Shopping Cart

No products in the cart.

IEEE 1363.2 2009

$44.96

IEEE Standard Specification for Password-Based Public-Key Cryptographic Techniques

Published By Publication Date Number of Pages
IEEE 2009 139
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. Weā€™re here to assist you 24/7.
Email:[email protected]

New IEEE Standard – Active. This standard covers specifications of public-key cryptographic techniques for password-based authentication and key establishment, supplemental to the techniques described in IEEE Std 1363-2000 and IEEE Std 1363a-2004. It is intended as a companion standard to IEEE Std 1363-2000 and IEEE Std 1363a-2004. It includes specifications of primitives and schemes designed to utilize passwords and other low-grade secrets as a basis for securing electronic transactions, including schemes for password-authenticated key agreement and password-authenticated key retrieval.

PDF Catalog

PDF Pages PDF Title
1 IEEE Std 1363.2-2008 Front Cover
3 Title page
4 Abstract/Keywords/ISBNs
6 Introduction
7 Notice to users

Laws and regulations

Copyrights

Updating of IEEE documents

Errata

Interpretations
8 Patents

Participants
10 Contents
13 Important notice

1. Overview
1.1 Scope
1.2 Purpose
14 1.3 Organization of the document
15 1.4 Document conventions
16 2. Normative references
3. Definitions, acronyms, and abbreviations
3.1 Definitions
18 3.2 Acronyms and abbreviations
19 4. Types of cryptographic techniques
20 4.1 Brief history of the field
4.2 Variations of the network password problem
4.3 General model
21 4.4 Primitives
24 4.5 Schemes
25 4.6 Additional methods
26 4.7 Table summary
27 5. Mathematical conventions
28 5.1 Mathematical notation
5.2 Bit strings and octet strings
29 5.3 Data type conversion
30 6. The DL setting
6.1 The DL setting
31 7. The EC setting
7.1 The EC setting
32 8. Primitives
8.1 Notation and definitions
36 8.2 Primitives
58 9. Password-authenticated key agreement schemes
9.1 General model
60 9.2 BPKAS-PAK
63 9.3 BPKAS-PPK
66 9.4 BPKAS-SPEKE
72 9.6 APKAS-BSPEKE2
84 9.9 [EC] APKAS-SRP5
87 9.10 APKAS-WSPEKE
91 10. Password-authenticated key retrieval schemes
10.1 General model
10.2 PKRS-1
94 11. Key derivation functions
11.1 KDF1
11.2 KDF2
95 12. Auxiliary techniques
12.1 Hash functions
12.2 Mask generation functions
96 12.3 Key confirmation functions
12.4 Converting between private keys and their octet string representations
97 12.5 Multiplier value creation functions for APKAS-SRP6
99 Annex A (informative) Number-theoretic background
A.1 Generation and validation of parameters and keys
104 Annex B (normative) Conformance
B.1 Conformance requirements
106 B.2 Examples
108 Annex C (informative) Rationale
C.1 General
111 C.2 Schemes and primitives
114 Annex D (informative) Security considerations
115 D.1 Family-specific considerations
D.2 Scheme-specific considerations
135 Annex E (informative) Formats
136 Annex F (informative) Bibliography
IEEE 1363.2 2009
$44.96