CSA CAN/CSA-ISO/IEC 10116-07 Information technology - Security techniques - Modes of operation for an n-bit block cipher
Данный раздел/документ содержится в продуктах:
- Техэксперт: Машиностроительный комплекс
- Картотека зарубежных и международных стандартов
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- 35
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- 35.240
- CENELEC CLC/TR 62685 Industrial communication networks - Profiles - Assessment guideline for safety devices using IEC 61784-3 functional safety communication profiles (FSCPs)
- ISO 7498-2 Information Processing Systems - Open Systems Interconnection - Basic Reference Model - Part 2: Security Architecture - First Edition
- BSI BS ISO/IEC 9797-2 Information technology - Security techniques - Message authentication codes (MACs) Part 2: Mechanisms using a dedicated hashfunction
- BSI DD CEN/TS 14821-5 Traffic and Travel Information (TTI) TTI messages via cellular networks Part 5: Internal services
- BSI BS ISO/IEC 9797-2 Information technology - Security techniques - Message authentication codes (MACs) Part 2: Mechanisms using a dedicated hashfunction
- ISO 7498-2 Information Processing Systems - Open Systems Interconnection - Basic Reference Model - Part 2: Security Architecture - First Edition
- BSI BS ISO/IEC 9797-2 Information technology - Security techniques - Message authentication codes (MACs) Part 2: Mechanisms using a dedicated hashfunction
- BSI DD CEN/TS 14821-5 Traffic and Travel Information (TTI) TTI messages via cellular networks Part 5: Internal services
- BSI DD CEN/TS 14821-5 Traffic and Travel Information (TTI) TTI messages via cellular networks Part 5: Internal services
- BSI BS ISO/IEC 10118-1 Information Technology - Security Techniques - Hash-Functions - Part 1: General
- BSI BS ISO/IEC 10118-4 + A1 Information Technology - Security Techniques - Hash-Functions - Part 4: Hash-Functions Using Modular Arithmetic - CORR: August 31, 2014; AMD: December 31, 2014
- ISO ISO/IEC 10118-1 Information Technology - Security Techniques - Hash-Functions - Part 1: General - Second Edition
- Картотека зарубежных и международных стандартов
CSA Standards
Information technology - Security techniques - Modes of operation for an n-bit block cipher
N CAN/CSA-ISO/IEC 10116-07
Annotation
This International Standard establishes five modes of operation for applications of an n-bit block cipher (e.g. protection of data transmission, data storage). The defined modes only provide protection of data confidentiality. Protection of data integrity and requirements for padding the data are not within the scope of this International Standard. Also most modes do not protect the confidentiality of message length information.
This International Standard specifies the modes of operation and gives recommendations for choosing values of parameters (as appropriate).
The modes of operation specified in this International Standard have been assigned object identifiers in accordance with ISO/IEC 9834. The list of assigned object identifiers is given in Annex A. In applications in which object identifiers are used, the object identifiers specified in Annex A are to be used in preference to any other object identifiers that may exist for the mode concerned.
NOTE Annex B (informative) contains comments on the properties of each mode. Block ciphers are specified in ISO/IEC 18033-3.
Автоматический перевод:
Информационные технологии - методы Безопасности - Режимы работы для n-bit блочного шифра
Этот Международный стандарт устанавливает пять режимов работы для приложений n-bit блочного шифра (например, защита передачи данных, хранения данных). Определенные режимы только обеспечивают защиту конфиденциальности данных. Защита целостности данных и требований для дополнения данных не в рамках этого Международного стандарта. Также большинство режимов не защищает конфиденциальность информации о длине сообщения.



