{"id":81784,"date":"2024-10-17T18:58:26","date_gmt":"2024-10-17T18:58:26","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-1363-2-2009\/"},"modified":"2024-10-24T19:47:57","modified_gmt":"2024-10-24T19:47:57","slug":"ieee-1363-2-2009","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-1363-2-2009\/","title":{"rendered":"IEEE 1363.2 2009"},"content":{"rendered":"
New IEEE Standard – Active. This standard covers specifications of public-key cryptographic techniques for password-based authentication and key establishment, supplemental to the techniques described in IEEE Std 1363-2000 and IEEE Std 1363a-2004. It is intended as a companion standard to IEEE Std 1363-2000 and IEEE Std 1363a-2004. It includes specifications of primitives and schemes designed to utilize passwords and other low-grade secrets as a basis for securing electronic transactions, including schemes for password-authenticated key agreement and password-authenticated key retrieval.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
1<\/td>\n | IEEE Std 1363.2-2008 Front Cover <\/td>\n<\/tr>\n | ||||||
3<\/td>\n | Title page \n <\/td>\n<\/tr>\n | ||||||
4<\/td>\n | Abstract\/Keywords\/ISBNs <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Introduction \n <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Notice to users \n Laws and regulations \n Copyrights \n Updating of IEEE documents \n Errata \n Interpretations \n <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Patents \n Participants \n <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | Contents \n <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | Important notice \n 1. Overview 1.1 Scope 1.2 Purpose <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 1.3 Organization of the document <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 1.4 Document conventions <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 2. Normative references 3. Definitions, acronyms, and abbreviations 3.1 Definitions <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 3.2 Acronyms and abbreviations <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 4. Types of cryptographic techniques <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 4.1 Brief history of the field 4.2 Variations of the network password problem 4.3 General model <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 4.4 Primitives <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 4.5 Schemes <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 4.6 Additional methods <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 4.7 Table summary <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 5. Mathematical conventions <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 5.1 Mathematical notation 5.2 Bit strings and octet strings <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 5.3 Data type conversion <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 6. The DL setting 6.1 The DL setting <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 7. The EC setting 7.1 The EC setting <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 8. Primitives 8.1 Notation and definitions <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 8.2 Primitives <\/td>\n<\/tr>\n | ||||||
58<\/td>\n | 9. Password-authenticated key agreement schemes 9.1 General model <\/td>\n<\/tr>\n | ||||||
60<\/td>\n | 9.2 BPKAS-PAK <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | 9.3 BPKAS-PPK <\/td>\n<\/tr>\n | ||||||
66<\/td>\n | 9.4 BPKAS-SPEKE <\/td>\n<\/tr>\n | ||||||
72<\/td>\n | 9.6 APKAS-BSPEKE2 <\/td>\n<\/tr>\n | ||||||
84<\/td>\n | 9.9 [EC] APKAS-SRP5 <\/td>\n<\/tr>\n | ||||||
87<\/td>\n | 9.10 APKAS-WSPEKE <\/td>\n<\/tr>\n | ||||||
91<\/td>\n | 10. Password-authenticated key retrieval schemes 10.1 General model 10.2 PKRS-1 <\/td>\n<\/tr>\n | ||||||
94<\/td>\n | 11. Key derivation functions 11.1 KDF1 11.2 KDF2 <\/td>\n<\/tr>\n | ||||||
95<\/td>\n | 12. Auxiliary techniques 12.1 Hash functions 12.2 Mask generation functions <\/td>\n<\/tr>\n | ||||||
96<\/td>\n | 12.3 Key confirmation functions 12.4 Converting between private keys and their octet string representations <\/td>\n<\/tr>\n | ||||||
97<\/td>\n | 12.5 Multiplier value creation functions for APKAS-SRP6 <\/td>\n<\/tr>\n | ||||||
99<\/td>\n | Annex A (informative) Number-theoretic background A.1 Generation and validation of parameters and keys <\/td>\n<\/tr>\n | ||||||
104<\/td>\n | Annex B (normative) Conformance B.1 Conformance requirements <\/td>\n<\/tr>\n | ||||||
106<\/td>\n | B.2 Examples <\/td>\n<\/tr>\n | ||||||
108<\/td>\n | Annex C (informative) Rationale C.1 General <\/td>\n<\/tr>\n | ||||||
111<\/td>\n | C.2 Schemes and primitives <\/td>\n<\/tr>\n | ||||||
114<\/td>\n | Annex D (informative) Security considerations <\/td>\n<\/tr>\n | ||||||
115<\/td>\n | D.1 Family-specific considerations D.2 Scheme-specific considerations <\/td>\n<\/tr>\n | ||||||
135<\/td>\n | Annex E (informative) Formats <\/td>\n<\/tr>\n | ||||||
136<\/td>\n | Annex F (informative) Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" IEEE Standard Specification for Password-Based Public-Key Cryptographic Techniques<\/b><\/p>\n |