As NZS ISO IEC 18033.1-2006 Information Technology - Security Techniques - Encryption Algorithms General

Embed Size (px)

Citation preview

  • 7/31/2019 As NZS ISO IEC 18033.1-2006 Information Technology - Security Techniques - Encryption Algorithms General

    1/8

  • 7/31/2019 As NZS ISO IEC 18033.1-2006 Information Technology - Security Techniques - Encryption Algorithms General

    2/8

    AS/NZS ISO/IEC 18033.1:2006

    This Joint Australian/New Zealand Standard was prepared by Joint TechnicalCommittee IT-012, Information Systems, Security and Identification. It wasapproved on behalf of the Council of Standards Australia on 31 March 2006 and onbehalf of the Council of Standards New Zealand on 16 June 2006.This Standard was published on 10 July 2006.

    The following are represented on Commit tee IT-012:

    Attorney Generals Department

    Australia Post

    Australian Association of Permanent Building Societies

    Australian Bankers Association

    Australian Chamber of Commerce and Industry

    Australian Electrical and Electronic Manufacturers Association

    Australian Information Industry Association

    Certification Forum of AustraliaConsumers Federation of Australia

    Department of Defence (Australia)

    Department of Social Welfare New Zealand

    Government Communications Security Bureau, New Zealand

    Internet Industry Association

    NSW Police Service

    New Zealand Defence Force

    Reserve Bank of Australia

    Keeping Standards up-to-date

    Standards are living documents which reflect progress in science, technology andsystems. To maintain their currency, all Standards are periodically reviewed, andnew editions are published. Between editions, amendments may be issued.Standards may also be withdrawn. It is important that readers assure themselvesthey are using a current Standard, which should include any amendments whichmay have been published since the Standard was purchased.

    Detailed information about joint Australian/New Zealand Standards can be found byvisiting the Standards Web Shop at www.standards.com.au or Standards NewZealand web site at www.standards.co.nz and looking up the relevant Standard inthe on-line catalogue.

    Alternatively, both organizations publish an annual printed Catalogue with fulldetails of all current Standards. For more frequent listings or notification ofrevisions, amendments and withdrawals, Standards Australia and Standards NewZealand offer a number of update options. For information about these services,users should contact their respective national Standards organization.

    We also welcome suggestions for improvement in our Standards, and especiallyencourage readers to notify us immediately of any apparent inaccuracies orambiguities. Please address your comments to the Chief Executive of eitherStandards Australia or Standards New Zealand at the address shown on the backcover.

    This Standard was issued in draft form for comment as DR 06038.

  • 7/31/2019 As NZS ISO IEC 18033.1-2006 Information Technology - Security Techniques - Encryption Algorithms General

    3/8

    AS/NZS ISO/IEC 18033.1:2006

    Australian/New Zealand StandardInformation technologySecuritytechniquesEncryption algorithms

    Part 1: General

    COPYRIGHT

    Standards Australia/Standards New Zealand

    All rights are reserved. No part of this work may be reproduced or copied in any form or byany means, electronic or mechanical, including photocopying, without the written

    permission of the publisher.

    Jointly published by Standards Australia, GPO Box 476, Sydney, NSW 2001 and Standards

    New Zealand, Private Bag 2439, Wellington 6020

    ISBN 0 7337 7595 0

    First published as AS/NZS ISO/IEC 18033.1:2006.

  • 7/31/2019 As NZS ISO IEC 18033.1-2006 Information Technology - Security Techniques - Encryption Algorithms General

    4/8

    ii

    PREFACE

    This Standard was prepared by the Joint Standards Australia/Standards New Zealand Committee

    IT-012, Information Systems, Security and Identification.

    This Standard is identical with, and has been reproduced from ISO/IEC 18033-1:2005,

    Information technologySecurity techniquesEncryption algorithmsPart 1: General.

    The objective of this Standard is to provide the Information Security programming and

    development community with clear guidance to the selection and implementation of appropriate

    encryption algorithms.

    This Standard is Part 1 of AS/NZS ISO/IEC 18033, Information technologySecurity

    techniquesEncryption algorithms, which, when complete, will consist of the following:

    Part 1: General (this Standard)

    Part 2: Asymmetric ciphers

    Part 3: Block ciphers

    Part 4: Stream ciphers

    The term informative has been used in this Standard to define the application of the annex to

    which it applies. An informative annex is only for information and guidance.

    As this Standard is reproduced from an international standard, the following applies:

    (a) Its number appears on the cover and title page while the international standard number

    appears only on the cover.

    (b) In the source text this part of ISO/IEC 18033 should read this Australian/New

    Zealand Standard.

