ISO/IEC 29192-4:2013
(Main)Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques
Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques
ISO/IEC 29192-4:2013 specifies three lightweight mechanisms using asymmetric techniques: a) a unilateral authentication mechanism based on discrete logarithms on elliptic curves; b) an authenticated lightweight key exchange (ALIKE) mechanism for unilateral authentication and establishment of a session key; c) an identity-based signature mechanism.
Technologies de l'information — Techniques de sécurité — Cryptographie pour environnements contraints — Partie 4: Mécanismes basés sur les techniques asymétriques
General Information
Relations
Standards Content (Sample)
INTERNATIONAL ISO/IEC
STANDARD 29192-4
First edition
2013-06-01
Information technology — Security
techniques — Lightweight cryptography
Part 4:
Mechanisms using asymmetric
techniques
Téchnologies de l'information — Techniques de sécurité —
Cryptographie pour environnements contraints
Partie 4: Mécanismes basés sur les techniques asymétriques
Reference number
ISO/IEC 29192-4:2013(E)
©
ISO/IEC 2013
---------------------- Page: 1 ----------------------
ISO/IEC 29192-4:2013(E)
COPYRIGHT PROTECTED DOCUMENT
© ISO/IEC 2013
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized otherwise in any form or by any
means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior written permission.
Permission can be requested from either ISO at the address below or ISO’s member body in the country of the requester.
ISO copyright office
Case postale 56 CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.org
Web www.iso.org
Published in Switzerland
ii © ISO/IEC 2013 – All rights reserved
---------------------- Page: 2 ----------------------
ISO/IEC 29192-4:2013(E)
Contents Page
Foreword . iv
Introduction . v
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
4 Symbols and abbreviated terms . 4
5 Unilateral authentication mechanism based on discrete logarithms on elliptic curves . 6
5.1 General . 6
5.2 Security requirements for the environment . 6
5.3 Key production . 7
5.4 Unilateral authentication mechanism . 8
6 Unilateral authenticated key exchange mechanism based on encryption . 9
6.1 General . 9
6.2 Security requirements for the environment . 10
6.3 Key production . 10
6.4 Unilateral authentication exchange . 11
6.5 Session-key derivation . 12
7 Identity-based signature mechanism . 12
7.1 General . 12
7.2 Security requirements for the environment . 12
7.3 Key production . 13
7.4 Sign . 13
7.5 Verify . 13
Annex A (normative) Object identifiers . 14
Annex B (normative) Memory-Computation Trade-Off Technique . 15
Annex C (inf
...
Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.