ISO IEC 19772 CORR 1-2014 Information technology - Security techniques - Authenticated encryption Technical Corrigendum 1《信息技术 安全技术 验证加密术 技术勘误1》.pdf
《ISO IEC 19772 CORR 1-2014 Information technology - Security techniques - Authenticated encryption Technical Corrigendum 1《信息技术 安全技术 验证加密术 技术勘误1》.pdf》由会员分享,可在线阅读,更多相关《ISO IEC 19772 CORR 1-2014 Information technology - Security techniques - Authenticated encryption Technical Corrigendum 1《信息技术 安全技术 验证加密术 技术勘误1》.pdf(3页珍藏版)》请在麦多课文档分享上搜索。
1、 INTERNATIONAL STANDARD ISO/IEC 19772:2009 TECHNICAL CORRIGENDUM 1 Published 2014-09-01 INTERNATIONAL ORGANIZATION FOR STANDARDIZATION ORGANISATION INTERNATIONALE DE NORMALISATION INTERNATIONAL ELECTROTECHNICAL COMMISSION COMMISSION LECTROTECHNIQUE INTERNATIONALEInformation technology Security techn
2、iques Authenticated encryption TECHNICAL CORRIGENDUM 1 Technologies de linformation Techniques de scurit Chiffrage authentifi RECTIFICATIF TECHNIQUE 1 Technical Corrigendum # to ISO/IEC 19772:2009 was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology. A) Page 15, Clause 10.
3、2 Replace the definition of with the following text: The decryption function, i.e. a function which takes as input a block cipher key K 1 , a Starting Variable S, and an encrypted data string C and, using the selected mode of operation, outputs a decrypted data string: the output is written ) ( , 1
4、C S K . Replace the definition of with the following text: The encryption function, i.e. a function which takes as input a block cipher key K 1 , a Starting Variable S, and a data string D and, using the selected mode of operation, outputs an encrypted data string: the output is written ) ( , 1 D S
5、K . B) Page 16, Clause 10.4 Replace steps a), b) and c) with the following: a) A Starting Variable S appropriate for use with the selected block cipher mode of operation shall be selected. This variable shall be statistically distinct for every message to be protected under a given key, and must be
6、made available to the recipient of the message. Further possible requirements for S are as described in the appropriate clauses of ISO/IEC 10116, and further guidance is provided in A.7. ICS 35.040 Ref. No. ISO/IEC 19772:2009/Cor.1:2014(E) ISO/IEC 2014 All rights reserved Published in Switzerland IS
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ISOIEC19772CORR12014INFORMATIONTECHNOLOGYSECURITYTECHNIQUESAUTHENTICATEDENCRYPTIONTECHNICALCORRIGENDUM1

链接地址:http://www.mydoc123.com/p-1257001.html