ETR 235 : 20001
Current
The latest, up-to-date edition.
SECURITY TECHNIQUES ADVISORY GROUP (STAG); REQUIREMENTS SPECIFICATION FOR AN ENCRYPTION ALGORITHM FOR OPERATORS OF EUROPEAN PUBLIC TELECOMMUNICATIONS NETWORKS
Hardcopy , PDF
English
Foreword
1 Scope
2 Reference
3 Abbreviations
4 Introduction
5 Background to the report
6 Use of the algorithm
6.1 Users of the algorithm
6.2 Use of the algorithm
6.3 Places of use
6.4 Types of implementation
7 Use of the algorithm specification
7.1 Ownership
7.2 Users of the specification
7.3 Licensing
7.4 Management of the specification
8 Functional
8.1 Type and parameters of algorithm
8.2 Interfaces to the algorithm
8.3 Modes of operation
8.4 Implementation and operational considerations
8.5 Resilience of algorithm
9 Algorithm specification and test data requirements
9.1 Specification of the algorithm
9.2 Design conformance test data
9.3 Algorithm input/output test data
9.4 Format and handling of deliverables
10 Quality assurance requirements
10.1 Quality assurance for the algorithm
10.2 Quality assurance for the specification and test data
10.3 Design and evaluation report
11 Summary of ETSI SAGE deliverables
Annex A (informative): Comment form
Annex B (informative): Cryptographic mechanisms
Annex C (informative): Bibliography
History
Provides ETSI Security Algorithms Group of Experts (SAGE) with the information it requires in order to design and deliver a technical specification for such an algorithm.
Committee |
NA
|
DocumentType |
Standard
|
Pages |
18
|
PublisherName |
European Telecommunications Standards Institute
|
Status |
Current
|
ISO/IEC 10116:2017 | Information technology — Security techniques — Modes of operation for an n-bit block cipher |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.