BS ISO IEC 19772-2009 Information technology - Security techniques - Authenticated encryption《信息技术 安全技术 加密认证》.pdf
《BS ISO IEC 19772-2009 Information technology - Security techniques - Authenticated encryption《信息技术 安全技术 加密认证》.pdf》由会员分享,可在线阅读,更多相关《BS ISO IEC 19772-2009 Information technology - Security techniques - Authenticated encryption《信息技术 安全技术 加密认证》.pdf(40页珍藏版)》请在麦多课文档分享上搜索。
1、BS ISO/IEC 19 77 2:2 00 9 ICS 35.040 NO COP YING WIT HOUT BSI PERM ISS ION EXCEPT AS PERM ITT ED BY COP YRIGHT LAW BRITISH STAN DA RD In fo rm ati on te chno lo gy Se curityt echniq ues A ut hent ifica ti on encrypti on BS ISO/IEC 19772:2009 Incorporating corrigendum September 2014 Information techn
2、ology Security techniques Authenticated encryptionBS ISO/IEC 19772:2009 ISBN 978 0 580 86465 0 Amendments/corrigenda issued since publication Date Comments 30 September 2014 Implementation of ISO/IEC corrigendum September 2014 This British Standard was published under the authority of the Standards
3、Policy and Strategy Committee on 31 July 2009 The British Standards Institution 2014. Published by BSI Standards Limited 2014 National foreword This British Standard is the UK implementation of ISO/IEC 19772:2009, incorporating corrigendum September 2014. The start and finish of text introduced or a
4、ltered by corrigendum is indicated in the text by tags. Text altered by ISO/IEC corrigendum September 2014 is indicated in the text by . The UK participation in its preparation was entrusted to Technical Committee IST/33, IT - Security techniques. A list of organizations represented on this committe
5、e can be obtained on request to its secretary. The publication does not purport to include all the necessary provisions of a contract. Users are responsible for its correct application. Compliance with a British Standard cannot confer immunity from legal obligations.BS ISO/IEC 19772:2009 Reference n
6、umber ISO/IEC 19772:2009(E) ISO/IEC 2009 INTERNATIONAL STANDARD ISO/IEC 19772 First edition 2009-02-15 Information technology Security techniques Authenticated encryption Technologies de linformation Techniques de scurit Chiffrage authentifi BS ISO/IEC 19772:2009 ISO/IEC 19772:2009(E) PDF disclaimer
7、 ThisP DF file may contain embedded typefaces. In accordance with Adobes licensing policy, this file may be printed or viewed but shall not be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In downloading this file, parties accept
8、 therein the responsibility of not infringing Adobes licensing policy. The ISO Central Secretariat accepts no liability in this area. Adobe is a trademark of Adobe Systems Incorporated. Details oft he software products used to create thisP DF file can be found in the General Info relative to the fil
9、e;t he PDF-creation parameters were optimized for printing. Every care has been taken to ensure that thef ile is suitable for use by ISO member bodies. In the unlikely event that a problem relating to it isf ound, please inform the Central Secretariat at the address given below. COPYRIGHT PROTECTED
10、DOCUMENT ISO/IEC 2009 All rights reserved. Unless otherwises pecified, no part of this publicationm ay be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or ISOs mem
11、ber body in the country of the requester. ISO copyright office Case postale 56 CH-1211 Geneva 20 Tel. + 41 22 749 01 11 Fax + 41 22 749 09 47 E-mail copyrightiso.org Web www.iso.org Published in Switzerland ii ISO/IEC 2009 All rights reservedBS ISO/IEC 19772:2009 ISO/IEC 19772:2009(E) ISO/IEC 2009 A
12、ll rights reserved iii Contents Page Foreword. . v Introduction. vi 1S cope1 2N ormative references1 3T erms and definitions. 1 4S ymbols (and abbreviated terms)3 5R equirements.4 6A uthenticated encryption mechanism 1 (OCB 2.0)4 6.1 Introduction4 6.2 Specific notation4 6.3 Specific requirements. 5
