IEEE 1363.1-2008 pdf free.IEEE Standard Specification for Public Key Cryptographic Techniques Based on Hard Problems over Lattices.
IEEE 1363.1 provides specifications of common public key cryptographic techniques based on hard problems over lattices supplemental to those considered in IEEE Std 1363TM2OOO (1347]’ and IEEE Std l363aTl2OO4 [B48], including mathematical primitives for secret value (key) derivation, public key encryption, identification and digital signatures, and cryptographic schemes based on those primitives. Specifications of related cryptographic parameters, public keys, and private keys are also presented. Class of computer and communications systems is not restricted.
1.2 Purpose
The transition from paper to electronic media brings with it the need for electronic privacy and authenticity.Public key cryptography offers fundamental technology addressing this need. Many alternative public key techniques have been proposed, each with its own benefits. IEEE Std 1363-2000 [847] and IEEE Std 1363a-2004 [B48] have produced a comprehensive reference defining a range of common public key techniques covering key agreement, public key encryption, and digital signatures from several families, namely the discrete logarithm. integer factorization. and elliptic curve families.
This standard specifics cryptographic techniques based on hard problems over lattices. Thcsc techniques may offer tradeoffs in operating characteristics when compared with the methods already specified in IEEE l363-200() and IEEE Std 1363a-2(X)4. This standard also provides a second-generation framework for the description of cryptographic techniques. as compared to thc initial framework provided in IEEE Std 1363- 2000 and IEEE Std 1363a-2004.
II is not the purpose of this project to mandate any particular set of public key techniques or security requirements (including key sizes) for this or any family. Rather, the purpose of this standard is to provide the following:
a) A reference for specification of a variety of techniques from which applications may select
b) The relevant number-theoretic background
c) Extensive discussion of security and implementation considerations so that a solution provider can choose appropriate security requirements tbr itself
2. Normative references
The following referenced documents arc indispensable for the application of this document (i.e.. they must be understood and used, so each referenced document is cited in text and its relationship to this document is explained). For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments or corrigenda) applies.
FIPS lO. Secure Hash Standard. Federal Information Processing Standards Publication ltO, U.S.
Department of Commerce/National Institute of Standards and Technology. National Technical Information
Service, Springfield. Virginia.2
3. Definitions, acronyms, and abbreviations
3.1 Definitions
For the purposes of this standard, the following terms and definitions apply. The Authoritative Dictionary of IEEE Standards [B461 should be referenced for terms not defined in this clause.
3.1.1 algorithm: A clearly specified mathematical process for computation; a set of rules that, if followed, give a prescribed result.IEEE 1363.1 pdf free download.