ISO/IEC 18033-4:2011
Current
Current
The latest, up-to-date edition.
Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers
Amended by
Available format(s)
Hardcopy , PDF
Language(s)
English
Published date
16-12-2011
€213.00
Excluding VAT
ISO/IEC 18033-4:2011 specifies output functions to combine a keystream with plaintext, keystream generators for producing keystream, and object identifiers assigned to dedicated keystream generators in accordance with ISO/IEC 9834.
| Committee |
ISO/IEC JTC 1/SC 27
|
| DevelopmentNote |
NEW CHILD AMD 1 2020 IS ADDED
|
| DocumentType |
Standard
|
| Pages |
92
|
| ProductNote |
NEW CHILD AMD 1 2020 IS ADDED
|
| PublisherName |
International Organization for Standardization
|
| Status |
Current
|
| Supersedes |
| Standards | Relationship |
| INCITS/ISO/IEC 18033-4 : 2012 | Identical |
| NEN ISO/IEC 18033-4 : 2012 | Identical |
| BS ISO/IEC 18033-4 : 2005 | Identical |
| CSA ISO/IEC 18033-4A : 2010 | Identical |
| BS ISO/IEC 18033-4:2011 | Identical |
| 15/30324800 DC : 0 | BS ISO/IEC 16512-2 - INFORMATION TECHNOLOGY - RELAYED MULTICAST PROTOCOL: SPECIFICATION FOR SIMPLEX GROUP APPLICATIONS |
| 10/30135070 DC : DRAFT NOV 2010 | BS ISO/IEC 9797-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 3: MECHANISMS USING A UNIVERSAL HASH FUNCTION |
| 07/30154069 DC : 0 | BS ISO/IEC 24727-3 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 3: APPLICATION INTERFACE |
| BS ISO 21188:2006 | Public key infrastructure for financial services. Practices and policy framework |
| INCITS/ISO/IEC 24745 : 2012(R2017) | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BIOMETRIC INFORMATION PROTECTION |
| ISO/IEC 9797-3:2011 | Information technology — Security techniques — Message Authentication Codes (MACs) — Part 3: Mechanisms using a universal hash-function |
| INCITS/ISO/IEC 29192-3 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 3: STREAM CIPHERS |
| INCITS/ISO/IEC 11770-5 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 5: GROUP KEY MANAGEMENT |
| ISO/IEC 11770-5:2011 | Information technology — Security techniques — Key management — Part 5: Group key management |
| ISO/IEC 16512-2:2016 | Information technology — Relayed multicast protocol: Specification for simplex group applications — Part 2: |
| BS ISO/IEC 19790:2012 | Information technology. Security techniques. Security requirements for cryptographic modules |
| PD ISO/TR 14742:2010 | Financial services. Recommendations on cryptographic algorithms and their use |
| ISO 21188:2018 | Public key infrastructure for financial services — Practices and policy framework |
| BS ISO/IEC 16512-2:2016 | Information technology. Relayed multicast protocol: Specification for simplex group applications |
| 17/30281253 DC : 0 | BS ISO 21188 - PUBLIC KEY INFRASTRUCTURE FOR FINANCIAL SERVICES - PRACTICES AND POLICY FRAMEWORK |
| BS ISO/IEC 24745:2011 | Information technology. Security techniques. Biometric information protection |
| 07/30163724 DC : 0 | BS ISO/IEC 24727-4 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS PROGRAMMING INTERFACE - PART 4: API ADMINISTRATION |
| 08/30180103 DC : DRAFT MAR 2008 | BS EN 50136-1 - ALARM SYSTEMS - ALARM TRANSMISSION SYSTEMS - PART 1: GENERAL REQUIREMENTS FOR ALARM TRANSMISSION SYSTEMS |
| BS ISO/IEC 20009-4:2017 | Information technology. Security techniques. Anonymous entity authentication Mechanisms based on weak secrets |
| 18/30354751 DC : DRAFT FEB 2018 | BS ISO/IEC 18033-6 - INFORMATION TECHNOLOGY SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 6: HOMOMORPHIC ENCRYPTION |
| INCITS/ISO/IEC 9798-6 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 6: MECHANISMS USING MANUAL DATA TRANSFER |
| ISO/IEC 29192-3:2012 | Information technology — Security techniques — Lightweight cryptography — Part 3: Stream ciphers |
| ISO/TR 14742:2010 | Financial services — Recommendations on cryptographic algorithms and their use |
| BS ISO/IEC 11770-5:2011 | Information technology Security techniques. Key management Group key management |
| BIS IS/ISO 21188 : 2006 | PUBLIC KEY INFRASTRUCTURE FOR FINANCIAL SERVICES - PRACTICES AND POLICY FRAMEWORK |
| 10/30136309 DC : 0 | BS ISO/IEC 24745 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BIOMETRIC INFORMATION PROTECTION |
| BS ISO/IEC 29192-3:2012 | Information technology. Security techniques. Lightweight cryptography Stream ciphers |
| 07/30173155 DC : 0 | BS ISO/IEC 9798-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
| BS ISO/IEC 9797-3:2011 | Information technology. Security techniques. Message Authentication Codes (MACs) Mechanisms using a universal hash-function |
| 04/30093313 DC : DRAFT JUN 2004 | ISO/IEC 9798-6 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 6: MECHANISMS USING MANUAL DATA TRANSFER |
| ISO/IEC 19790:2012 | Information technology — Security techniques — Security requirements for cryptographic modules |
| ISO/IEC 9798-6:2010 | Information technology — Security techniques — Entity authentication — Part 6: Mechanisms using manual data transfer |
| ISO/IEC 15444-8:2007 | Information technology — JPEG 2000 image coding system: Secure JPEG 2000 — Part 8: |
| 05/30144066 DC : DRAFT DEC 2005 | ISO 13492 - FINANCIAL SERVICES - KEY MANAGEMENT RELATED DATA ELEMENT - APPLICATION AND USAGE OF ISO 8353 DATA ELEMENTS 53 AND 96 |
| BS ISO/IEC 9798-6:2010 | Information technology. Security techniques. Entity authentication Mechanisms using manual data transfer |
| ISO/IEC 20009-4:2017 | Information technology — Security techniques — Anonymous entity authentication — Part 4: Mechanisms based on weak secrets |
| ISO/IEC 24745:2011 | Information technology — Security techniques — Biometric information protection |
| INCITS/ISO/IEC 29192-3 : 2012(R2019) | Information technology - Security techniques - Lightweight cryptography - Part 3: Stream ciphers |
| INCITS/ISO/IEC 24727-4:2008(R2019) | Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration |
| ISO/IEC 18033-1:2015 | Information technology — Security techniques — Encryption algorithms — Part 1: General |
| ISO/IEC 10118-1:2016 | Information technology — Security techniques — Hash-functions — Part 1: General |
| ISO/IEC 9797-1:2011 | Information technology — Security techniques — Message Authentication Codes (MACs) — Part 1: Mechanisms using a block cipher |
| ISO/IEC 10116:2017 | Information technology — Security techniques — Modes of operation for an n-bit block cipher |
| ISO/IEC 11770-1:2010 | Information technology — Security techniques — Key management — Part 1: Framework |
| ISO/IEC 11770-3:2015 | Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques |
Summarise
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.