IEEE 1363-2000 pdf download IEEE Standard Specifications for Public-Key Cryptography
1. Overview
1.1 Scope
This standard covers specifications for common public-key cryptographic techniques, includingmathematical primitives for secret value (key) derivation, public-key encryption and digital signatures, andcryptographic schemes based on those primitives. Specifications of related cryptographic parameters, publickeys, and private keys are also discussed. Classes of computers and communication systems are notrestricted.
NOTE–As of the date of this standard’s publication, another EEE project, P1363a, is underway to specify additionaltechniques. lts intent is to be an amendment to this standard, lts scope is similar to that of this standard, with the additionof identification schemes. (See the note in 1.2 for a description of the purpose of P1363a.)
1.2 Purpose
The transition from paper to electronic media brings with it the need for electronic privacy and authenticityPublic-key cryptography offers fundamental technology addressing this need. Many alternative public-keytechniques have been proposed, each with its own benefits. However, there has been no single.comprehensive reference defining a full range of common public-key techniques covering key agreement.public-key encryptiondigital signatures, and identification from several families, such as discretelogarithms,integer factorization, and elliptic curves.
It is not the purpose of this standard to mandate any particular set of public-key techniques, or particularattributes of public-key techniques, such as key sizes. Rather, its purpose is to provide a reference forspecifications of a variety of techniques from which applications may select.
NOTE-As of the date of this standard’s publication, another lEEE project, P1363a, is underway to specify additionaltechniques. ts intent is to be an amendment to this standard. lts purpose is similar to that of this standard; however.P1363a will focus on newer techniques. while this standard specifies relatively well-established techniques. (See thenote in 1.1 for a decription of the scope of P1363a.)
1.3.2 Structure of the annexes
The six annexes provide background and helpful information for the users of this standard, as follows:
– Annex A (informative) Number-theoretic background
– Annex B (normative) Conformance
– Annex C (informative) Rationale
– Annex D (informative) Security considerations
– Annex E (informative) Formats
– Annex F (informative) Bibliography
2. References
This standard shall be used in conjunction with the following publications.
FIPS PUB 180-1, Secure Hash Standard, Federal Information Processing Standards Publication 180-1, U.S.Department of Commerce/National Institute of Standards and Technology, April 1995
IEEE 1363-2000 pdf download
PS:Thank you for your support!