ISO IEC 29192-4:2013 pdf download.Information technology一Security techniques一Lightweight cryptography Part 4:Mechanisms using asymmetric techniques.
This part of ISO/lEG 29192 specifies three lightweight mechanisms using asymmetric techniques:
a unilateral authentication mechanism based on discrete logarithms on elliptic curves;
an authenticated lightweight key exchange (ALIKE) mechanism for unilateral authentication and establishment of a session key;
an identity-based signature mechanism.
2 Normative references
The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies.
ISOIIEC 15946-1, Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General
ISO/IEC 29192-1, Information technology — Security techniques — Lightweight cryptography — Part 1:
General
3 Terms and definitions
For the purposes of this document, the terms and definitions given in ISO/IEC 29192-1 and the following apply.
3.1
asymmetric cryptographic technique
cryptographic technique that uses two related operations: a public operation defined by a public data item, and
a private operation defined by a private data item
Note 1 to entry: The two operations have the property that, given the public operation, it is computationally infeasible to derive the private operation.
[SOURCE: ISO/lEG 9798-5:2009, definition 2.3]
3.2
asymmetric pair
two related data items where the private data item defines a private operation and the public data item defines a public operation
3.3
challenge
procedure parameter used in conjunction with secret parameters to produce a response
[SOURCE: ISO/IEC 9798-5:2009, definition 2.6]
3.4
claimant
entity whose identity can be authenticated, including the functions and the private data necessary to engage in authentication exchanges on behalf of a principal
[SOURCE: ISO/lEG 9798-5:2009, definition 2.7]
3.5
claimant parameter
public data item, number or bit string, specific to a given claimant within the domain
[SOURCE: ISO/lEG 9798-5:2009, definition 2.9]
3.6
collision-resistant hash-function
hash-function satisfying the following property: it is computationally infeasible to find any two distinct inputs which map to the same output
Note 1 to entry: computational feasibility depends on the specific security requirements and environment. [SOURCE: ISO/lEG 10118-1:2000, definition 3.2]
3.7
coupon
pair of pre-computed numbers to be used only once
Note 1 to entry: One of the numbers shall be kept secret, and the other shall remain secret until the time of use. [SOURCE: ISO/lEG 9798-5:2009, definition 2.8, modified]
3.8
domain
collection of entities operating under a single security policy
Note 1 to entry: For instance, public key certificates created either by a single certification authority, or by a collection of certification authorities using the same security policy.
[SOURCE: ISO/IEC 9798-5:2009, definition 2.11]
3.9
domain parameter
public key, or function, agreed and used by all entities within the domain
[SOURCE: ISO/lEG 9798-5:2009, definition 2.12]
3.10
entity authentication
corroboration that an entity is the one claimed
[SOURCE: ISO/IEC 9798-1:2010, definition 3.14].ISO IEC 29192-4 pdf download.