{"id":81784,"date":"2024-10-17T18:58:26","date_gmt":"2024-10-17T18:58:26","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-1363-2-2009\/"},"modified":"2024-10-24T19:47:57","modified_gmt":"2024-10-24T19:47:57","slug":"ieee-1363-2-2009","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-1363-2-2009\/","title":{"rendered":"IEEE 1363.2 2009"},"content":{"rendered":"

New IEEE Standard – Active. This standard covers specifications of public-key cryptographic techniques for password-based authentication and key establishment, supplemental to the techniques described in IEEE Std 1363-2000 and IEEE Std 1363a-2004. It is intended as a companion standard to IEEE Std 1363-2000 and IEEE Std 1363a-2004. It includes specifications of primitives and schemes designed to utilize passwords and other low-grade secrets as a basis for securing electronic transactions, including schemes for password-authenticated key agreement and password-authenticated key retrieval.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
1<\/td>\nIEEE Std 1363.2-2008 Front Cover <\/td>\n<\/tr>\n
3<\/td>\nTitle page
\n <\/td>\n<\/tr>\n
4<\/td>\nAbstract\/Keywords\/ISBNs <\/td>\n<\/tr>\n
6<\/td>\nIntroduction
\n <\/td>\n<\/tr>\n
7<\/td>\nNotice to users
\n
Laws and regulations
\n
Copyrights
\n
Updating of IEEE documents
\n
Errata
\n
Interpretations
\n <\/td>\n<\/tr>\n
8<\/td>\nPatents
\n
Participants
\n <\/td>\n<\/tr>\n
10<\/td>\nContents
\n <\/td>\n<\/tr>\n
13<\/td>\nImportant notice
\n
1. Overview
1.1 Scope
1.2 Purpose <\/td>\n<\/tr>\n
14<\/td>\n1.3 Organization of the document <\/td>\n<\/tr>\n
15<\/td>\n1.4 Document conventions <\/td>\n<\/tr>\n
16<\/td>\n2. Normative references
3. Definitions, acronyms, and abbreviations
3.1 Definitions <\/td>\n<\/tr>\n
18<\/td>\n3.2 Acronyms and abbreviations <\/td>\n<\/tr>\n
19<\/td>\n4. Types of cryptographic techniques <\/td>\n<\/tr>\n
20<\/td>\n4.1 Brief history of the field
4.2 Variations of the network password problem
4.3 General model <\/td>\n<\/tr>\n
21<\/td>\n4.4 Primitives <\/td>\n<\/tr>\n
24<\/td>\n4.5 Schemes <\/td>\n<\/tr>\n
25<\/td>\n4.6 Additional methods <\/td>\n<\/tr>\n
26<\/td>\n4.7 Table summary <\/td>\n<\/tr>\n
27<\/td>\n5. Mathematical conventions <\/td>\n<\/tr>\n
28<\/td>\n5.1 Mathematical notation
5.2 Bit strings and octet strings <\/td>\n<\/tr>\n
29<\/td>\n5.3 Data type conversion <\/td>\n<\/tr>\n
30<\/td>\n6. The DL setting
6.1 The DL setting <\/td>\n<\/tr>\n
31<\/td>\n7. The EC setting
7.1 The EC setting <\/td>\n<\/tr>\n
32<\/td>\n8. Primitives
8.1 Notation and definitions <\/td>\n<\/tr>\n
36<\/td>\n8.2 Primitives <\/td>\n<\/tr>\n
58<\/td>\n9. Password-authenticated key agreement schemes
9.1 General model <\/td>\n<\/tr>\n
60<\/td>\n9.2 BPKAS-PAK <\/td>\n<\/tr>\n
63<\/td>\n9.3 BPKAS-PPK <\/td>\n<\/tr>\n
66<\/td>\n9.4 BPKAS-SPEKE <\/td>\n<\/tr>\n
72<\/td>\n9.6 APKAS-BSPEKE2 <\/td>\n<\/tr>\n
84<\/td>\n9.9 [EC] APKAS-SRP5 <\/td>\n<\/tr>\n
87<\/td>\n9.10 APKAS-WSPEKE <\/td>\n<\/tr>\n
91<\/td>\n10. Password-authenticated key retrieval schemes
10.1 General model
10.2 PKRS-1 <\/td>\n<\/tr>\n
94<\/td>\n11. Key derivation functions
11.1 KDF1
11.2 KDF2 <\/td>\n<\/tr>\n
95<\/td>\n12. Auxiliary techniques
12.1 Hash functions
12.2 Mask generation functions <\/td>\n<\/tr>\n
96<\/td>\n12.3 Key confirmation functions
12.4 Converting between private keys and their octet string representations <\/td>\n<\/tr>\n
97<\/td>\n12.5 Multiplier value creation functions for APKAS-SRP6 <\/td>\n<\/tr>\n
99<\/td>\nAnnex A (informative) Number-theoretic background
A.1 Generation and validation of parameters and keys <\/td>\n<\/tr>\n
104<\/td>\nAnnex B (normative) Conformance
B.1 Conformance requirements <\/td>\n<\/tr>\n
106<\/td>\nB.2 Examples <\/td>\n<\/tr>\n
108<\/td>\nAnnex C (informative) Rationale
C.1 General <\/td>\n<\/tr>\n
111<\/td>\nC.2 Schemes and primitives <\/td>\n<\/tr>\n
114<\/td>\nAnnex D (informative) Security considerations <\/td>\n<\/tr>\n
115<\/td>\nD.1 Family-specific considerations
D.2 Scheme-specific considerations <\/td>\n<\/tr>\n
135<\/td>\nAnnex E (informative) Formats <\/td>\n<\/tr>\n
136<\/td>\nAnnex F (informative) Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

IEEE Standard Specification for Password-Based Public-Key Cryptographic Techniques<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
IEEE<\/b><\/a><\/td>\n2009<\/td>\n139<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":81785,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2644],"product_tag":[],"class_list":{"0":"post-81784","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-ieee","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/81784","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/81785"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=81784"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=81784"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=81784"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}