Document Details |
|
| Name of Department/Committee : | LITD 17 |
|---|---|
| Document Number : | LITD 17 ( 28867) |
| IS Number (Technical Department) : | IS/ISO/IEC 11770 : Part 3: 2021 |
| Document Title [English] : | Information Security - Key Management Part 3: Mechanisms using Asymmetric Techniques Second Revision Amendment - 1 |
| Document Title [Hindi] : | सूचना सुरक्षा — की प्रबधनं भाग 3 असममीत के प्रयोग से यत्रं प्रणाली (दूसरा पुनरीक्षण ) संसोधन -1 |
| Document Type : | Amendment |
| Amendment No : | 1 |
| Language : | English |
| Priority : | 3 |
| ICS Code : | |
| Date of Project Approval : | 08-08-2025 |
| Standards to be Superseded : | |
| Sl.No. | Synosis Points | |
| 1 | Public key cryptosystems were first proposed in the seminal paper by Diffie and Hellman in 1976. The security of many such cryptosystems is based on the presumed intractability of solving the discrete logarithm problem over certain finite fields. Other public key cryptosystems such as RSA are based on the difficulty of the integer factorization problem. | |
Timeline Details |
|||||||
|
|
|||||||
|
|||||||
|
|||||||