BS ISO/IEC 10116:2017+A1:2021
$198.66
Information technology. Security techniques. Modes of operation for an n-bit block cipher
Published By | Publication Date | Number of Pages |
BSI | 2021 | 58 |
This document establishes the modes of operation for applications of an n-bit block cipher (e.g. protection of data during transmission or in storage). The defined modes only provide protection of data confidentiality. Protection of data integrity is not within the scope of this document. Also, most modes do not protect the confidentiality of message length information.
NOTE 1 Methods for protecting the integrity of data using a block cipher are provided in ISO/IEC 9797‑1 .
NOTE 2 Methods for simultaneously protecting the confidentiality and integrity of data are provided in ISO/IEC 19772 .
This document specifies the modes of operation and gives recommendations for choosing values of parameters (as appropriate).
Text deleted
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | National foreword |
6 | Foreword |
7 | Introduction |
9 | 1 Scope 2 Normative references 3 Terms and definitions |
11 | 4 Symbols, abbreviated terms and notation 4.1 Symbols and abbreviated terms |
13 | 4.2 Notation 5 Requirements |
14 | 6 Electronic Codebook (ECB) mode 6.1 Preliminaries 6.2 Encryption 6.3 Decryption |
15 | 7 Cipher Block Chaining (CBC) mode 7.1 Preliminaries 7.2 Encryption 7.3 Decryption |
16 | 7.4 Avoiding ciphertext expansion 7.4.1 General 7.4.2 Three ciphertext stealing variants of CBC |
17 | 8 Cipher Feedback (CFB) mode 8.1 Preliminaries |
18 | 8.2 Encryption |
19 | 8.3 Decryption 8.4 Avoiding ciphertext expansion |
20 | 9 Output Feedback (OFB) mode 9.1 Preliminaries 9.2 Encryption |
21 | 9.3 Decryption 9.4 Avoiding ciphertext expansion |
22 | 10 Counter (CTR) mode 10.1 Preliminaries 10.2 Encryption |
23 | 10.3 Decryption 10.4 Avoiding ciphertext expansion 11 Counter advanced cryptographic prolongation of key material (CTR-ACPKM) mode 11.1 General |
24 | 11.2 Preliminaries |
25 | 11.3 Encryption |
26 | 11.4 Decryption 11.5 ACPKM transformation |
27 | Annex A (normative) Object identifiers |
29 | Annex B (informative) Properties of the modes of operation and important security guidance |
36 | Annex C (informative) Figures describing the modes of operation |
42 | Annex D (informative) Numerical examples for the modes of operation |
57 | Bibliography |