欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > PDF文档下载
    分享到微信 分享到微博 分享到QQ空间

    ISO TR 14742-2010 Financial services - Recommendations on cryptographic algorithms and their use《金融服务 密码算法及其应用的推荐规范》.pdf

    • 资源ID:1257673       资源大小:511KB        全文页数:38页
    • 资源格式: PDF        下载积分:10000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要10000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    ISO TR 14742-2010 Financial services - Recommendations on cryptographic algorithms and their use《金融服务 密码算法及其应用的推荐规范》.pdf

    1、 Reference number ISO/TR 14742:2010(E) ISO 2010TECHNICAL REPORT ISO/TR 14742 First edition 2010-07-01 Financial services Recommendations on cryptographic algorithms and their use Services financiers Recommandations sur les algorithmes cryptographiques et leur utilisation ISO/TR 14742:2010(E) PDF dis

    2、claimer This PDF file may contain embedded typefaces. In accordance with Adobes licensing policy, this file may be printed or viewed but shall not be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In downloading this file, parties

    3、 accept therein the responsibility of not infringing Adobes licensing policy. The ISO Central Secretariat accepts no liability in this area. Adobe is a trademark of Adobe Systems Incorporated. Details of the software products used to create this PDF file can be found in the General Info relative to

    4、the file; the PDF-creation parameters were optimized for printing. Every care has been taken to ensure that the file is suitable for use by ISO member bodies. In the unlikely event that a problem relating to it is found, please inform the Central Secretariat at the address given below. COPYRIGHT PRO

    5、TECTED DOCUMENT ISO 2010 All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or ISOs

    6、member body in the country of the requester. ISO copyright office Case postale 56 CH-1211 Geneva 20 Tel. + 41 22 749 01 11 Fax + 41 22 749 09 47 E-mail copyrightiso.org Web www.iso.org Published in Switzerland ii ISO 2010 All rights reservedISO/TR 14742:2010(E) ISO 2010 All rights reserved iiiConten

    7、ts Page Foreword iv Introduction.v 1 Scope1 2 Measuring bits of security2 3 Algorithm migration 3 4 Block ciphers .4 4.1 General .4 4.2 Keying options.4 4.3 Recommended block ciphers 5 4.4 Block size and key use .6 4.5 Modes of operation .6 4.6 Enciphering small plaintexts7 4.7 Migrating from TDEA t

    8、o AES7 5 Stream ciphers.7 6 Hash functions.7 6.1 Hash functions and their properties7 6.2 Hash functions based on block ciphers .8 6.3 Dedicated hash functions.8 6.4 Hash functions using modular arithmetic 10 6.5 Migrating from one hash function to another.10 7 Message authentication codes 11 7.1 Re

    9、commended MAC algorithms 11 7.2 MAC algorithms based on block ciphers11 7.3 MAC algorithms based on hash functions .11 7.4 Length of the MAC.12 7.5 Message span of the key 12 8 Asymmetric algorithms.12 8.1 General .12 8.2 Factorization-based security mechanisms.14 8.3 Integer discrete logarithm-base

    10、d security mechanisms.14 8.4 Elliptic curve discrete logarithm-based security mechanisms 15 8.5 Algorithm or key expiry 15 8.6 Digital signature schemes giving message recovery15 8.7 Digital signatures with appendix .16 8.8 Asymmetric ciphers 16 9 Random number generation.18 Annex A (informative) En

    11、tity authentication and key management mechanisms .19 Bibliography28 ISO/TR 14742:2010(E) iv ISO 2010 All rights reservedForeword ISO (the International Organization for Standardization) is a worldwide federation of national standards bodies (ISO member bodies). The work of preparing International S

    12、tandards is normally carried out through ISO technical committees. Each member body interested in a subject for which a technical committee has been established has the right to be represented on that committee. International organizations, governmental and non-governmental, in liaison with ISO, als

    13、o take part in the work. ISO collaborates closely with the International Electrotechnical Commission (IEC) on all matters of electrotechnical standardization. International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2. The main task of technical committe

    14、es is to prepare International Standards. Draft International Standards adopted by the technical committees are circulated to the member bodies for voting. Publication as an International Standard requires approval by at least 75 % of the member bodies casting a vote. In exceptional circumstances, w

