• Shopping Cart
    There are no items in your cart

BS ISO/IEC 18033-2 : 2006

Current

Current

The latest, up-to-date edition.

INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS

Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

01-01-2006

€392.65
Excluding VAT

1 Scope
2 Normative references
3 Definitions
4 Symbols and notation
5 Mathematical conventions
   5.1 Functions and algorithms
   5.2 Bit strings and octet strings
   5.3 Finite Fields
   5.4 Elliptic curves
6 Cryptographic transformations
   6.1 Cryptographic hash functions
   6.2 Key derivation functions
   6.3 MAC algorithms
   6.4 Block ciphers
   6.5 Symmetric ciphers
7 Asymmetric ciphers
   7.1 Plaintext length
   7.2 The use of labels
   7.3 Ciphertext format
   7.4 Encryption options
   7.5 Method of operation of an asymmetric cipher
   7.6 Allowable asymmetric ciphers
8 Generic hybrid ciphers
   8.1 Key encapsulation mechanisms
   8.2 Data encapsulation mechanisms
   8.3 HC
9 Constructions of data encapsulation mechanisms
   9.1 DEM1
   9.2 DEM2
   9.3 DEM3
10 ElGamal-based key encapsulation mechanisms
   10.1 Concrete groups
   10.2 ECIES-KEM
   10.3 PSEC-KEM
   10.4 ACE-KEM
11 RSA-based asymmetric ciphers and key encapsulation
   mechanisms
   11.1 RSA key generation algorithms
   11.2 RSA Transform
   11.3 RSA encoding mechanisms
   11.4 RSAES
   11.5 RSA-KEM
12 Ciphers based on modular squaring
   12.1 HIME key generation algorithms
   12.2 HIME encoding mechanisms
   12.3 HIME(R)
Annex A (normative) ASN.1 syntax for object identifiers
Annex B (informative) Security considerations
      B.1 MAC algorithms
      B.2 Block ciphers
      B.3 Symmetric ciphers
      B.4 Asymmetric ciphers
      B.5 Key encapsulation mechanisms
      B.6 Data encapsulation mechanisms
      B.7 Security of HC
      B.8 Intractability assumptions related to concrete
           groups
      B.9 Security of ECIES-KEM
      B.10 Security of PSEC-KEM
      B.11 Security of ACE-KEM
      B.12 The RSA inversion problem
      B.13 Security of RSAES
      B.14 Security of RSA-KEM
      B.15 Security of HIME(R)
Annex C (informative) Test vectors
      C.1 Test vectors for DEM1
      C.2 Test vectors for ECIES-KEM
      C.3 Test vectors for PSEC-KEM
      C.4 Test vectors for ACE-KEM
      C.5 Test vectors for RSAES
      C.6 Test vectors for RSA-KEM
      C.7 Test vectors for HC
      C.8 Test vectors for HIME(R)
Bibliography

Specifies encryption systems (ciphers) for the purpose of data confidentiality. It specifies the functional interface of such a scheme, and in addition specifies a number of particular schemes that appear to be secure against chosen cipher text attack.

Committee
IST/33
DevelopmentNote
Supersedes 04/30040717 DC (06/2006)
DocumentType
Standard
Pages
274
PublisherName
British Standards Institution
Status
Current
Supersedes

Standards Relationship
ISO/IEC 18033-2:2006 Identical

ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
ISO/IEC 18033-1:2015 Information technology Security techniques Encryption algorithms Part 1: General
ISO/IEC 18032:2005 Information technology Security techniques Prime number generation
ISO/IEC 15946-1:2016 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General
ISO/IEC 18033-3:2010 Information technology Security techniques Encryption algorithms Part 3: Block ciphers
ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
ISO/IEC 10118-2:2010 Information technology Security techniques Hash-functions Part 2: Hash-functions using an n-bit block cipher
ISO/IEC 9797-2:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function
ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.