    (c) A full point substitutes for a comma when referring to a decimal marker.

  • 7/31/2019 As NZS ISO IEC 18033.1-2006 Information Technology - Security Techniques - Encryption Algorithms General

    5/8

    ii i

    CONTENTS

    Page

    1 Scope...................................................................................................................................................... 12 Terms and definitions........................................................................................................................... 13 The nature of encryption ...................................................................................................................... 43.1 The purpose of encryption................................................................................................................... 43.2 Symmetric and asymmetric ciphers ................................................................................................... 43.3 Key management .................................................................................................................................. 54 The use and properties of encryption................................................................................................. 54.1 Asymmetric ciphers.............................................................................................................................. 54.2 Block ciphers......................................................................................................................................... 54.2.1 Modes of operation ............................................................................................................................... 54.2.2 Message Authentication Codes (MACs) ............................................................................................. 64.3 Stream ciphers ...................................................................................................................................... 65 Object identifiers................................................................................................................................... 6Annex A (informative) Criteria for inclusion of ciphers in ISO/IEC 18033 ..................................................... 7Bibliography ....................................................................................................................................................... 8

  • 7/31/2019 As NZS ISO IEC 18033.1-2006 Information Technology - Security Techniques - Encryption Algorithms General

    6/8

    iv

    INTRODUCTION

    ISO/IEC 18033 is a multi-part International Standard that specifies encryption systems (ciphers) for thepurpose of data confidentiality. The inclusion of ciphers in ISO/IEC 18033 is intended to promote their use asreflecting the current state of the art in encryption techniques.

    The primary purpose of encryption (or encipherment) techniques is to protect the confidentiality of stored ortransmitted data. An encryption algorithm is applied to data (often called plaintext or cleartext) to yieldencrypted data (or ciphertext); this process is known as encryption. The encryption algorithm should bedesigned so that the ciphertext yields no information about the plaintext except, perhaps, its length.

    Associated with every encryption algorithm is a corresponding decryption algorithm, which transformsciphertext back into its original plaintext.

    Ciphers work in association with a key. In a symmetriccipher, the same key is used in both the encryption anddecryption algorithms. In an asymmetric cipher, different but related keys are used for encryption anddecryption. ISO/IEC 18033-2 is devoted to asymmetric ciphers. ISO/IEC 18033-3 and ISO/IEC 18033-4 aredevoted to two different classes of symmetric ciphers, known as block ciphers and stream ciphers.

  • 7/31/2019 As NZS ISO IEC 18033.1-2006 Information Technology - Security Techniques - Encryption Algorithms General

    7/8

    1AUSTRALIAN/NEW ZEALAND STANDARD

    Information technology Security techniques Encryptionalgorithms

    Part 1:General

    1 Scope

    This part of ISO/IEC 18033 is general in nature, and provides definitions that apply in subsequent parts ofISO/IEC 18033. The nature of encryption is introduced, and certain general aspects of its use and propertiesare described. The criteria used to select the algorithms specified in subsequent parts of ISO/IEC 18033 aredefined in Annex A.

    2 Terms and definitions

    For the purposes of this document, the following terms and definitions apply.

    2.1asymmetric cipher

    alternative term for asymmetric encryption system.

    2.2asymmetric cryptographic techniquecryptographic technique that uses two related transformations, a public transformation (defined by the publickey) and a private transformation (defined by the private key). The two transformations have the property that,given the public transformation, it is computationally infeasible to derive the private transformation[ISO/IEC 11770-1:1996].

    2.3asymmetric encipherment systemalternative term for asymmetric encryption system.

    2.4asymmetric encryption systemsystem based on asymmetric cryptographic techniques whose public transformation is used for encryptionand whose private transformation is used for decryption [ISO/IEC 9798-1:1997].

    2.5asymmetric key pairpair of related keys where the private key defines the private transformation and the public key defines thepublic transformation [ISO/IEC 9798-1:1997].

    2.6blockstring of bits of a defined length.

    COPYRIGHT

  • 7/31/2019 As NZS ISO IEC 18033.1-2006 Information Technology - Security Techniques - Encryption Algorithms General

    8/8

    This is a free preview. Purchase the entire publication at the link below:

    Looking for additional Standards? Visit SAI Global Infostore

    Subscribe to ourFree Newsletters about Australian Standards in Legislation; ISO, IEC, BSI and more

    Do you need to Manage Standards Collections Online?

    Learn about LexConnect, All Jurisdictions, Standards referenced in Australian legislation

    Do you want to know when a Standard has changed?

    Want to become an SAI Global Standards Sales Affiliate?

