ANSI IEEE 1363-2000 Standard Specifications for Public-Key Cryptography (IEEE Computer Society Documents)《公钥密码的标准规范》.pdf
《ANSI IEEE 1363-2000 Standard Specifications for Public-Key Cryptography (IEEE Computer Society Documents)《公钥密码的标准规范》.pdf》由会员分享,可在线阅读,更多相关《ANSI IEEE 1363-2000 Standard Specifications for Public-Key Cryptography (IEEE Computer Society Documents)《公钥密码的标准规范》.pdf(236页珍藏版)》请在麦多课文档分享上搜索。
1、The Institute of Electrical and Electronics Engineers, Inc.3 Park Avenue, New York, NY 10016-5997, USACopyright 2000 by the Institute of Electrical and Electronics Engineers, Inc.All rights reserved. Published 25 August 2000. Printed in the United States of America.Print: ISBN 0-7381-1956-3 SH94820P
2、DF: ISBN 0-7381-1957-1 SS94820No part of this publication may be reproduced in any form, in an electronic retrieval system or otherwise, without the prior written permission of the publisher.IEEE Std 1363-2000IEEE Standard Specifications for Public-Key CryptographySponsorMicroprocessor Standards Com
3、mitteeof theIEEE Computer SocietyApproved 30 January 2000IEEE-SA Standards BoardApproved 27 July 2000American National Standards InstituteAbstract: This standard specifies common public-key cryptographic techniques, includingmathematical primitives for secret value (key) derivation, public-key encry
4、ption, and digitalsignatures, and cryptographic schemes based on those primitives. It also specifies relatedcryptographic parameters, public keys, and private keys. The purpose of this standard is to providea reference for specifications on a variety of techniques from which applications may select.
5、Keywords: digital signature, encryption, key agreement, public-key cryptographyIEEE Standardsdocuments are developed within the IEEE Societies and the Standards Coordinating Com-mittees of the IEEE Standards Association (IEEE-SA) Standards Board. Members of the committees servevoluntarily and withou
6、t compensation. They are not necessarily members of the Institute. The standardsdeveloped within IEEE represent a consensus of the broad expertise on the subject within the Institute aswell as those activities outside of IEEE that have expressed an interest in participating in the development ofthe
7、standard.Use of an IEEE Standard is wholly voluntary. The existence of an IEEE Standard does not imply that thereare no other ways to produce, test, measure, purchase, market, or provide other goods and services related tothe scope of the IEEE Standard. Furthermore, the viewpoint expressed at the ti
8、me a standard is approved andissued is subject to change brought about through developments in the state of the art and commentsreceived from users of the standard. Every IEEE Standard is subjected to review at least every five years forrevision or reaffirmation. When a document is more than five ye
9、ars old and has not been reaffirmed, it is rea-sonable to conclude that its contents, although still of some value, do not wholly reflect the present state ofthe art. Users are cautioned to check to determine that they have the latest edition of any IEEE Standard.Comments for revision of IEEE Standa
10、rds are welcome from any interested party, regardless of membershipaffiliation with IEEE. Suggestions for changes in documents should be in the form of a proposed change oftext, together with appropriate supporting comments.Interpretations: Occasionally questions may arise regarding the meaning of p
11、ortions of standards as theyrelate to specific applications. When the need for interpretations is brought to the attention of IEEE, theInstitute will initiate action to prepare appropriate responses. Since IEEE Standards represent a consensus ofall concerned interests, it is important to ensure that
12、 any interpretation has also received the concurrence of abalance of interests. For this reason, IEEE and the members of its societies and Standards CoordinatingCommittees are not able to provide an instant response to interpretation requests except in those cases wherethe matter has previously rece
13、ived formal consideration. Comments on standards and requests for interpretations should be addressed to:Secretary, IEEE-SA Standards Board445 Hoes LaneP.O. Box 1331Piscataway, NJ 08855-1331USAIEEE is the sole entity that may authorize the use of certification marks, trademarks, or other designation
14、s toindicate compliance with the materials set forth herein.Authorization to photocopy portions of any individual standard for internal or personal use is granted by theInstitute of Electrical and Electronics Engineers, Inc., provided that the appropriate fee is paid to CopyrightClearance Center. To
15、 arrange for payment of licensing fee, please contact Copyright Clearance Center, Cus-tomer Service, 222 Rosewood Drive, Danvers, MA 01923 USA; (978) 750-8400. Permission to photocopyportions of any individual standard for educational classroom use can also be obtained through the Copy-right Clearan
16、ce Center.Note: Attention is called to the possibility that implementation of this standard mayrequire use of subject matter covered by patent rights. By publication of this standard,no position is taken with respect to the existence or validity of any patent rights inconnection therewith. The IEEE
17、shall not be responsible for identifying patents forwhich a license may be required by an IEEE standard or for conducting inquiries intothe legal validity or scope of those patents that are brought to its attention.Copyright 2000 IEEE. All rights reserved.iiiIntroduction(This introduction is not par
18、t of IEEE Std 1363-2000, IEEE Standard Specifications for Public-Key Cryptography.)The P1363 project started as the “Standard for Rivest-Shamir-Adleman, Diffie-Hellman, and RelatedPublic-Key Cryptography,” with its first meeting held in January 1994, following a strategic initiative by theMicroproce
19、ssor Standards Committee to develop standards for cryptography.P1363s scope broadened with the inclusion of elliptic curve cryptosystems as relatedcryptography, andlater the title was changed to the current one to reflect the breadth of the effort. In mid-1996, the workinggroup decided to include th
20、ree families of techniques, based on three different hard problemsintegerfactorization, discrete logarithms over finite fields, and elliptic curve discrete logarithms. By late 1996, theset of techniques was fairly stable, with additionaltechniques deferred to the P1363a project.Most of the next two
21、years saw an increasing intensity of editing, as the Working Group sought to fulfill thescope that remained. In early 1998, the group set a schedule for completion that would bring the document toballot in late 1998, and final sections of the document were prepared.The process of developing a standa
22、rd is always a challenging one, particularly when the subject is astechnical as cryptography and the scope is as broad as proposed for P1363. Moreover, as other groups weredeveloping complementary standards at the same time as P1363, close coordination was an essential aspect.Security implies a grea
23、t deal of caution, and the Working Group was careful in its deliberations not to set any“standards” that might later lead to vulnerabilities (although, as it is pointed out elsewhere, this standard ismuch more about a framework for specifying public-key techniques, than it is about security, per se)
24、.In addition to this standard, the P1363 project has provided a number of other contributions to the computersecurity industry. First, it has presented a forum where experts can discuss general issues related topublic-key standardization. Second, through its Web page and its call for submissions to
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ANSIIEEE13632000STANDARDSPECIFICATIONSFORPUBLICKEYCRYPTOGRAPHYIEEECOMPUTERSOCIETYDOCUMENTS 密码 标准规范 PDF

链接地址:http://www.mydoc123.com/p-435032.html