CAN/CSA-ISO/IEC 18031:13 (R2017)
Current
The latest, up-to-date edition.
Information technology - Security techniques - Random bit generation (Adopted ISO/IEC 18031:2011, second edition, 2011-11-15)
Hardcopy , PDF
English
01-01-2013
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols
5 Properties and requirements of an RBG
6 RBG model
7 Types of RBGs
8 Overview and requirements for an NRBG
9 Overview and requirements for a DRBG
Annex A (normative) - Combining RBGs
Annex B (normative) - Conversion methods
Annex C (normative) - DRBGs
Annex D (normative) - Application specific constants
Annex E (informative) - NRBG examples
Annex F (informative) - Security considerations
Annex G (informative) - Discussion on the estimation
of entropy
Annex H (informative) - RBG assurance
Annex I (informative) - RBG boundaries
Annex J (informative) - Rationale for the design of
statistical tests
Bibliography
Defines a conceptual model for a random bit generator for cryptographic purposes, together with the elements of this model.
DocumentType |
Standard
|
ISBN |
978-1-77139-111-5
|
Pages |
162
|
ProductNote |
Reconfirmed EN
|
PublisherName |
Canadian Standards Association
|
Status |
Current
|
Supersedes |
CSA Preface Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the Canadian Advisory Committee (CAC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T). This Standard supersedes CAN/CSA-ISO/IEC 18031-06 (adoption of ISO/IEC 18031:2005). At the time of publication, ISO/IEC 18031:2011 is available from ISO and IEC in English only. CSA Group will publish the French version when it becomes available from ISO and IEC. Scope This International Standard specifies a conceptual model for a random bit generator for cryptographic purposes, together with the elements of this model. This International Standard - specifies the characteristics of the main elements required for a non-deterministic random bit generator - specifies the characteristics of the main elements required for a deterministic random bit generator - establishes the security requirements for both the non-deterministic and the deterministic random bit generator. Where there is a requirement to produce sequences of random numbers from random bit strings, Annex B gives guidelines on how this can be performed. Techniques for statistical testing of random bit generators for the purposes of independent verification or validation, and detailed designs for such generators, are outside the scope of this International Standard.
Standards | Relationship |
ISO/IEC 18031:2011 | Identical |
ISO/IEC 18033-1:2015 | Information technology Security techniques Encryption algorithms Part 1: General |
ISO/IEC 18032:2005 | Information technology Security techniques Prime number generation |
ANSI X9.82-2 : 2015 | RANDOM NUMBER GENERATION - PART 2: ENTROPY SOURCES |
ISO/IEC 18033-3:2010 | Information technology Security techniques Encryption algorithms Part 3: Block ciphers |
ISO/IEC 19790:2012 | Information technology — Security techniques — Security requirements for cryptographic modules |
ISO/IEC 10118-1:2016 | Information technology Security techniques Hash-functions Part 1: General |
ISO/IEC 10118-3:2004 | Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions |
ANSI X9.82-3 : 2007(R2017) | RANDOM NUMBER GENERATION - PART 3: DETERMINISTIC RANDOM BIT GENERATORS |
ISO/IEC 9797-2:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function |
ISO/IEC 10116:2017 | Information technology — Security techniques — Modes of operation for an n-bit block cipher |
ISO/IEC 11770-1:2010 | Information technology Security techniques Key management Part 1: Framework |
ANSI X9.82-1 : 2006(R2013) | RANDOM NUMBER GENERATION - PART 1: OVERVIEW AND BASIC PRINCIPLES |
ISO/IEC 11770-3:2015 | Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.