BS ISO/IEC 29192-1:2012
Current
The latest, up-to-date edition.
Information technology. Security techniques. Lightweight cryptography General
Hardcopy , PDF
English
31-07-2012
Foreword
Introduction
1 Scope
2 Terms and definitions
3 Categories of constraints for lightweight cryptography
4 Requirements
5 Lightweight cryptographic mechanisms
Annex A (informative) - Selection criteria for inclusion of
mechanisms in ISO/IEC 29192
Annex B (informative) - Obtaining metrics for hardware
implementation comparison
Annex C (normative) - Metrics for hardware targeted block
and stream ciphers
Annex D (informative) - Gate equivalents
Bibliography
Gives terms and definitions that apply in subsequent parts of ISO/IEC 29192. Also gives security requirements, classification requirements and implementation requirements for mechanisms that are proposed for inclusion in subsequent parts of ISO/IEC 29192.
Committee |
IST/33/2
|
DevelopmentNote |
Supersedes 11/30204850 DC. (07/2012)
|
DocumentType |
Standard
|
Pages |
22
|
PublisherName |
British Standards Institution
|
Status |
Current
|
Supersedes |
This part of ISO/IEC29192 provides terms and definitions that apply in subsequent parts of ISO/IEC29192. This part of ISO/IEC29192 sets the security requirements, classification requirements and implementation requirements for mechanisms that are proposed for inclusion in subsequent parts of ISO/IEC29192.
Standards | Relationship |
ISO/IEC 29192-1:2012 | Identical |
ISO/IEC 9797-1:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher |
ISO/IEC 10118-2:2010 | Information technology Security techniques Hash-functions Part 2: Hash-functions using an n-bit block cipher |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.