    15、hen a technical committee has collected data of a different kind from that which is normally published as an International Standard (“state of the art”, for example), it may decide by a simple majority vote of its participating members to publish a Technical Report. A Technical Report is entirely in

    16、formative in nature and does not have to be reviewed until the data it provides are considered to be no longer valid or useful. Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. ISO shall not be held responsible for identifying any

    17、or all such patent rights. ISO/TR 14742 was prepared by Technical Committee ISO/TC 68, Financial services, Subcommittee SC 2, Security management and general banking operations. ISO/TR 14742:2010(E) ISO 2010 All rights reserved vIntroduction The financial services industry has a clear need for crypt

    18、ographic algorithms for a number of different applications. ISO standards provide definitions for an extensive and comprehensive set of such algorithms. However, as the state of the art of cryptology progresses and the power of computers increases, cryptographic algorithms as well as cryptographic k

    19、eys of a particular length all have a limited window of time in which they can be considered secure. Furthermore, as neither the development of cryptology nor the increase in computing power are entirely predictable, the collective wisdom of the cryptographic community as to which algorithms and key

    20、 lengths are secure is constantly evolving. For this reason it was felt that there was an equally clear need in the financial services industry for guidance regarding the current and up-to-date view in the cryptographic community about the security of cryptographic algorithms and their keys. It was

    21、also felt that there was a need for appropriate guidance on migration from one algorithm or key length to another. The ISO standards that define cryptographic algorithms for the financial services industry do not contain such guidance, and by the evolving nature of the field, it would be difficult f

    22、or them to do so. Hence, the need was recognized for a document that could contain such guidance, and be updated more frequently than the five year review cycle for ISO standards. This Technical Report is intended to be that document. The intention is to update this Technical Report when the need ar

    23、ises, or at least every other year. The strength requirements of a security mechanism can vary depending on the application(s) in which the mechanism is being used and the way it is being used. The recommendations given in this Technical Report are considered to be general purpose recommendations. A

    24、lthough it is accepted that there may exist low-risk applications that do not warrant the level of cryptographic strength recommended in this Technical Report, it is advisable that deviation from the recommendations only be made after appropriate analysis of the risks and in the context of any rules

    25、 and policies that might apply. A special case of the above relates to the lifetime of protection required by the application and its data. For example, if protection requirements are ephemeral (e.g. confidentiality is required only for one day, or authentication is one-time) then this may be cause

    26、for allowing a deviation from the recommendations. Conversely, if the data must remain protected for a very long period of time, then the keys and algorithms used to provide the protection must be good for that duration, even if the keys are no longer in active use. TECHNICAL REPORT ISO/TR 14742:201

    27、0(E) ISO 2010 All rights reserved 1Financial services Recommendations on cryptographic algorithms and their use 1 Scope This Technical Report provides a list of recommended cryptographic algorithms for use within applicable financial services standards prepared by ISO/TC 68. It also provides strateg

    28、ic guidance on key lengths and associated parameters and usage dates. The focus is on algorithms rather than protocols, and protocols are in general not included in this Technical Report. However, in some cases, for example for some key agreement and some authentication protocols, there is no “under

    29、lying” algorithm, and in a sense it is the protocol that constitutes the algorithm. In this case, the mechanisms are included, in particular where they have security parameters that can be adjusted for higher or lower security. Algorithmic vulnerabilities or cryptographic keys of inadequate lengths

    30、are less often the cause of security compromises in the financial industry than are inadequate key management or other procedural flaws, or mistakes in the implementation of cryptographic algorithms or the protocols that use them. However, compromises caused by algorithmic vulnerabilities are more s

    31、ystemic and harder to recover from than other kinds of compromises. This Technical Report deals primarily with recommendations regarding algorithms and key lengths. NOTE Key management is covered in ISO 11568-1, ISO 11568-2 and ISO 11568-4. The categories of algorithms covered in this Technical Repo

    32、rt are: block ciphers; stream ciphers; hash functions; message authentication codes (MACs); asymmetric algorithms: digital signature schemes giving message recovery, digital signatures with appendix, asymmetric ciphers; authentication mechanisms; key establishment and agreement mechanisms; key trans

    33、port mechanisms. ISO/TR 14742:2010(E) 2 ISO 2010 All rights reservedThis Technical Report does not define any cryptographic algorithms; however, the standards to which this Technical Report refers may contain necessary implementation information as well as more detailed guidance regarding choice of

