ISO/IEC 29192-2:2012
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
View Superseded by
Information technology Security techniques Lightweight cryptography Part 2: Block ciphers
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
18-11-2019
English
10-01-2012
ISO/IEC 29192-2:2012 specifies two block ciphers suitable for lightweight cryptography:
a) PRESENT: a lightweight block cipher with a block size of 64 bits and a key size of 80 or 128 bits;
b) CLEFIA: a lightweight block cipher with a block size of 128 bits and a key size of 128, 192 or 256 bits.
DocumentType |
Standard
|
Pages |
41
|
PublisherName |
International Organization for Standardization
|
Status |
Withdrawn
|
SupersededBy |
Standards | Relationship |
BS ISO/IEC 29192-2:2012 | Identical |
INCITS/ISO/IEC 29192-2 : 2012 | Identical |
NEN ISO/IEC 29192-2 : 2012 | Identical |
15/30288056 DC : 0 | BS ISO/IEC 10116 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER |
ISO/IEC 15149-4:2016 | Information technology Telecommunications and information exchange between systems Magnetic field area network (MFAN) Part 4: Security Protocol for Authentication |
BS ISO/IEC 29192-5:2016 | Information technology. Security techniques. Lightweight cryptography Hash-functions |
BS ISO/IEC 15149-4:2016 | Information technology. Telecommunications and information exchange between systems. Magnetic field area network (MFAN) Security Protocol for Authentication |
15/30311322 DC : 0 | BS ISO/IEC 29192-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 5: HASH-FUNCTIONS |
ISO/IEC 29167-17:2015 | Information technology Automatic identification and data capture techniques Part 17: Crypto suite cryptoGPS security services for air interface communications |
12/30228421 DC : 0 | BS ISO/IEC 29192-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES |
BS ISO/IEC 29192-4 : 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES |
BS ISO/IEC 10116:2017 | Information technology. Security techniques. Modes of operation for an <i>n</i>-bit block cipher |
ISO/IEC 29167-11:2014 | Information technology — Automatic identification and data capture techniques — Part 11: Crypto suite PRESENT-80 security services for air interface communications |
15/30302611 DC : 0 | BS ISO/IEC 15149-4 - INFORMATION TECHNOLOGY - TELECOMMUNICATIONS AND INFORMATION EXCHANGE BETWEEN SYSTEMS - MAGNETIC FIELD AREA NETWORK (MFAN) - PART 4: SECURITY PROTOCOL FOR AUTHORIZATION |
ISO/IEC 29192-5:2016 | Information technology Security techniques Lightweight cryptography Part 5: Hash-functions |
ISO/IEC 10116:2017 | Information technology — Security techniques — Modes of operation for an n-bit block cipher |
CAN/CSA-ISO/IEC 29167-17:16 | Information technology Automatic identification and data capture techniques Part 17: Crypto suite cryptoGPS security services for air interface communications (Adopted ISO/IEC 29167-17:2015, first edition, 2015-06-01) |
INCITS/ISO/IEC 29192-4 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES |
ISO/IEC 29192-4:2013 | Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques |
INCITS/ISO/IEC 29192-4:2013(R2019) | Information technology - Security techniques - Lightweight cryptography - Part 4: Mechanisms using asymmetric techniques |
INCITS/ISO/IEC 29192-5:2016(R2019) | Information technology -- Security techniques - Lightweight cryptography -- Part 5: Hashfunctions |
CAN/CSA-ISO/IEC 15149-4:18 | Information technology — Telecommunications and information exchange between systems — Magnetic field area network (MFAN) — Part 4: Security Protocol for Authentication (Adopted ISO/IEC 15149-4:2016, first edition, 2016-01-15) |
ISO/IEC 18033-1:2015 | Information technology Security techniques Encryption algorithms Part 1: General |
ISO/IEC 9797-1:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher |
ISO/IEC 29192-1:2012 | Information technology — Security techniques — Lightweight cryptography — Part 1: General |
ISO/IEC 10116:2017 | Information technology — Security techniques — Modes of operation for an n-bit block cipher |
ISO/IEC 11770-1:2010 | Information technology Security techniques Key management Part 1: Framework |
ISO/IEC 9798-1:2010 | Information technology Security techniques Entity authentication Part 1: General |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.