Related Research Articles In cryptography, key size or key length is the number of bits in a key used by a cryptographic algorithm. Elliptic-curve cryptography ECC is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC requires smaller keys compared to non-EC cryptography to provide equivalent security. Public-key cryptography, or asymmetric cryptography, is a cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.
|Genre:||Health and Food|
|Published (Last):||16 November 2012|
|PDF File Size:||20.19 Mb|
|ePub File Size:||15.39 Mb|
|Price:||Free* [*Free Regsitration Required]|
Resources and Help IEEE Standard Specifications for Public-Key Cryptography Abstract: This standard specifies common public-key cryptographic techniques, including mathematical primitives for secret value key derivation, public-key encryption, and digital signatures, and cryptographic schemes based on those primitives.
It also specifies related cryptographic parameters, public keys, and private keys. The purpose of this standard is to provide a reference for specifications on a variety of techniques from which applications may select. Scope: This standard covers specifications for common public-key cryptographic techniques, including mathematical primitives for secret value key derivation, public-key encryption and digital signatures, and cryptographic schemes based on those primitives.
Specifications of related cryptographic parameters, public keys, and private keys are also discussed. Classes of computers and communication systems are not restricted. Purpose: The transition from paper to electronic media brings with it the need for electronic privacy and authenticity. Public-key techniques offer fundamental technology addressing this need. Many alternative public-key techniques have been proposed, each with its own benefits.
However, there has been no single, comprehensive reference defining a full range of common public-key techniques covering key agreement, public-key encryption, digital signatures, and identification from several families, such as discrete logarithms, integer factorization, and elliptic curves. The purpose is to provide a reference for specifications of a variety of techniques from which applications may select.
Article : Date of Publication: 29 Aug.