• There are no items in your cart

CAN/CSA-ISO/IEC 18033-4:13 (R2017)

Current

Current

The latest, up-to-date edition.

Information technology - Security techniques - Encryption algorithms - Part 4: Stream ciphers (Adopted ISO/IEC 18033-4:2011, second edition, 2011-12-15)

Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

01-01-2013

€181.26
Excluding VAT

Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 Framework for stream ciphers
6 General models for stream ciphers
7 Constructing keystream generators from block ciphers
8 Dedicated keystream generators
Annex A (normative) - Object Identifiers
Annex B (informative) - Operations over the finite field
        GF(2[n])
Annex C (informative) - Examples
Annex D (informative) - Security information
Bibliography

Defines: a) output functions to combine a keystream with plaintext; b) keystream generators for producing keystream; and c) object identifiers assigned to dedicated keystream generators in accordance with ISO/IEC 9834.

DevelopmentNote
2006 Edition along with their amendment is still active. (04/2014)
DocumentType
Standard
ISBN
978-1-77139-112-2
Pages
110
ProductNote
Reconfirmed EN
PublisherName
Canadian Standards Association
Status
Current
Supersedes

CSA Preface Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the Canadian Advisory Committee (CAC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T). This Standard supersedes CAN/CSA-ISO/IEC 18033-4-06 (adoption of ISO/IEC 18033-4:2005). At the time of publication, ISO/IEC 18033-4:2011 is available from ISO and IEC in English only. CSA Group will publish the French version when it becomes available from ISO and IEC. Scope This part of ISO/IEC 18033 specifies a) output functions to combine a keystream with plaintext, b) keystream generators for producing keystream, and c) object identifiers assigned to dedicated keystream generators in accordance with ISO/IEC 9834. NOTE 1 The list of assigned object identifiers is given in Annex A. NOTE 2 Any change to the specification of these algorithms resulting in a change of functional behaviour will result in a change of the object identifier assigned to the algorithms concerned.

Standards Relationship
ISO/IEC 18033-4:2011 Identical

ISO/IEC 18033-1:2015 Information technology Security techniques Encryption algorithms Part 1: General
ISO/IEC 10118-1:2016 Information technology Security techniques Hash-functions Part 1: General
ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.