INCITS/ISO/IEC 18033-2 : 2008
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS
Hardcopy , PDF
02-04-2024
English
01-01-2008
1 Scope
2 Normative references
3 Definitions
4 Symbols and notation
5 Mathematical conventions
6 Cryptographic transformations
7 Asymmetric ciphers
8 Generic hybrid ciphers
9 Constructions of data encapsulation mechanisms
10 ElGamal-based key encapsulation mechanisms
11 RSA-based asymmetric ciphers and key encapsulation
mechanisms
12 Ciphers based on modular squaring
Annex A (normative) ASN.1 syntax for object identifiers
Annex B (informative) Security considerations
Annex C (informative) Test vectors
Bibliography
Describes several asymmetric ciphers. Also describes the functional interfaces and correct methods of use of such ciphers in general, as well as the precise functionality and cipher text format for several specific asymmetric ciphers (although conforming systems may choose to use alternative formats for storing and transmitting cipher-texts).
Committee |
CS1
|
DocumentType |
Standard
|
Pages |
132
|
PublisherName |
Information Technology Industry Council
|
Status |
Superseded
|
SupersededBy | |
Supersedes |
Standards | Relationship |
ISO/IEC 18033-2:2006 | Identical |
ISO/IEC 18031:2011 | Information technology Security techniques Random bit generation |
ISO/IEC 18033-1:2015 | Information technology Security techniques Encryption algorithms Part 1: General |
ISO/IEC 18032:2005 | Information technology Security techniques Prime number generation |
ISO/IEC 15946-1:2016 | Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General |
ISO/IEC 18033-3:2010 | Information technology Security techniques Encryption algorithms Part 3: Block ciphers |
ISO/IEC 9797-1:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher |
ISO/IEC 10118-3:2004 | Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions |
ISO/IEC 10118-2:2010 | Information technology Security techniques Hash-functions Part 2: Hash-functions using an n-bit block cipher |
ISO/IEC 9797-2:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function |
ISO/IEC 10116:2017 | Information technology — Security techniques — Modes of operation for an n-bit block cipher |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.