    34、security parameters, security analysis, and other implementation considerations. 2 Measuring bits of security For both block ciphers (Clause 4) and hash algorithms (Clause 6) the notion of “n bits of security” is introduced (e.g. see NIST SP 800-57, 2007, 5.6.1). For a block cipher to have n bits of

    35、 security means that an estimated 2 noperations are needed to break the block cipher. Given a few plaintext blocks and corresponding ciphertext, a block cipher with n bits of security would then require an average of 2 n1 T of time to recover the encryption key, where T is the amount of time needed

    36、to perform one encryption of a plaintext value and a comparison of the result against the corresponding ciphertext value. For a hash algorithm to have n bits of security with respect to collision resistance means that an estimated 2 n calls to the hash function are necessary to find a hash collision

    37、, that is, two messages that when hashed yield the same hash result. Table 1 below reflects recommendations for when an algorithm with n bits of security can be used. The dates coincide, where applicable, with the recommendations in NIST SP 800-57. Table 1 Recommended usage periods for algorithms of

    38、 varying bit-strength Bits of security Recommended usage period 80 until end 2010 96 until end 2020 112 until end 2030 W 128 as from 2030 The recommendations from Table 1 reflect that it is estimated that there is an overwhelming likelihood that an algorithm of the indicated bit strength will remain

    39、 secure (that is, unbroken) until at least the year indicated. For other categories of algorithms, such as message authentication codes and asymmetric algorithms, the concept of n bits of security is more difficult to define because of the nature of compromises and the measurement of the work or cos

    40、t required to accomplish a compromise. However, for each category of algorithm, their security is still expressed in terms of bits of security. The intended interpretation is that if an algorithm is listed as having n bits of security, then it is estimated that it will remain secure until the same y

    41、ear as a symmetric cipher with n bits of security. The efforts of breaking ciphers of different categories may have very different “profiles”. One algorithm may require a large amount of computing power and little storage, while another may use a large amount of storage and less computing power. One

    42、 effort may be parallelizable, so that the main limitation is the number of computers that can be recruited to participate, whereas another may require a single computer with a very large amount of RAM. Lenstra and Verheul in Reference 52 estimate that the financial costs associated with breaking an

    43、 asymmetric cipher are 2 500 times larger than those associated with breaking a symmetric cipher, if the computational efforts measured in MIPS years are the same. See also Reference 19 for comparisons of cryptographic strengths of symmetric and asymmetric algorithms. For algorithms with an estimate

    44、d security of 128 bits or more, a recommendation of “past 2030” is given, reflecting the view that any estimate beyond 2030 is so far into the future that it seems unwise to make the estimate any more precise at this time. For symmetric algorithms, Grovers algorithm (see Reference 17) means that if

    45、a quantum computer were to be implemented, key sizes should be roughly doubled to maintain the same level of security. All the asymmetric algorithms mentioned in this Technical Report are vulnerable to quantum computing algorithms (see Reference 69), and hence any leaps in progress in the area of im

    46、plementing quantum computers could render the recommendations in Table 1 void. However, the commonly established wisdom is currently that ISO/TR 14742:2010(E) ISO 2010 All rights reserved 3quantum computing on the scale necessary, say to factor a 1 024-bit RSA modulus, is at least 20 to 25 years awa

    47、y. On the other hand, if and when quantum computers are realized, it would be expected that increases in key lengths would be much less a barrier to compromise than now, so that the mentioned asymmetric algorithms would quickly become obsolete. 3 Algorithm migration As the state of the art of crypto

    48、logy progresses and the power of computers increases, cryptographic algorithms and key lengths that once were secure may no longer be so. For algorithms that have security parameters, security can be improved by adjusting the security parameters rather than migrating to a new algorithm. Examples inc

    49、lude RSA-based crypto systems where the RSA key length can be increased and AES where the choice is between key lengths of 128, 192 and 256 bits. Migration where only the security parameters are changed is mostly less onerous than migration where the cryptographic algorithm itself changes, and although performance in general would be expected to deteriorate with a more secure choice of security parameters, improvements in computer performance may make up for such a deterioration. However, specific applications, implem


    注意事项

    本文(ISO TR 14742-2010 Financial services - Recommendations on cryptographic algorithms and their use《金融服务 密码算法及其应用的推荐规范》.pdf)为本站会员(周芸)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开