ISO IEC 29192-4:2013 pdf download
ISO IEC 29192-4:2013 pdf download.Information technology一Security techniques一Lightweight cryptography Part 4:Mechanisms using asymmetric techniques.
This part of ISO/lEG 29192 specifies three lightweight mechanisms using asymmetric techniques:
a unilateral authentication mechanism based on discrete logarithms on elliptic curves;
an authenticated lightweight key exchange (ALIKE) mechanism for unilateral authentication and establishment of a session key;
an identity-based signature mechanism.
2 Normative references
The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies.
ISO/lEG 15946-1, In formation technology — Security techniques — Cryptographic techniques based on elliptic cutves — Part 1: General
ISO/IEC 29192-1, Information technology — Security techniques — Lightweight cryptography — Part 1:
General
3 Terms and definitions
For the purposes of this document, the terms and definitions given in ISO/lEG 29192-1 and the following apply.
3.1
asymmetric cryptographic technique
cryptographic technique that uses two related operations: a public operation defined by a public data item, and
a private operation defined by a private data item
Note 1 to entry: The two operations have the property that, given the public operation, it is computationally infeasible to derive the private operation.
[SOURCE: ISO/IEC 9798-5:2009, definition 2.3]
3.2
asymmetric pair
two related data items where the private data item defines a private operation and the public data item defines
a public operation
[SOURCE: ISO/IEC 9798-5:2009, definition 2.5]
3.3
challenge
procedure parameter used in conjunction with secret parameters to produce a response
[SOURCE: ISO/lEC 9798-5:2009, definition 2.6]
3.4
claimant
entity whose identity can be authenticated, including the functions and the private data necessary to engage in authentication exchanges on behalf of a principal
[SOURCE: ISO/IEC 9798-5:2009, definition 2.7]
3.5
claimant parameter
public data item, number or bit string, specific to a given claimant within the domain
[SOURCE: ISO/IEC 9798-5:2009, definition 2.9]
3.6
collision-resistant hash-function
hash-function satisfying the following property: it is computationally infeasible to find any two distinct inputs which map to the same output
Note 1 to entry: computational feasibility depends on the specific security requirements and environment. [SOURCE: ISO/IEC 10118-1:2000, definition 3.2]
3.7
coupon
pair of pre-computed numbers to be used only once
Note 1 to entry: One of the numbers shall be kept secret, and the other shall remain secret until the time of use. [SOURCE: ISO/lEC 9798-5:2009, definition 2.8, modified]
3.8
domain
collection of entities operating under a single security policy
Note 1 to entry: For instance, public key certificates created either by a single certification authority, or by a collection of certification authorities using the same security policy.
[SOURCE: ISO/lEC 9798-5:2009, definition 2.111
3.9
domain parameter
public key, or function, agreed and used by all entities within the domain
[SOURCE: ISO/IEC 9798-5:2009, definition 2.12]
3.10
entity authentication
corroboration that an entity is the one claimed
[SOURCE: ISO/lEC 9798-1:2010, definition 3.14].ISO IEC 29192-4 pdf download.