CAN/CSA-ISO/IEC 18033-4A-06 PDF

CAN/CSA-ISO/IEC 18033-4A-06 PDF

Name:
CAN/CSA-ISO/IEC 18033-4A-06 PDF

Published Date:
12/01/2010

Status:
Active

Description:

Amendment 1:2010 to CAN/CSA-ISO/IEC 18033-4-06 Information technology - Security techniques - Encryption algorithms - Part 4: Stream ciphers - Amendment 1: Rabbit and Decim (Adopted Amendment 1:2010 to ISO/IEC 18033-4:2005)

Publisher:
Canada National Standard/Canadian Standards - ISO/IEC

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
$45.6
Need Help?
1 Scope

This part of ISO/IEC 18033 specifies stream cipher algorithms. A stream cipher is an encryption mechanism that uses a keystream to encrypt a plaintext in bitwise or block-wise manner. There are two types of stream cipher: a synchronous stream cipher, in which the keystream is only generated from the secret key (and an initialization vector) and a self-synchronizing stream cipher, in which the keystream is generated from the secret key and some past ciphertexts (and an initialization vector). Typically the encryption operation is the additive bitwise XOR operation between a keystream and the message. This part of ISO/IEC 18033 describes both pseudorandom number generators for producing keystream, and output functions for stream ciphers.

The algorithms specified in this part of ISO/IEC 18033 have been assigned object identifiers in accordance with ISO/IEC 9834. The list of assigned object identifiers is given in Annex C. Any change to the specification of the algorithms resulting in a change of functional behaviour will result in a change of the object identifier assigned to the algorithm.

NOTE 1 . In applications where a combination of algorithms is being used, or when an algorithm is parameterized by the choice of a combination of other algorithms, the combination may be specified as a sequence of object identifiers.

Alternatively, the object identifiers of lower layer algorithms may be included in the parameter field of the higher layer algorithm#s identifier structure. For example, the object identifier of a block cipher could be included as a parameter in the algorithm identifier structure for a keystream generator. The algorithm identifier structure is defined in ISO/IEC 9594-8.

NOTE 2 . The encoding of object identifiers is application dependent.
File Size : 1 file , 820 KB
Number of Pages : 42
Published : 12/01/2010

History


Related products

CAN/CSA-ISO/IEC 14496-8:05 (R2020)
Published Date: 10/01/2005
Information Technology - Coding of Audio-Visual Objects - Part 8: Carriage of ISO/IEC 14496 Contents Over IP Networks (Adopted ISO/IEC 14496-8:2004, first edition, 2004-05-15)
$20.4
CAN/CSA-ISO/IEC 15054-04 (R2019)
Published Date: 12/01/2004
Information Technology - Telecommunications and Information Exchange Between Systems - Private Integrated Services Network - Inter-Exchange Signalling Protocol - Call Interception Additional Network Feature (Adopted ISO/IEC 15054:2003, second edition, 2003-04-01)
$51.9
CAN/CSA-ISO/IEC 21000-5-07 (R2022)
Published Date: 11/01/2007
Information Technology - Multimedia Framework (MPEG-21) - Part 5: Rights Expression Language (Adopted ISO/IEC 21000-5:2004, first edition, 2004-04-01)
$96

Best-Selling Products