Standard ISO/IEC 18033-2-ed.1.0 8.5.2006 preview

ISO/IEC 18033-2-ed.1.0

Information technology - Security techniques - Encryption algorithms - Part 2: Asymmetric ciphers

Translate name

STANDARD published on 8.5.2006


Language
Format
AvailabilityIN STOCK
Price333.30 USD excl. VAT
333.30 USD

The information about the standard:

Designation standards: ISO/IEC 18033-2-ed.1.0
Publication date standards: 8.5.2006
SKU: NS-941708
The number of pages: 125
Approximate weight : 406 g (0.90 lbs)
Country: International technical standard
Category: Technical standards ISO

The category - similar standards:

IT Security

Annotation of standard text ISO/IEC 18033-2-ed.1.0 :

ISO/IEC 18033-2:2006 specifies encryption systems (ciphers) for the purpose of data confidentiality. The primary purpose of encryption (or encipherment) techniques is to protect the confidentiality of stored or transmitted data. An encryption algorithm is applied to data (often called plaintext or cleartext) to yield encrypted data (or ciphertext); this process is known as encryption. The encryption algorithm should be designed so that the ciphertext yields no information about the plaintext except, perhaps, its length. Associated with every encryption algorithm is a corresponding decryption algorithm, which transforms ciphertext back into its original plaintext. An asymmetric, i.e. public-key, encryption scheme allows a sender to use a recipients public key to transmit an encryption of a message to the receiver, who can use his secret key to decrypt the given ciphertext, thereby obtaining the original message. Such a scheme should be secure in the sense that no information about the message should be leaked to a (resource-bounded) attacker, even if that attacker mounts a so-called chosen ciphertext attack, in which he may obtain decryptions of other ciphertexts. This is the strongest type of attack that has been proposed for a public-key encryption scheme. ISO/IEC 18033-2:2006 specifies the functional interface of such a scheme, and in addition specifies a number of particular schemes that appear to be secure against chosen ciphertext attack. The different schemes offer different trade-offs between security properties and efficiency.

These changes apply to this standard:

ISO/IEC 18033-2-ed.1.0/Amd.1 Change

Information technology - Security techniques - Encryption algorithms - Part 2: Asymmetric ciphers - Amendment 1: FACE

Change published on 10.11.2017

Selected format:

Show all technical information.
27.10 USD


IN STOCK

We recommend:

Technical standards updating

Do you want to make sure you use only the valid technical standards?
We can offer you a solution which will provide you a monthly overview concerning the updating of standards which you use.

Would you like to know more? Look at this page.




Cookies Cookies

We need your consent to use the individual data so that you can see information about your interests, among other things. Click "OK" to give your consent.

You can refuse consent here.

Here you can customize your cookie settings according to your preferences.

We need your consent to use the individual data so that you can see information about your interests, among other things.