BS ISO/IEC 10116:2017
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
Information technology. Security techniques. Modes of operation for an n-bit block cipher
Hardcopy , PDF
04-06-2021
English
28-07-2017
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols, abbreviated terms and notation
5 Requirements
6 Electronic Codebook (ECB) mode
7 Cipher Block Chaining (CBC) mode
8 Cipher Feedback (CFB) mode
9 Output Feedback (OFB) mode
10 Counter (CTR) mode
Annex A (normative) - Object identifiers
Annex B (informative) - Properties of the modes of
operation and important security guidance
Annex C (informative) - Figures describing the modes
of operation
Annex D (informative) - Numerical examples for the
modes of operation
Bibliography
Describes five modes of operation for applications of an n-bit block cipher (e.g. protection of data during transmission or in storage).
Committee |
IST/33/2
|
DevelopmentNote |
Supersedes 96/644476 DC. (07/2005) Supersedes 04/30062952 DC (03/2006) Supersedes 15/30288056 DC. (08/2017)
|
DocumentType |
Standard
|
Pages |
50
|
PublisherName |
British Standards Institution
|
Status |
Withdrawn
|
Supersedes |
Standards | Relationship |
ISO/IEC 10116:2017 | Identical |
ISO/IEC 18031:2011 | Information technology Security techniques Random bit generation |
ISO/IEC 19772:2009 | Information technology Security techniques Authenticated encryption |
ISO/IEC 18033-1:2015 | Information technology Security techniques Encryption algorithms Part 1: General |
ISO/IEC 29192-2:2012 | Information technology Security techniques Lightweight cryptography Part 2: Block ciphers |
ISO/IEC 18033-3:2010 | Information technology Security techniques Encryption algorithms Part 3: Block ciphers |
ISO/IEC 10118-1:2016 | Information technology Security techniques Hash-functions Part 1: General |
ISO/IEC 9797-1:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.