Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques

ISO/IEC 29192-4:2013 specifies three lightweight mechanisms using asymmetric techniques: a) a unilateral authentication mechanism based on discrete logarithms on elliptic curves; b) an authenticated lightweight key exchange (ALIKE) mechanism for unilateral authentication and establishment of a session key; c) an identity-based signature mechanism.

Technologies de l'information — Techniques de sécurité — Cryptographie pour environnements contraints — Partie 4: Mécanismes basés sur les techniques asymétriques

General Information

Status
Published
Publication Date
21-May-2013
Current Stage
9060 - Close of review
Start Date
04-Jun-2029
Ref Project

Relations

Buy Standard

Standard
ISO/IEC 29192-4:2013 - Information technology -- Security techniques -- Lightweight cryptography
English language
26 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (Sample)

INTERNATIONAL ISO/IEC
STANDARD 29192-4
First edition
2013-06-01


Information technology — Security
techniques — Lightweight cryptography
Part 4:
Mechanisms using asymmetric
techniques
Téchnologies de l'information — Techniques de sécurité —
Cryptographie pour environnements contraints
Partie 4: Mécanismes basés sur les techniques asymétriques




Reference number
ISO/IEC 29192-4:2013(E)
©
ISO/IEC 2013

---------------------- Page: 1 ----------------------
ISO/IEC 29192-4:2013(E)

COPYRIGHT PROTECTED DOCUMENT


©  ISO/IEC 2013
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized otherwise in any form or by any
means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior written permission.
Permission can be requested from either ISO at the address below or ISO’s member body in the country of the requester.
ISO copyright office
Case postale 56  CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.org
Web www.iso.org
Published in Switzerland

ii © ISO/IEC 2013 – All rights reserved

---------------------- Page: 2 ----------------------
ISO/IEC 29192-4:2013(E)
Contents Page
Foreword . iv
Introduction . v
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
4 Symbols and abbreviated terms . 4
5 Unilateral authentication mechanism based on discrete logarithms on elliptic curves . 6
5.1 General . 6
5.2 Security requirements for the environment . 6
5.3 Key production . 7
5.4 Unilateral authentication mechanism . 8
6 Unilateral authenticated key exchange mechanism based on encryption . 9
6.1 General . 9
6.2 Security requirements for the environment . 10
6.3 Key production . 10
6.4 Unilateral authentication exchange . 11
6.5 Session-key derivation . 12
7 Identity-based signature mechanism . 12
7.1 General . 12
7.2 Security requirements for the environment . 12
7.3 Key production . 13
7.4 Sign . 13
7.5 Verify . 13
Annex A (normative) Object identifiers . 14
Annex B (normative) Memory-Computation Trade-Off Technique . 15
Annex C (inf
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.