BS ISO IEC 18033-2-2006 Information technology - Security techniques - Encryption algorithms - Asymmetric ciphers《信息技术 安全技术 加密算法 不对称密码》.pdf
《BS ISO IEC 18033-2-2006 Information technology - Security techniques - Encryption algorithms - Asymmetric ciphers《信息技术 安全技术 加密算法 不对称密码》.pdf》由会员分享,可在线阅读,更多相关《BS ISO IEC 18033-2-2006 Information technology - Security techniques - Encryption algorithms - Asymmetric ciphers《信息技术 安全技术 加密算法 不对称密码》.pdf(134页珍藏版)》请在麦多课文档分享上搜索。
1、BRITISH STANDARD BS ISO/IEC 18033-2:2006 Information technology Security techniques Encryption algorithms Part 2: Asymmetric ciphers ICS 35.040 BS ISO/IEC 18033-2:2006 This British Standard was published under the authority of the Standards Policy and Strategy Committee on 30 June 2006 BSI 2006 ISBN
2、 0 580 48484 X National foreword This British Standard reproduces verbatim ISO/IEC 18033-2:2006 and implements it as the UK national standard. The UK participation in its preparation was entrusted to Technical Committee IST/33, Information technology Security techniques, which has the responsibility
3、 to: A list of organizations represented on this committee can be obtained on request to its secretary. Cross-references The British Standards which implement international publications referred to in this document may be found in the BSI Catalogue under the section entitled “International Standards
4、 Correspondence Index”, or by using the “Search” facility of the BSI Electronic Catalogue or of British Standards Online. This publication does not purport to include all the necessary provisions of a contract. Users are responsible for its correct application. Compliance with a British Standard doe
5、s not of itself confer immunity from legal obligations. aid enquirers to understand the text; present to the responsible international/European committee any enquiries on the interpretation, or proposals for change, and keep UK interests informed; monitor related international and European developme
6、nts and promulgate them in the UK. Summary of pages This document comprises a front cover, an inside front cover, the ISO/IEC title page, pages ii to vi, pages 1 to 126, an inside back cover and a back cover. The BSI copyright notice displayed in this document indicates when the document was last is
7、sued. Amendments issued since publication Amd. No. Date Comments Reference number ISO/IEC 18033-2:2006(E)INTERNATIONAL STANDARD ISO/IEC 18033-2 First edition 2006-05-01 Information technology Security techniques Encryption algorithms Part 2: Asymmetric ciphers Technologies de linformation Techniques
8、 de scurit Algorithmes de chiffrement Partie 2: Chiffres asymtriques BS ISO/IEC 18033-2:2006ii iiiContentsPage 1 Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 2 Normative references . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
9、. . 1 3 Denitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 4 Symbols and notation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 5 Mathematical conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 5.1 Func
10、tions and algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 5.2 Bit strings and octet strings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 5.3 Finite Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 5.4 Elliptic curves . . . .
11、. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 6.1 Cryptographic hash functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 6.2 Key derivation functions . . . . . . . . . . . . . . . . . . . . . . . .
12、 . . . . . . . 15 6.3 MAC algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 6.4 Block ciphers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 6.5 Symmetric ciphers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 7
13、Asymmetric ciphers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 7.1 Plaintext length . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 7.2 The use of labels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 7.3 Ciphertext fo
14、rmat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 7.4 Encryption options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 7.5 Method of operation of an asymmetric cipher . . . . . . . . . . . . . . . . . . . 22 7.6 Allowable asymmetric ciphers . . . .
15、. . . . . . . . . . . . . . . . . . . . . . . . 22 8 Generic hybrid ciphers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 8.1 Key encapsulation mechanisms . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 8.2 Data encapsulation mechanisms . . . . . . . . . . . . . .
16、 . . . . . . . . . . . . 24 8.3 HC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 9 Constructions of data encapsulation mechanisms . . . . . . . . . . . . . . . . . . . . 26 9.1 DEM1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
17、 . . 26 9.2 DEM2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 9.3 DEM3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 10 ElGamal-based key encapsulation mechanisms . . . . . . . . . . . . . . . . . . . . . 30 10.1 Concrete
18、 groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 10.2 ECIES-KEM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 10.3 PSEC-KEM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 10.4 ACE-KEM . . . . . . . . . . . .
19、 . . . . . . . . . . . . . . . . . . . . . . . . . . 36 11 RSA-based asymmetric ciphers and key encapsulation mechanisms . . . . . . . . . . 39 11.1 RSA key generation algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 11.2 RSA Transform . . . . . . . . . . . . . . . . . . . . . . .
20、 . . . . . . . . . . . . . 40 11.3 RSA encoding mechanisms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 11.4 RSAES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 11.5 RSA-KEM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
21、 . 44 12 Ciphers based on modular squaring . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 Cryptographic transformations BS ISO/IEC 18033-2:2006iv 12.1HIMEkeygenerationalgorithms45 12.2 HIME encoding mechanisms . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 12.3 HIME(R) . . .
22、. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 AnnexA(normative)ASN.1syntaxforobjectidentiers.51 Annex B (informative) Security considerations . . . . . . . . . . . . . . . . . . . . . . . 61 B.1 MAC algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
23、 . . . . 61 B.2 Block ciphers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 B.3 Symmetric ciphers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 B.4 Asymmetric ciphers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 B.5 Key
24、encapsulation mechanisms . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 B.6 Data encapsulation mechanisms . . . . . . . . . . . . . . . . . . . . . . . . . . 66 B.7 Security of HC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 B.8 Intractability assumptions rela
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- BSISOIEC1803322006INFORMATIONTECHNOLOGYSECURITYTECHNIQUESENCRYPTIONALGORITHMSASYMMETRICCIPHERS 信息技术 安全技术

链接地址:http://www.mydoc123.com/p-396451.html