ANSI INCITS ISO IEC 10116-2006 Information technology Security techniques Modes of operation for an n-bit block cipher.pdf
《ANSI INCITS ISO IEC 10116-2006 Information technology Security techniques Modes of operation for an n-bit block cipher.pdf》由会员分享,可在线阅读,更多相关《ANSI INCITS ISO IEC 10116-2006 Information technology Security techniques Modes of operation for an n-bit block cipher.pdf(48页珍藏版)》请在麦多课文档分享上搜索。
1、INCITS/ISO/IEC 10116:20062008 (ISO/IEC 10116:2006, IDT) Information technology Security techniques Modes of operationfor an n-bit block cipherINCITS/ISO/IEC 10116:20062008(ISO/IEC 10116:2006, IDT)INCITS/ISO/IEC 10116:20062008 ii ITIC 2008 All rights reserved PDF disclaimer This PDF file may contain
2、embedded typefaces. In accordance with Adobes licensing policy, this file may be printed or viewed but shall not be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In downloading this file, parties accept therein the responsibility
3、 of not infringing Adobes licensing policy. The ISO Central Secretariat accepts no liability in this area. Adobe is a trademark of Adobe Systems Incorporated. Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-creation paramet
4、ers were optimized for printing. Every care has been taken to ensure that the file is suitable for use by ISO member bodies. In the unlikely event that a problem relating to it is found, please inform the Central Secretariat at the address given below. Adopted by INCITS (InterNational Committee for
5、Information Technology Standards) as an American National Standard. Date of ANSI Approval: 7/2/2008 Published by American National Standards Institute, 25 West 43rd Street, New York, New York 10036 Copyright 2008 by Information Technology Industry Council (ITI). All rights reserved. These materials
6、are subject to copyright claims of International Standardization Organization (ISO), International Electrotechnical Commission (IEC), American National Standards Institute (ANSI), and Information Technology Industry Council (ITI). Not for resale. No part of this publication may be reproduced in any
7、form, including an electronic retrieval system, without the prior written permission of ITI. All requests pertaining to this standard should be submitted to ITI, 1250 Eye Street NW, Washington, DC 20005. Printed in the United States of America Contents PageForeword . . . . . . . . . . . . . . . . .
8、. . . . . . . . . . . . . . . . . . . . . . . . . . . . vii1 Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Normative references . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Terms and definitions . . . . . . . . . . . .
9、. . . . . . . . . . . . . . . . . . . . . . . 24 Symbols (and abbreviated terms) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 Electronic Codebook (ECB) mode . . . . . . . . . . . . . . . . .
10、 . . . . . . . . . . . 66.1 Preliminaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66.2 Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66.3 Decryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
11、67 Cipher Block Chaining (CBC) mode . . . . . . . . . . . . . . . . . . . . . . . . . . . 67.1 Preliminaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67.2 Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77.3 Decryption . . . . .
12、 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 Cipher Feedback (CFB) mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88.1 Preliminaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88.2 Encryption . . . . . . . . . . . . . . . .
13、. . . . . . . . . . . . . . . . . . . . . . 88.3 Decryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 Output Feedback (OFB) mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109.1 Preliminaries . . . . . . . . . . . . . . . . . . . . . . . . . . .
14、. . . . . . . . . . 109.2 Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109.3 Decryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1110 Counter (CTR) mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
15、1110.1 Preliminaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1110.2 Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1210.3 Decryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12Annex A (normat
16、ive) Object identifiers . . . . . . . . . . . . . . . . . . . . . . . . . . . 14Annex B (informative) Properties of the modes of operation . . . . . . . . . . . . . . . . 16B.1 Properties of the Electronic Codebook (ECB) mode of operation . . . . . . . . 16B.2 Properties of the Cipher Block Chaining
17、 (CBC) mode of operation . . . . . . . 17B.3 Properties of the Cipher Feedback (CFB) mode of operation . . . . . . . . . . 18B.4 Properties of the Output Feedback (OFB) mode of operation . . . . . . . . . . 20B.5 Properties of the Counter (CTR) mode of operation . . . . . . . . . . . . . . . 21Annex
18、 C (informative) Figures describing the modes of operation . . . . . . . . . . . . . 23iiiINCITS/ISO/IEC 10116:20062008 ITIC 2008 All rights reservedAnnex D (informative) Examples for the Modes of Operation . . . . . . . . . . . . . . . 26D.1 General . . . . . . . . . . . . . . . . . . . . . . . . .
19、 . . . . . . . . . . . . . . . 26D.2 Triple Data Encryption Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . 26D.2.1 ECB Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27D.2.2 CBC Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29D.2.
20、3 CFB Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31D.2.4 OFB Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34D.2.5 Counter Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35D.3 Advanced Encryption Standard . . . . .
21、. . . . . . . . . . . . . . . . . . . . . . 36D.3.1 ECB Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36D.3.2 CBC Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37D.3.3 CFB Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
22、 . . 38D.3.4 OFB Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39D.3.5 Counter Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41FiguresC.1 The Cip
23、her Block Chaining (CBC) mode of operation with m = 1 . . . . . . . . . 23C.2 The Cipher Block Chaining (CBC) mode of operation . . . . . . . . . . . . . . . . 23C.3 The Cipher Feedback (CFB) mode of operation . . . . . . . . . . . . . . . . . . . . 24C.4 The Output Feedback (OFB) mode of operation
24、. . . . . . . . . . . . . . . . . . . 24C.5 The Counter (CTR) mode of operation . . . . . . . . . . . . . . . . . . . . . . . . . 25iv INCITS/ISO/IEC 10116:20062008 ITIC 2008 All rights reservedForewordISO (the International Organization for Standardization) and IEC (the International Elec-trotechni
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ANSIINCITSISOIEC101162006INFORMATIONTECHNOLOGYSECURITYTECHNIQUESMODESOFOPERATIONFORANNBITBLOCKCIPHERPDF

链接地址:http://www.mydoc123.com/p-435973.html