ANSI INCITS ISO 8372-1987 Information processing - Modes of operation for a 64-bit block cipher algorithm (Adopted by INCITS).pdf
《ANSI INCITS ISO 8372-1987 Information processing - Modes of operation for a 64-bit block cipher algorithm (Adopted by INCITS).pdf》由会员分享,可在线阅读,更多相关《ANSI INCITS ISO 8372-1987 Information processing - Modes of operation for a 64-bit block cipher algorithm (Adopted by INCITS).pdf(9页珍藏版)》请在麦多课文档分享上搜索。
1、INTERNATIONAL STANDARD INTERNATIONAL ORGANIZATION FOR STANDARDIZATION ORGANISATION INTERNATIONALE DE NORMALISATION MEXAYHAPOAHAR OPTAHMSAMR I-IO CTAHAPTMBAklM Information processing - Modes of operation for a 64-bit block cipher algorithm Traitement de linformation - Modes opkratoires dun algorithme
2、 de chiffrement par blocs de 64 bits IS0 8372 First edition 1987-08-15 Reference number IS0 8372 : 1987 (E) Adopted by INCITS (InterNational Committee for Information Technology Standards) as an American National Standard.Date of ANSI Approval: 1/13/99Published by American National Standards Institu
3、te,25 West 43rd Street, New York, New York 10036Copyright 2002 by Information Technology Industry Council (ITI).All rights reserved.These materials are subject to copyright claims of InternationalStandardization Organization (ISO), International ElectrotechnicalCommission (IEC), American National St
4、andards Institute (ANSI),and Information Technology Industry Council (ITI). Not for resale.No part of this publication may be reproduced in any form,including an electronic retrieval system, without the prior writtenpermission of ITI. All requests pertaining to this standard should besubmitted to IT
5、I, 1250 Eye Street NW, Washington, DC 20005.Printed in the United States of AmericaForeword IS0 (the international Organization for Standardization) is a worldwide federation of national standards bodies (IS0 member bodies). The work of preparing International Standards is normally carried out throu
6、gh IS0 technical committees. Each member body interested in a subject for which a technical committee has been established has the right to be represented on that committee. International organizations, govern- mental and non-governmental, in liaison with ISO, also take part in the work. Draft Inter
7、national Standards adopted by the technical committees are circulated to the member bodies for approval before their acceptance as International Standards by the IS0 Council. They are approved in accordance with IS0 procedures requiring at least 75 % approval by the member bodies voting. Internation
8、al Standard IS0 8372 was prepared by Technical Committee ISO/TC 97, lnforma tion processing systems. Users should note that all International Standards undergo revision from time to time and that any reference made herein to any other International Standard implies its latest edition, unless otherwi
9、se stated. 0 International Organization for Standardization, 1997 0 Printed in Switzerland INTERNATIONAL STANDARD IS0 8372 : 1987 (E) Information processing - Modes of operation for a 64-bit block cipher algorithm 1 Scope and field of application This International Standard describes four modes of o
10、peration for any 64-bit block cipher algorithm using a secret key. NOTE - The annex, which does not form part of this International Standard, contains comments on the properties of each mode. This International Standard establishes four defined modes of operation so that in any application of a 64-b
11、it block cipher (for example data transmission, data storage authentication) this International Standard will provide a useful reference for the specification of the mode of operation, the formation of the starting variable, and the values of parameters (as appropriate). NOTE - For the Cipher Feedba
12、ck (CFB) mode of operation (see clause 71, two parameters, j and k, are defined. For the Output Feed- back (CFB) mode of operation (see clause 81, one parameter, j, is defined. When one of these modes of operation is used the parameter value(s) needs to be chosen and used by all communicating partie
13、s. 2 Reference ANSI X3.92-1991, Data Encryption Algorithm. 3 Definitions 3.1 plaintext: Unenciphered information. 3.2 cipher text: Enciphered information. 3.3 block chaining : The encipherment of information such that each block of ciphertext is cryptographically dependent upon the preceding ciphert
14、ext block. 3.4 initializing value (IV) : Value used in defining the start- ing point of an encipherment process. 3.5 starting variable (SV): Variable derived from the initializing value and used in defining the starting point of the modes of operation. NOTE - The method of deriving the starting vari
15、able from the initializ- ing value is not defined in this International Standard. It needs to be described in any application of the modes of operation. 3.6 cryptographic synchronization : The co-ordination of the encipherment and decipherment process. 4 Notation For the purposes of this Internation
16、al Standard the functional relation defined by the block encipherment algorithm is written C = eK(P) where P is the plaintext block; C is the ciphertext block; K is the key. The expression eK is the operation of encipherment using the key K. The corresponding decipherment function is written P = dK(
17、C) A variable, such as P and C above, denoted by a capital letter, represents a one-dimensional array of bits, for example: A = a, a2, . . . , a,) B = b, b2, . . . , 6,) i.e. arrays of m bits, numbered from 1 to m. The operation of addition, modulo 2, also known as the ex- clusive or function is sho
18、wn by the symbol . The operation applied to arrays such as A and B is defined as A B = (0, CT3 bl. 9 CT3 b2, . . . r 0, CB b,) The operation of selecting the left-mostj bits of A to generate a j bit array is written A - j = a, u2, . . . , Uj This operation is defined only when j m, where m is the nu
19、mber of bits in A. A “shift function” Sk is defined as follows. Given an m-bit variable X and a k-bit variable Fwhere k m, the effect of a shift function S,JX 1 F) produces the m-bit variable SJXIF) = q+1, x/c+28 . . . 8 -q,tfitf2, . . . .fd The effect is to shift the bits of array X left by k place
20、s, discard- ing xl . . . xk and to place the array F in the rightmost k places of x. IS0 8372 : 1967 (El A special case of this function is used which begins with the k-bit variable I(k) of successive 1 bits and shifts the variable C of j bits into it, where j k. The result is Sj(l(k)IC) = (1, 1, .
21、. . , l,C,C*, . . . , Cj where there are k - j “ones” on the left of the resultant array. 5 Electronic Codebook (EC61 mode Given a plaintext block P of 64 bits, the encipherment algorithm produces a cipher-text block C of 64 bits, i.e. : C = eK(P) The decipherment algorithm produces P = dK(C) This m
22、ode of using the encipherment algorithm is known as “electronic codebook”. 6 Cipher Block Chaining (CBC) mode The variables employed for the CBC mode of encipherment are a) a sequence of n plaintext blocks PI, P2, . . . , P, each of 64 bits; b) a key K: c) a starting variable SV of 64 bits; d) the r
23、esultant sequence of n ciphertext blocks Cl, C, . . . , C, each of 64 bits. NOTE - The method of forming SV is not described in this Inter- national Standard. The CBC mode of encipherment is described as follows: Encipherment of the first plaintext variable: Cl = eK(P, SU subsequently, . . . (1) Ci=
24、eK(PiCj-l) for i=2,3 ,., n . . . (2) This procedure is illustrated in the upper part of figure 1. The starting variable SV is used in the generation of the first ciphertext output. Subsequently, the ciphertext is added, modulo 2, to the next plaintext before encipherment. The CBC mode of deciphermen
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ANSIINCITSISO83721987INFORMATIONPROCESSINGMODESOFOPERATIONFORA64BITBLOCKCIPHERALGORITHMADOPTEDBYINCITSPDF

链接地址:http://www.mydoc123.com/p-435944.html