples |
108 | Annex C (informative) Rationale C.1 General |
111 | C.2 Schemes and primitives |
114 | Annex D (informative) Security considerations |
115 | D.1 Family-specific considerations D.2 Scheme-specific considerations |
135 | Annex E (informative) Formats |
136 | Annex F (informative) Bibliography |