IEEE 1363A-2004 en Standard Specifications for Public-Key Cryptography Public-Key Cryptography - Amendment 1 Additional Techniques《公钥密码学的规范 修改件1 附加技术》.pdf
《IEEE 1363A-2004 en Standard Specifications for Public-Key Cryptography Public-Key Cryptography - Amendment 1 Additional Techniques《公钥密码学的规范 修改件1 附加技术》.pdf》由会员分享,可在线阅读,更多相关《IEEE 1363A-2004 en Standard Specifications for Public-Key Cryptography Public-Key Cryptography - Amendment 1 Additional Techniques《公钥密码学的规范 修改件1 附加技术》.pdf(168页珍藏版)》请在麦多课文档分享上搜索。
1、IEEE Std 1363a-2004(Amendment toIEEE Std 1363-2000)IEEE Standards1363aTMIEEE Standard Specifications forPublic-Key CryptographyAmendment 1: Additional Techniques3 Park Avenue, New York, NY 10016-5997, USAIEEE Computer SocietySponsored by theMicroprocessor and Microcomputer Standards CommitteeIEEE St
2、andards2 September 2004Print: SH95223PDF: SS95223Recognized as anAmerican National Standard (ANSI)The Institute of Electrical and Electronics Engineers, Inc.3 Park Avenue, New York, NY 10016-5997, USACopyright 2004 by the Institute of Electrical and Electronics Engineers, Inc.All rights reserved. Pu
3、blished 2 September 2004. Printed in the United States of America.IEEE is a registered trademark in the U.S. Patent +1 978 750 8400. Permission to photocopy portions of any individual standard for educationalclassroom use can also be obtained through the Copyright Clearance Center.NOTEAttention is c
4、alled to the possibility that implementation of this standard may require use of subjectmatter covered by patent rights. By publication of this standard, no position is taken with respect to the exist-ence or validity of any patent rights in connection therewith. The IEEE shall not be responsible fo
5、r identifyingpatents for which a license may be required by an IEEE standard or for conducting inquiries into the legal valid-ity or scope of those patents that are brought to its attention.Copyright 2004 IEEE. All rights reserved. iiiIntroduction(This introduction is not part of IEEE Std 1363a-2004
6、, IEEE Standard for Specifications for Public-Key CryptographyAmendment 1: Additional Techniques.)IEEE Std 1363a-2004 started in 1996 as an amendment to IEEE P1363, which later becameIEEE Std 1363TM-2000. At the time of the projects inception, the techniques included in P1363 were fairlystable; howe
7、ver, there were additional techniques that had been submitted to the Working Group that war-ranted further study and consideration. The P1363a project became the entry point for newly proposed andcomparatively less-established techniques, while the P1363 document was solidified and prepared for theI
8、EEE balloting process.In early 1999, the Working Group began to limit the contents of P1363a primarily to include techniques thatfit within the framework of the base document. In particular, the group concentrated on techniques in eachfamily that performed functions that were not available in the P1
9、363 document, such as encryption schemesin the discrete logarithm (DL) and elliptic curve (EC) families and signature schemes with message recoveryin all families DL, EC, and IF (integer factorization).Because of the large number of good candidates and the close similarities between many of the diff
10、erenttechniques, the Working Group began to formalize the criteria for acceptance into P1363a, comparing allaspects of the techniques. By late 1999, the Working Group had converged on several candidate techniquesto include in P1363a, making selections to provide a variety of relevant tradeoffs among
11、 security attributes,computational efficiency, and industry adoption for each family. As with the P1363 project, the WorkingGroup chose to close P1363a to additional techniques and prepare it for ballot, leaving standardization ofadditional techniques that may not have been ready for inclusion at th
12、at time to future standards.Throughout the process of creating IEEE Std 1363a-2004, the Working Group has been very fortunate toreceive numerous submissions of creative, useful, and well-designed public-key cryptographic techniques. Inaddition to techniques in the IF, DL, and EC families that were n
13、ot included in 1363a, there were also a numberof techniques submitted that fell outside of the scope of both IEEE Std 1363-2000 and IEEE Std 1363a-2004.As a result, the Microprocessor Standards Committee (MSC) commissioned a study group, in which many ofthe 1363 working group members participated, t
14、o explore the possibility of creating additional standardsrelated to public-key cryptography. In late 2000, the working group began work on P1363.1 (Public-KeyCryptographic Techniques Based on Hard Problems over Lattices) and P1363.2 (Password-Based Public-KeyCryptographic Techniques). At the time o
15、f this writing, the Working Group is also attempting to put togethera project for the second amendment to Std 1363-2000 (P1363b), which would continue the work fromIEEE Std 1363-2000 and IEEE Std 1363a-2004. The Working Group is considering the creation of a registryfor public-key cryptographic tech
16、niques.The process of developing IEEE Std 1363a-2004 has been very challenging, but it has allowed the WorkingGroup to continue to refine the general understanding of public-key cryptography and to follow up on thework put into IEEE Std 1363-2000. The IEEE P1363 Working Group continues to be an exce
17、llent forum forexperts to discuss technical and standardization issues associated with public-key cryptography. It has pro-vided a focal point for the presentation of new developments in public-key cryptography and remains asource for up-to-date information on the topic. For the duration of its exis
18、tence, the Working Group intendsto maintain a web page that will support all of the 1363 standards and current projects (see http:/grou-per.ieee.org/groups/1363/index.html).iv Copyright 2004 IEEE. All rights reserved.Notice to usersErrataErrata, if any, for this and all other standards can be access
19、ed at the following URL: http:/standards.ieee.org/reading/ieee/updates/errata/index.html. Users are encouraged to check this URL forerrata periodically.InterpretationsCurrent interpretations can be accessed at the following URL: http:/standards.ieee.org/reading/ieee/interp/index.html.PatentsAttentio
20、n is called to the possibility that implementation of this standard may require use of subject mattercovered by patent rights. By publication of this standard, no position is taken with respect to the existence orvalidity of any patent rights in connection therewith. The IEEE shall not be responsibl
21、e for identifyingpatents or patent applications for which a license may be required to implement an IEEE standard or forconducting inquiries into the legal validity or scope of those patents that are brought to its attention. A patentholder or patent applicant has filed a statement of assurance that
22、 it will grant licenses under these rightswithout compensation or under reasonable rates and nondiscriminatory, reasonable terms and conditions toapplicants desiring to obtain such licenses. The IEEE makes no representation as to the reasonableness ofrates, terms, and conditions of the license agree
23、ments offered by patent holders or patent applicants. Furtherinformation may be obtained from the IEEE Standards Department.OrganizationThis standard is written as an amendment to the IEEE Std 1363-2000 document and is intended to be mergedinto a future version of that document. Familiarity with IEE
24、E Std 1363-2000 is assumed. The followingclauses and annexes are updated: Clause 2, References Clause 3, Definitions Clause 4, Types of cryptographic techniques Clause 5, Mathematical conventions Clause 6, Primitives based on the discrete logarithm problem Clause 7, Primitives based on the elliptic
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- IEEE1363A2004ENSTANDARDSPECIFICATIONSFORPUBLICKEYCRYPTOGRAPHYPUBLICKEYCRYPTOGRAPHYAMENDMENT1ADDITIONALTECHNIQUES

链接地址:http://www.mydoc123.com/p-1248158.html