13、6.4 Definition of function M 2 .5 6.5 Definition of function M 3 .5 6.6 Definition of function J .6 6.7 Encryption procedure. 6 6.8 Decryption procedure .7 7A uthenticated encryption mechanism 2 (Key Wrap) .7 7.1 Introduction7 7.2 Specific notation8 7.3 Specific requirements. 8 7.4 Encryption proced
14、ure. 8 7.5 Decryption procedure .9 8A uthenticated encryption mechanism 3 (CCM) .9 8.1 Introduction9 8.2 Specific notation9 8.3 Specific requirements. 10 8.4 Encryption procedure. 10 8.5 Decryption procedure .12 9A uthenticated encryption mechanism 4 (EAX) 13 9.1 Introduction13 9.2 Specific notation
15、13 9.3 Specific requirements. 13 9.4 Definition of function M 13 9.5 Encryption procedure. 14 9.6 Decryption procedure .14 10 Authenticated encryption mechanism 5 (Encrypt-then-MAC)15 10.1 Introduction15 10.2 Specific notation15 10.3 Specific requirements. 15 10.4 Encryption procedure. 16 10.5 Decry
16、ption procedure .16 11 Authenticated encryption mechanism 6 (GCM). 16 11.1 Introduction16 11.2 Specific notation17 11.3 Specific requirements. 17 11.4 Definition of multiplication operation. 18 17 17BS ISO/IEC 19772:2009 ISO/IEC 19772:2009(E) iv ISO/IEC 2009 All rights reserved 11.5 Definition of fu
17、nction G 18 11.6 Encryption procedure. . 18 11.7 Decryption procedure 19 AnnexA (i nf orma ti ve ) Guidance on use of the mechanisms 20 A.1I ntroduction. 20 A.2S election of mechanism.2 0 A.3M echanism 1 (OCB 2.0) 21 A.4M echanism 2 (Key Wrap) .2 1 A.5M echanism 3 (CCM) 21 A.6M echanism 4 (EAX). 21
18、A.7M echanism 5 (Encrypt-then-MAC) 22 A.8M echanism 6 (GCM) 22 AnnexB (i nf orma ti ve ) Examples 23 B.1 Introduction. 23 B.2 Mechanism 1 (OCB 2.0) 23 B.3 Mechanism 2 (Key Wrap) .2 4 B.4 Mechanism 3 (CCM) 24 B.5 Mechanism 4 (EAX). 25 B.6 Mechanism 5 (Encrypt-then-MAC). . 26 B.7 Mechanism 6 (GCM) 26
19、AnnexC (n orm ati ve ) ASN.1 module. 28 C.1 Formal definition.2 8 C.2 Use of subsequent object identifiers 28 Bibliography. 29BS ISO/IEC 19772:2009 ISO/IEC 19772:2009(E) ISO/IEC 2009 All rights reserved v Foreword ISO( the International Organization for Standardization) andI EC (the International El
20、ectrotechnical Commission) form the specializeds ystemf or worldwide standardization. National bodies that are memberso f ISOo r IEC participate in the development of InternationalS tandardst hrough technicalc ommittees established byt he respective organization to deal with particular fields of tec
21、hnicala ctivity. ISO and IEC technical committees collaborate in fieldso fm utual interest. Otheri nternationalo rganizations, governmental and non-governmental, in liaison with ISOa nd IEC, also take part in the work.I n the field of information technology, ISO and IEC have establisheda joint techn
22、ical committee, ISO/IECJ TC 1. International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2. Them ain tasko ft he joint technical committee is to prepare InternationalS tandards. Draft International Standardsa dopted by the joint technical committee are ci
23、rculated to national bodies for voting. Publication as an International Standard requires approval by at least 75 % of the national bodies casting a vote. Attention is drawn to the possibilityt hats ome of the elements of thisd ocument mayb et he subject ofp atent rights. ISO and IEC shall not be he
24、ld responsible for identifying any or all such patent rights. ISO/IEC1 9772 was prepared by Joint TechnicalC ommittee ISO/IECJ TC 1, Information technology, Subcommittee SC2 7, IT Security techniques.BS ISO/IEC 19772:2009 ISO/IEC 19772:2009(E) vi ISO/IEC 2009 All rights reserved Introduction When da
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
5000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- BSISOIEC197722009INFORMATIONTECHNOLOGYSECURITYTECHNIQUESAUTHENTICATEDENCRYPTION 信息技术 安全技术 加密 认证 PDF

链接地址:http://www.mydoc123.com/p-396513.html