CSA CAN/CSA-ISO/IEC 18033-4:13 Information technology - Security techniques - Encryption algorithms - Part 4: Stream ciphers
Данный раздел/документ содержится в продуктах:
- Техэксперт: Машиностроительный комплекс
- Картотека зарубежных и международных стандартов
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- 35
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- 35.240
- CENELEC CLC/TR 62685 Industrial communication networks - Profiles - Assessment guideline for safety devices using IEC 61784-3 functional safety communication profiles (FSCPs)
- ISO 7498-2 Information Processing Systems - Open Systems Interconnection - Basic Reference Model - Part 2: Security Architecture - First Edition
- BSI BS ISO/IEC 9797-2 Information technology - Security techniques - Message authentication codes (MACs) Part 2: Mechanisms using a dedicated hashfunction
- BSI DD CEN/TS 14821-5 Traffic and Travel Information (TTI) TTI messages via cellular networks Part 5: Internal services
- BSI BS ISO/IEC 9797-2 Information technology - Security techniques - Message authentication codes (MACs) Part 2: Mechanisms using a dedicated hashfunction
- ISO 7498-2 Information Processing Systems - Open Systems Interconnection - Basic Reference Model - Part 2: Security Architecture - First Edition
- BSI BS ISO/IEC 9797-2 Information technology - Security techniques - Message authentication codes (MACs) Part 2: Mechanisms using a dedicated hashfunction
- BSI DD CEN/TS 14821-5 Traffic and Travel Information (TTI) TTI messages via cellular networks Part 5: Internal services
- BSI DD CEN/TS 14821-5 Traffic and Travel Information (TTI) TTI messages via cellular networks Part 5: Internal services
- BSI BS ISO/IEC 10118-1 Information Technology - Security Techniques - Hash-Functions - Part 1: General
- BSI BS ISO/IEC 10118-4 + A1 Information Technology - Security Techniques - Hash-Functions - Part 4: Hash-Functions Using Modular Arithmetic - CORR: August 31, 2014; AMD: December 31, 2014
- ISO ISO/IEC 10118-1 Information Technology - Security Techniques - Hash-Functions - Part 1: General - Second Edition
- Картотека зарубежных и международных стандартов
CSA Standards
Information technology - Security techniques - Encryption algorithms - Part 4: Stream ciphers
N CAN/CSA-ISO/IEC 18033-4:13
Annotation
This part of ISO/IEC 18033 specifies
a) output functions to combine a keystream with plaintext,
b) keystream generators for producing keystream, and
c) object identifiers assigned to dedicated keystream generators in accordance with ISO/IEC 9834.
NOTE 1 The list of assigned object identifiers is given in Annex A.
NOTE 2 Any change to the specification of these algorithms resulting in a change of functional behaviour will result in a change of the object identifier assigned to the algorithms concerned.
Автоматический перевод:
Информационные технологии - методы Безопасности - Алгоритмы шифрования - Часть 4: Поточные шифры
Эта часть ISO/IEC 18033 указывает
a) функции вывода для объединения keystream с простым текстом,
b) генераторы keystream для создания keystream, и
c) идентификаторы объектов присвоились к специализированным keystream генераторам в соответствии с ISO/IEC 9834.



