BS ISO/IEC 29192-4:2013+A1:2016 - Information technology. Security techniques. Lightweight cryptography. Mechanisms using asymmetric techniques
Maintenance will be taking place for BSI Shop on Saturday 19th September 2020 between 08:00 AM and 14:00 PM UK time. During this period, BSI Shop will have limited functionality. Please do not make any purchases during these works. Please accept our apologies for any inconvenience caused during this essential maintenance.

BS ISO/IEC 29192-4:2013+A1:2016

Information technology. Security techniques. Lightweight cryptography. Mechanisms using asymmetric techniques

Status : Confirmed, Current   Published : June 2013

Format
PDF

Format
HARDCOPY



This part of ISO/IEC 29192 specifies four lightweight mechanisms using asymmetric techniques:

  • a unilateral authentication mechanism based on discrete logarithms on elliptic curves;

  • an authenticated lightweight key exchange (ALIKE) mechanism for unilateral authentication and establishment of a session key;

  • an identity-based signature mechanism.

  • a unilateral authentication scheme (ELLI) based on discrete logarithms on elliptic curves defined over finite fields of characteristic two.




Standard NumberBS ISO/IEC 29192-4:2013+A1:2016
TitleInformation technology. Security techniques. Lightweight cryptography. Mechanisms using asymmetric techniques
StatusConfirmed, Current
Publication Date30 June 2013
Confirm Date22 October 2018
Normative References(Required to achieve compliance to this standard)ISO/IEC 29192-1, ISO/IEC 15946-1
Informative References(Provided for Information)ISO/IEC 9796-3:2006, ISO/IEC 8825-1:2002, ISO/IEC 9798-5:2009, ISO/IEC 14888-3:2006, ISO/IEC 18031:2011, ISO/IEC 29192-2:2012, ISO/IEC 9798-1:2010, ISO/IEC 18033-3:2010, ISO/IEC 10118-1:2000, ISO/IEC 10118-3:2004
International RelationshipsISO/IEC 29192-4:2013/Amd 1:201,ISO/IEC 29192-4:2013
Amended ByAmendment, February 2016
Draft Superseded By12/30228421 DC14/30287699 DC
DescriptorsCryptography, Data processing, Security, Computer hardware, Energy consumption
ICS35.030
Title in FrenchTéchnologies de l'information. Techniques de sécurité. Cryptographie pour environnements contraints. Mécanismes basés sur les techniques asymétriques
CommitteeIST/33/2
ISBN978 0 580 83853 8
PublisherBSI
FormatA4
DeliveryYes
Pages54
File Size2.085 MB
Price£254.00


 Your basket
Your basket is empty

Multi-user access to over 3,500 medical device standards, regulations, expert commentaries and other documents


Worldwide Standards
We can source any standard from anywhere in the world


Develop a PAS

Develop a fast-track standardization document in 9-12 months


BSOL

The faster, easier way to work with standards