
ISO 18033:2010
ISO 18033:2010 Information technology – Security techniques – Encryption algorithms – Part 3: Block ciphers
CDN $351.00
Description
ISO/IEC 18033 specifies encryption systems (ciphers) for the purpose of data confidentiality.
ISO/IEC 18033-3:2010 specifies block ciphers. A block cipher is a symmetric encipherment system with the property that the encryption algorithm operates on a block of plaintext, i.e. a string of bits of a defined length, to yield a block of ciphertext.
ISO/IEC 18033-3:2010 specifies following algorithms:
- 64-bit block ciphers: TDEA, MISTY1, CAST-128, HIGHT;
- 128-bit block ciphers: AES, Camellia, SEED.
NOTE The primary purpose of encryption (or encipherment) techniques is to protect the confidentiality of stored or transmitted data. An encryption algorithm is applied to data (often called plaintext or cleartext) to yield encrypted data (or ciphertext); this process is known as encryption. The encryption algorithm needs to be designed so that the ciphertext yields no information about the plaintext except, perhaps, its length. Associated with every encryption algorithm is a corresponding decryption algorithm, which transforms ciphertext back into its original plaintext.
Edition
2
Published Date
2010-12-14
Status
PUBLISHED
Pages
78
Format 
Secure PDF
Secure – PDF details
- Save your file locally or view it via a web viewer
- Viewing permissions are restricted exclusively to the purchaser
- Device limits - 3
- Printing – Enabled only to print (1) copy
See more about our Environmental Commitment
Abstract
ISO/IEC 18033 specifies encryption systems (ciphers) for the purpose of data confidentiality.
ISO/IEC 18033-3:2010 specifies block ciphers. A block cipher is a symmetric encipherment system with the property that the encryption algorithm operates on a block of plaintext, i.e. a string of bits of a defined length, to yield a block of ciphertext.
ISO/IEC 18033-3:2010 specifies following algorithms:
- 64-bit block ciphers: TDEA, MISTY1, CAST-128, HIGHT;
- 128-bit block ciphers: AES, Camellia, SEED.
NOTE The primary purpose of encryption (or encipherment) techniques is to protect the confidentiality of stored or transmitted data. An encryption algorithm is applied to data (often called plaintext or cleartext) to yield encrypted data (or ciphertext); this process is known as encryption. The encryption algorithm needs to be designed so that the ciphertext yields no information about the plaintext except, perhaps, its length. Associated with every encryption algorithm is a corresponding decryption algorithm, which transforms ciphertext back into its original plaintext.
Previous Editions
Can’t find what you are looking for?
Please contact us at:
Related Documents
-

ISO 20648:2024 Information technology – TLS specification for storage systems
CDN $173.00 Add to cart -

ISO 27001:2022 Information security, cybersecurity and privacy protection – Information security management systems – Requirements
CDN $285.00 Add to cart -

ISO 27402:2023 Cybersecurity – IoT security and privacy – Device baseline requirements
CDN $173.00 Add to cart -

ISO 27003:2017 Information technology – Security techniques – Information security management systems – Guidance
CDN $360.00 Add to cart







