• CAN/CSA-ISO/IEC 18031:13 (R2017)

    Current The latest, up-to-date edition.

    Information technology - Security techniques - Random bit generation (Adopted ISO/IEC 18031:2011, second edition, 2011-11-15)

    Available format(s):  Hardcopy, PDF

    Language(s):  English

    Published date:  01-01-2013

    Publisher:  Canadian Standards Association

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Introduction
    1 Scope
    2 Normative references
    3 Terms and definitions
    4 Symbols
    5 Properties and requirements of an RBG
    6 RBG model
    7 Types of RBGs
    8 Overview and requirements for an NRBG
    9 Overview and requirements for a DRBG
    Annex A (normative) - Combining RBGs
    Annex B (normative) - Conversion methods
    Annex C (normative) - DRBGs
    Annex D (normative) - Application specific constants
    Annex E (informative) - NRBG examples
    Annex F (informative) - Security considerations
    Annex G (informative) - Discussion on the estimation
            of entropy
    Annex H (informative) - RBG assurance
    Annex I (informative) - RBG boundaries
    Annex J (informative) - Rationale for the design of
            statistical tests
    Bibliography

    Abstract - (Show below) - (Hide below)

    Defines a conceptual model for a random bit generator for cryptographic purposes, together with the elements of this model.

    Scope - (Show below) - (Hide below)

    CSA Preface Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the Canadian Advisory Committee (CAC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T). This Standard supersedes CAN/CSA-ISO/IEC 18031-06 (adoption of ISO/IEC 18031:2005). At the time of publication, ISO/IEC 18031:2011 is available from ISO and IEC in English only. CSA Group will publish the French version when it becomes available from ISO and IEC. Scope This International Standard specifies a conceptual model for a random bit generator for cryptographic purposes, together with the elements of this model. This International Standard - specifies the characteristics of the main elements required for a non-deterministic random bit generator - specifies the characteristics of the main elements required for a deterministic random bit generator - establishes the security requirements for both the non-deterministic and the deterministic random bit generator. Where there is a requirement to produce sequences of random numbers from random bit strings, Annex B gives guidelines on how this can be performed. Techniques for statistical testing of random bit generators for the purposes of independent verification or validation, and detailed designs for such generators, are outside the scope of this International Standard.

    General Product Information - (Show below) - (Hide below)

    Document Type Standard
    Product Note Reconfirmed EN
    Publisher Canadian Standards Association
    Status Current
    Supersedes

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 18033-1:2015 Information technology Security techniques Encryption algorithms Part 1: General
    ISO/IEC 18032:2005 Information technology Security techniques Prime number generation
    ANSI X9.82-2 : 2015 RANDOM NUMBER GENERATION - PART 2: ENTROPY SOURCES
    ISO/IEC 18033-3:2010 Information technology Security techniques Encryption algorithms Part 3: Block ciphers
    ISO/IEC 19790:2012 Information technology — Security techniques — Security requirements for cryptographic modules
    ISO/IEC 10118-1:2016 Information technology Security techniques Hash-functions Part 1: General
    ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
    ANSI X9.82-3 : 2007(R2017) RANDOM NUMBER GENERATION - PART 3: DETERMINISTIC RANDOM BIT GENERATORS
    ISO/IEC 9797-2:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function
    ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
    ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
    ANSI X9.82-1 : 2006(R2013) RANDOM NUMBER GENERATION - PART 1: OVERVIEW AND BASIC PRINCIPLES
    ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective