• INCITS/ISO/IEC 18033-2 : 2008

    Superseded A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

    INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS

    Available format(s):  Hardcopy, PDF

    Superseded date:  02-04-2024

    Language(s):  English

    Published date:  01-01-2008

    Publisher:  Information Technology Industry Council

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    1 Scope
    2 Normative references
    3 Definitions
    4 Symbols and notation
    5 Mathematical conventions
    6 Cryptographic transformations
    7 Asymmetric ciphers
    8 Generic hybrid ciphers
    9 Constructions of data encapsulation mechanisms
    10 ElGamal-based key encapsulation mechanisms
    11 RSA-based asymmetric ciphers and key encapsulation
       mechanisms
    12 Ciphers based on modular squaring
    Annex A (normative) ASN.1 syntax for object identifiers
    Annex B (informative) Security considerations
    Annex C (informative) Test vectors
    Bibliography

    Abstract - (Show below) - (Hide below)

    Describes several asymmetric ciphers. Also describes the functional interfaces and correct methods of use of such ciphers in general, as well as the precise functionality and cipher text format for several specific asymmetric ciphers (although conforming systems may choose to use alternative formats for storing and transmitting cipher-texts).

    General Product Information - (Show below) - (Hide below)

    Committee CS1
    Document Type Standard
    Publisher Information Technology Industry Council
    Status Superseded
    Superseded By
    Supersedes

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
    ISO/IEC 18033-1:2015 Information technology Security techniques Encryption algorithms Part 1: General
    ISO/IEC 18032:2005 Information technology Security techniques Prime number generation
    ISO/IEC 15946-1:2016 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General
    ISO/IEC 18033-3:2010 Information technology Security techniques Encryption algorithms Part 3: Block ciphers
    ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
    ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
    ISO/IEC 10118-2:2010 Information technology Security techniques Hash-functions Part 2: Hash-functions using an n-bit block cipher
    ISO/IEC 9797-2:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function
    ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective