CAN/CSA-ISO/IEC 18033-4:13 (R2017)
Current
The latest, up-to-date edition.
Information technology - Security techniques - Encryption algorithms - Part 4: Stream ciphers (Adopted ISO/IEC 18033-4:2011, second edition, 2011-12-15)
Hardcopy , PDF
English
01-01-2013
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 Framework for stream ciphers
6 General models for stream ciphers
7 Constructing keystream generators from block ciphers
8 Dedicated keystream generators
Annex A (normative) - Object Identifiers
Annex B (informative) - Operations over the finite field
GF(2[n])
Annex C (informative) - Examples
Annex D (informative) - Security information
Bibliography
Defines: a) output functions to combine a keystream with plaintext; b) keystream generators for producing keystream; and c) object identifiers assigned to dedicated keystream generators in accordance with ISO/IEC 9834.
DevelopmentNote |
2006 Edition along with their amendment is still active. (04/2014)
|
DocumentType |
Standard
|
ISBN |
978-1-77139-112-2
|
Pages |
110
|
ProductNote |
Reconfirmed EN
|
PublisherName |
Canadian Standards Association
|
Status |
Current
|
Supersedes |
CSA Preface Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the Canadian Advisory Committee (CAC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T). This Standard supersedes CAN/CSA-ISO/IEC 18033-4-06 (adoption of ISO/IEC 18033-4:2005). At the time of publication, ISO/IEC 18033-4:2011 is available from ISO and IEC in English only. CSA Group will publish the French version when it becomes available from ISO and IEC. Scope This part of ISO/IEC 18033 specifies a) output functions to combine a keystream with plaintext, b) keystream generators for producing keystream, and c) object identifiers assigned to dedicated keystream generators in accordance with ISO/IEC 9834. NOTE 1 The list of assigned object identifiers is given in Annex A. NOTE 2 Any change to the specification of these algorithms resulting in a change of functional behaviour will result in a change of the object identifier assigned to the algorithms concerned.
Standards | Relationship |
ISO/IEC 18033-4:2011 | Identical |
ISO/IEC 18033-1:2015 | Information technology Security techniques Encryption algorithms Part 1: General |
ISO/IEC 10118-1:2016 | Information technology Security techniques Hash-functions Part 1: General |
ISO/IEC 9797-1:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher |
ISO/IEC 10116:2017 | Information technology — Security techniques — Modes of operation for an n-bit block cipher |
ISO/IEC 11770-1:2010 | Information technology Security techniques Key management Part 1: Framework |
ISO/IEC 11770-3:2015 | Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.