    Learn about other SAI Global Services:

    LOGICOM Military Parts and Supplier DatabaseMetals Infobase Database of Metal Grades, Standards and Manufacturers

    Materials Infobase Database of Materials, Standards and Suppliers

    Database of European Law, CELEX and Court Decisions

    Need to speak with a Customer Service Representative - Contact Us

    AS/NZS ISO/IEC 18033.1:2006, Informationtechnology - Security techniques - Encryptionalgorithms General

    http://infostore.saiglobal.com/store?utm_source=PDF&utm_medium=Website_Infostore&utm_campaign=DocSharingSiteshttp://www.saiglobal.com/Information/Standards/Newsletters/?utm_source=PDF&utm_medium=Website_Infostore&utm_campaign=DocSharingSiteshttp://www.saiglobal.com/Information/Standards/Collections/?utm_source=PDF&utm_medium=Website_Infostore&utm_campaign=DocSharingSiteshttp://www.saiglobal.com/Information/Standards/Law/?utm_source=PDF&utm_medium=Website_Infostore&utm_campaign=DocSharingSiteshttp://www.saiglobal.com/Information/Standards/StandardsWatch/?utm_source=PDF&utm_medium=Website_Infostore&utm_campaign=DocSharingSiteshttp://www.saiglobal.com/Information/Standards/Affiliate/?utm_source=PDF&utm_medium=Website_Infostore&utm_campaign=DocSharingSiteshttp://www.saiglobal.com/Information/Standards/Databases/LOGICOM/?utm_source=PDF&utm_medium=Website_Infostore&utm_campaign=DocSharingSiteshttp://www.saiglobal.com/Information/Standards/Databases/LOGICOM/?utm_source=PDF&utm_medium=Website_Infostore&utm_campaign=DocSharingSiteshttp://www.saiglobal.com/Information/Standards/Databases/Metals/?utm_source=PDF&utm_medium=Website_Infostore&utm_campaign=DocSharingSiteshttp://www.saiglobal.com/Information/Standards/Databases/Materials/?utm_source=PDF&utm_medium=Website_Infostore&utm_campaign=DocSharingSiteshttp://www.saiglobal.com/Information/Standards/Databases/European-Law/?utm_source=PDF&utm_medium=Website_Infostore&utm_campaign=DocSharingSiteshttp://infostore.saiglobal.com/store/getpage.aspx?path=/InformationServices/shop/pages/ContactingUs.htm&utm_source=PDF&utm_medium=Website_Infostore&utm_campaign=DocSharingSiteshttp://infostore.saiglobal.com/store/Details.aspx?ProductId=394711&utm_source=PDF&utm_medium=Website_Infostore&utm_campaign=DocSharingSiteshttp://infostore.saiglobal.com/store/getpage.aspx?path=/InformationServices/shop/pages/ContactingUs.htm&utm_source=PDF&utm_medium=Website_Infostore&utm_campaign=DocSharingSiteshttp://www.saiglobal.com/Information/Standards/Databases/European-Law/?utm_source=PDF&utm_medium=Website_Infostore&utm_campaign=DocSharingSiteshttp://www.saiglobal.com/Information/Standards/Databases/Materials/?utm_source=PDF&utm_medium=Website_Infostore&utm_campaign=DocSharingSiteshttp://www.saiglobal.com/Information/Standards/Databases/Metals/?utm_source=PDF&utm_medium=Website_Infostore&utm_campaign=DocSharingSiteshttp://www.saiglobal.com/Information/Standards/Databases/LOGICOM/?utm_source=PDF&utm_medium=Website_Infostore&utm_campaign=DocSharingSiteshttp://www.saiglobal.com/Information/Standards/Affiliate/?utm_source=PDF&utm_medium=Website_Infostore&utm_campaign=DocSharingSiteshttp://www.saiglobal.com/Information/Standards/StandardsWatch/?utm_source=PDF&utm_medium=Website_Infostore&utm_campaign=DocSharingSiteshttp://www.saiglobal.com/Information/Standards/Law/?utm_source=PDF&utm_medium=Website_Infostore&utm_campaign=DocSharingSiteshttp://www.saiglobal.com/Information/Standards/Collections/?utm_source=PDF&utm_medium=Website_Infostore&utm_campaign=DocSharingSiteshttp://www.saiglobal.com/Information/Standards/Newsletters/?utm_source=PDF&utm_medium=Website_Infostore&utm_campaign=DocSharingSiteshttp://infostore.saiglobal.com/store?utm_source=PDF&utm_medium=Website_Infostore&utm_campaign=DocSharingSites