• BS ISO/IEC 18031 : 2011

    Current The latest, up-to-date edition.

    INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION

    Available format(s):  Hardcopy, PDF

    Language(s):  English

    Published date:  01-01-2011

    Publisher:  British Standards Institution

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Introduction
    1 Scope
    2 Normative references
    3 Terms and definitions
    4 Symbols
    5 Properties and requirements of an RBG
    6 RBG model
    7 Types of RBGs
    8 Overview and requirements for an NRBG
    9 Overview and requirements for a DRBG
    Annex A (normative) - Combining RBGs
    Annex B (normative) - Conversion methods
    Annex C (normative) - DRBGs
    Annex D (normative) - Application specific constants
    Annex E (informative) - NRBG examples
    Annex F (informative) - Security considerations
    Annex G (informative) - Discussion on the estimation of
            entropy
    Annex H (informative) - RBG assurance
    Annex I (informative) - RBG boundaries
    Annex J (informative) - Rationale for the design of
            statistical tests
    Annex K (informative) - Example cases for MQ_DRBG
    Bibliography

    Abstract - (Show below) - (Hide below)

    Provides a conceptual model for a random bit generator for cryptographic purposes, together with the elements of this model.

    General Product Information - (Show below) - (Hide below)

    Committee IST/33/2
    Development Note Supersedes 04/30040736 DC (06/2006) Supersedes 10/30228327 DC. (01/2012) 2011 Edition Re-issued in April 2017 & incorporates AMD 1 2017. Supersedes 15/30281551 DC. (04/2017)
    Document Type Standard
    Publisher British Standards Institution
    Status Current
    Supersedes

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 18033-1:2015 Information technology Security techniques Encryption algorithms Part 1: General
    ISO/IEC 18032:2005 Information technology Security techniques Prime number generation
    FIPS PUB 140 : 0001 SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES
    ANSI X9.82-2 : 2015 RANDOM NUMBER GENERATION - PART 2: ENTROPY SOURCES
    ISO/IEC 18033-3:2010 Information technology Security techniques Encryption algorithms Part 3: Block ciphers
    ISO/IEC 19790:2012 Information technology — Security techniques — Security requirements for cryptographic modules
    ISO/IEC 10118-1:2016 Information technology Security techniques Hash-functions Part 1: General
    FIPS PUB 186 : 0 DIGITAL SIGNATURE STANDARD (DSS)
    ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
    ANSI X9.82-3 : 2007(R2017) RANDOM NUMBER GENERATION - PART 3: DETERMINISTIC RANDOM BIT GENERATORS
    ISO/IEC 9797-2:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function
    ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
    ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
    ANSI X9.82-1 : 2006(R2013) RANDOM NUMBER GENERATION - PART 1: OVERVIEW AND BASIC PRINCIPLES
    ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective