A Proposal for an ISO Standard for Public Key Encryption (version 2.1)
نویسنده
چکیده
This document is an initial proposal for a draft for a forthcoming ISO standard on publickey encryption. It is hoped that this proposal will serve as a basis for discussion, from which a consensus for a standard may be formed. Summary of Changes from version 2.0 (September 17, 2001) to version 2.1 (December 20, 2001) • Fixed a few minor typos, and added some references to supporting documents. • Otherwise, there are no substantive changes, and the section numbering is identical to that of version 2.0.
منابع مشابه
A Proposal for an ISO Standard for Public Key Encryption
This document should be viewed less as a first draft of a standard for public-key encryption, and more as a proposal for what such a draft standard should contain. It is hoped that this proposal will serve as a basis for discussion, from which a consensus for a standard may be formed.
متن کاملQTRU: quaternionic version of the NTRU public-key cryptosystems
In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...
متن کاملA Proposal for an ISO Standard for Public Key Encryption (version 2.0)
This document should be viewed less as a first draft of a standard for public-key encryption, and more as a proposal for what such a draft standard should contain. It is hoped that this proposal will serve as a basis for discussion, from which a consensus for a standard may be formed. Summary of Changes from version 1.1 (February 13, 2001) to version 2.0 (September 17, 2001) • Some new and quit...
متن کاملSecure UHF Tags with Strong Cryptography - Development of ISO/IEC 18000-63 Compatible Secure RFID Tags and Presentation of First Results
This paper presents a concept for an UHF tag supporting cryptographically strong authentication which is based on the Rabin-Montgomery public key cryptosystem in accordance with the framework of ISO/IEC 29167-1. It uses an easily computable long integer square operation for the public key encryption of a tag ID record. Only a legitimate interrogator who is in possession of the private key can d...
متن کاملA Performance Survey of Meta-Heuristic And Brute-Force Search Algorithms to Cryptanalysis The SDES Encryption Algorithm
For many years, cryptanalysis has been considered as an attractive topic in jeopardizing the security and resistance of an encryption algorithm. The SDES encryption algorithm is a symmetric cryptography algorithm that performs a cryptographic operation using a crypt key. In the world of encryption, there are many search algorithms to cryptanalysis. In these researches, brute force attack algori...
متن کامل