IEEE-1363.2-2008.pdf
《IEEE-1363.2-2008.pdf》由会员分享,可在线阅读,更多相关《IEEE-1363.2-2008.pdf(139页珍藏版)》请在三一文库上搜索。
1、IEEE Std 1363.2-2008 IEEE Standard Specifications for Password-Based Public-Key Cryptographic Techniques IEEE 3 Park Avenue New York, NY 10016-5997, USA 29 January 2009 IEEE Computer Society Sponsored by the Microprocessor Standards Committee 1363.2 TM Authorized licensed use limited to: IHS Stephan
2、ie Dejesus. Downloaded on February 13, 2009 at 06:41 from IEEE Xplore. Restrictions apply. Copyright The Institute of Electrical and Electronics Engineers, Inc. Provided by IHS under license with IEEELicensee=HP Monitoring/1111111164 Not for Resale, 04/06/2009 02:57:51 MDTNo reproduction or networki
3、ng permitted without license from IHS -,-,- Authorized licensed use limited to: IHS Stephanie Dejesus. Downloaded on February 13, 2009 at 06:41 from IEEE Xplore. Restrictions apply. Copyright The Institute of Electrical and Electronics Engineers, Inc. Provided by IHS under license with IEEELicensee=
4、HP Monitoring/1111111164 Not for Resale, 04/06/2009 02:57:51 MDTNo reproduction or networking permitted without license from IHS -,-,- IEEE Std 1363.2-2008 IEEE Standard Specification for Password-Based Public-Key Cryptographic Techniques Sponsor Microprocessor Standards Committee of the IEEE Comput
5、er Society Approved 26 September 2008 IEEE-SA Standards Board Authorized licensed use limited to: IHS Stephanie Dejesus. Downloaded on February 13, 2009 at 06:41 from IEEE Xplore. Restrictions apply. Copyright The Institute of Electrical and Electronics Engineers, Inc. Provided by IHS under license
6、with IEEELicensee=HP Monitoring/1111111164 Not for Resale, 04/06/2009 02:57:51 MDTNo reproduction or networking permitted without license from IHS -,-,- Abstract: This standard covers specifications of public-key cryptographic techniques for password-based authentication and key establishment, suppl
7、emental to the techniques described in IEEE Std 1363-2000 and IEEE Std 1363a-2004. It is intended as a companion standard to IEEE Std 1363-2000 and IEEE Std 1363a-2004. It includes specifications of primitives and schemes designed to utilize passwords and other low-grade secrets as a basis for secur
8、ing electronic transactions, including schemes for password-authenticated key agreement and password-authenticated key retrieval. Keywords: authentication, key agreement, password, public-key cryptography The Institute of Electrical and Electronics Engineers, Inc. 3 Park Avenue, New York, NY 10016-5
9、997, USA Copyright 2009 by the Institute of Electrical and Electronics Engineers, Inc. All rights reserved. Published 29 January 2009. Printed in the United States of America. IEEE is a registered trademark in the U.S. Patent +1 978 750 8400. Permission to photocopy portions of any individual standa
10、rd for educational classroom use can also be obtained through the Copyright Clearance Center. Authorized licensed use limited to: IHS Stephanie Dejesus. Downloaded on February 13, 2009 at 06:41 from IEEE Xplore. Restrictions apply. Copyright The Institute of Electrical and Electronics Engineers, Inc
11、. Provided by IHS under license with IEEELicensee=HP Monitoring/1111111164 Not for Resale, 04/06/2009 02:57:51 MDTNo reproduction or networking permitted without license from IHS -,-,- iv Copyright 2009 IEEE. All rights reserved. Introduction This introduction is not part of IEEE Std 1363.2-2008, IE
12、EE Standard Specification for Password-Based Public-Key Cryptographic Techniques. The history of the IEEE P1363.2a project began in late 1996 with a presentation to the IEEE P1363 Working Group of a password-based public-key method for key agreement. Originally submitted as material for potential in
13、clusion in the P1363 document, which later became IEEE Std 1363-2000,b this class of technique was deemed to be sufficiently interesting and yet sufficiently different from the original focus of the IEEE P1363 Working Group as to merit further study to determine how it should be addressed. At that t
14、ime, the techniques included in the P1363 draft were fairly stable; however, there were also other additional techniques that had been submitted to the Working Group that warranted further study and consideration. The P1363a project became the entry point for newly proposed methods that were similar
15、 in function to and in the same mathematical families as methods in the P1363 project, which focused on key exchange, digital signature, and public-key encryption schemes in the integer factorization, discrete logarithm (DL), and elliptic curve (EC) families. Work on P1363a progressed while IEEE Std
16、 1363-2000 was solidified and prepared for the IEEE balloting process. In time, the Working Group similarly chose to close P1363a to additional techniques and prepare it for ballot, leaving standardization of additional techniques to future standards. P1363a resulted in the IEEE Std 1363a-2004 amend
17、ment. Throughout the process of creating these standards, the Working Group continued to receive numerous submissions of creative, useful, and well-designed public-key cryptographic techniques, including password-based techniques. To address the number of submitted techniques that fell outside the f
18、unctional or familial scope of both IEEE Std 1363-2000 and IEEE Std 1363a-2004, the Microprocessor Standards Committee (MSC) commissioned a study group, in which many of the IEEE P1363 Working Group members participated, to explore the possibility of creating additional standards related to public-k
19、ey cryptography. In late 2000, the Working Group began work on P1363.2 (password-based public-key cryptographic techniques) and P1363.1 (public-key cryptographic techniques based on hard problems over lattices). The Working Group has also begun work on P1363.3 (identity-based cryptographic technique
20、s using pairings) and has discussed other potential projects to continue the work from IEEE Std 1363a-2004. The IEEE P1363 Working Group continues to be an excellent forum for experts to discuss technical and standardization issues associated with public-key cryptography. It has provided a focal poi
21、nt for the presentation of new developments in public-key cryptography and remains a source for up-to-date information on the topic. For the duration of its existence, the Working Group intends to maintain a Web site that will support all of the IEEE 1363 standards and current projects.c The IEEE P1
22、363 Working Group would once again like to thank all of the participants and outside experts that have contributed to this standard, to the development of public-key technology and to the P1363 process. a The P indicates an IEEE authorized standards project that was not approved by the IEEE-SA Stand
23、ards Board at the time the Working Group was formed. b Information on references can be found in Clause 2. c Information can be found at: http:/grouper.ieee.org/groups/1363/index.html. Authorized licensed use limited to: IHS Stephanie Dejesus. Downloaded on February 13, 2009 at 06:41 from IEEE Xplor
24、e. Restrictions apply. Copyright The Institute of Electrical and Electronics Engineers, Inc. Provided by IHS under license with IEEELicensee=HP Monitoring/1111111164 Not for Resale, 04/06/2009 02:57:51 MDTNo reproduction or networking permitted without license from IHS -,-,- v Copyright 2009 IEEE. A
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- IEEE 1363.2 2008
链接地址:https://www.31doc.com/p-3769570.html