IEEE 136-2000 pdf download IEEE Standard Specications for Public-Key Cryptography
1. Overview
1.1 Scope
This standard covers specifications for common public-key cryptographic techniques, includingmathematical primitives for secret value (key) derivation, public-key encryption and digital signatures, andcryptographic schemes based on those primitives. Specifications of related cryptographic parameters. publickeys, and private keys are also discussed. Classes of computers and communication systems are notrestricted.
NOTE-As of the date of this standard’s publication, another lEEE project, P1363a, is underway to specify additionaltechniques. lts intent is to be an amendment to this standard. Its scope is similar to that of this standard. with the additionof identification schemes. (See the note in 1.2 for a description of the purpose of P1363a.)
1.2 Purpose
The transition from paper to electronic media brings with it the need for electronic privacy and authenticityPublic-key cryptography offers fundamental technology addressing this need. Many alternative public-keytechniques have been proposed, each with its own benefits. However. there has been no singlecomprehensive reference defining a full range of common public-key techniques covering key agreementpublic-key encryption, digital signatures, and identification from several families. such as discreteogarithms, integer factorization, and elliptic curves.
It is not the purpose of this standard to mandate any particular set of public-key techniques, or particularattributes of public-key techniques, such as key sizes. Rather, its purpose is to provide a reference forspecifications of a variety of techniques from which applications may select.
NOTE-As of the date of this standard’s publication, another IEEE project, Pl363a, is underway to specify additionaltechniques. Its intent is to be an amendment to this standard. lts purpose is similar to that of this standard; howeverPl363a will focus on newer techniques. while this standard specifies relatively well-established techniaues. (See thenote in l.I for a decription of the scope of P1363a.)
1.3 Organization of the document
This standard contains two parts: the main document and six annexes.
1.3.1 Structure of the main document
— Clause 1 is an overview.
— Clause 2 provides references to other standards.
— Clause 3 denes relevant terms used throughout this standard.
— Clause 4 gives an overview of the types of cryptographic techniques that are described in this standard.
— Clause 5 describes certain mathematical conventions used in the standard, including notation and representation of mathematical objects. It also denes formats to be used in communicating the mathematical objects, as well as primitives for data type conversion.
— Clause 6 through Clause 11 dene three families of cryptographic techniques: techniques based on the discrete logarithm problem (DL), the elliptic curve discrete logarithm problem (EC), and the integer factorization problem (IF). Clause 6, Clause 7, and Clause 8 dene the setting and primitives used in the DL, EC, and IF families, respectively. Clause 9, Clause 10, and Clause 11 dene key agreement schemes, signature schemes, and encryption schemes, respectively.
IEEE 136-2000 pdf download
PS:Thank you for your support!