ANSI INCITS ISO IEC 18033-3-2005 Information technology Security techniques Encryption algorithms Part 3 Block ciphers.pdf
《ANSI INCITS ISO IEC 18033-3-2005 Information technology Security techniques Encryption algorithms Part 3 Block ciphers.pdf》由会员分享,可在线阅读,更多相关《ANSI INCITS ISO IEC 18033-3-2005 Information technology Security techniques Encryption algorithms Part 3 Block ciphers.pdf(78页珍藏版)》请在麦多课文档分享上搜索。
1、INCITS/ISO/IEC 18033-3-2005 (ISO/IEC 18033-3:2005, IDT) Information technology Security techniques Encryptionalgorithms Part 3: Block ciphersINCITS/ISO/IEC 18033-3-2005(ISO/IEC 18033-3:2005, IDT)INCITS/ISO/IEC 18033-3-2005 ii ITIC 2005 All rights reserved PDF disclaimer This PDF file may contain emb
2、edded typefaces. In accordance with Adobes licensing policy, this file may be printed or viewed but shall not be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In downloading this file, parties accept therein the responsibility of
3、 not infringing Adobes licensing policy. The ISO Central Secretariat accepts no liability in this area. Adobe is a trademark of Adobe Systems Incorporated. Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-creation parameters
4、 were optimized for printing. Every care has been taken to ensure that the file is suitable for use by ISO member bodies. In the unlikely event that a problem relating to it is found, please inform the Central Secretariat at the address given below. Adopted by INCITS (InterNational Committee for Inf
5、ormation Technology Standards) as an American National Standard. Date of ANSI Approval: 10/7/2005 Published by American National Standards Institute, 25 West 43rd Street, New York, New York 10036 Copyright 2005 by Information Technology Industry Council (ITI). All rights reserved. These materials ar
6、e subject to copyright claims of International Standardization Organization (ISO), International Electrotechnical Commission (IEC), American National Standards Institute (ANSI), and Information Technology Industry Council (ITI). Not for resale. No part of this publication may be reproduced in any fo
7、rm, including an electronic retrieval system, without the prior written permission of ITI. All requests pertaining to this standard should be submitted to ITI, 1250 Eye Street NW, Washington, DC 20005. Printed in the United States of America iiiContents Page Introduction.vi 1 Scope1 2 Terms and defi
8、nitions .1 3 Symbols2 4 64-bit block ciphers.2 4.1 TDEA.3 4.1.1 TDEA encryption/decryption3 4.1.2 TDEA keying options .3 4.2 MISTY13 4.2.1 MISTY1 encryption 3 4.2.2 MISTY1 decryption 4 4.2.3 MISTY1 functions 4 4.2.4 MISTY1 key schedule9 4.3 CAST-12810 4.3.1 CAST-128 encryption 10 4.3.2 CAST-128 decr
9、yption 10 4.3.3 CAST-128 functions 10 4.3.4 CAST-128 key schedule17 5 128-bit block ciphers.20 5.1 AES .20 5.1.1 AES encryption20 5.1.2 AES decryption21 5.1.3 AES transformations.21 5.1.4 AES key schedule26 5.2 Camellia27 5.2.1 Camellia encryption 27 5.2.2 Camellia decryption 29 5.2.3 Camellia funct
10、ions.32 5.2.4 Camellia key schedule 38 5.3 SEED.42 5.3.1 SEED encryption .42 5.3.2 SEED decryption .42 5.3.3 SEED functions43 5.3.4 SEED key schedule .46 Annex A (normative) Description of DES47 A.1. DES encryption47 A.2. DES decryption47 A.3. DES functions 47 A.3.1 Initial permutation IP.47 A.3.2 I
11、nverse initial permutation IP-1.48 A.3.3 Function f .49 A.3.4 Expansion permutation E .49 A.3.5 Permutation P 50 A.3.6 S-Boxes 50 A.4 DES key schedule (KS)51 Annex B (normative) ASN.1 module 53 Annex C (informative) Algebraic forms of MISTY1 and Camellia S-boxes 55 C.1 MISTY1 S-boxes.55 Foreword v I
12、NCITS/ISO/IEC 18033-3-2005 ITIC 2005 All rights reservediv C.1.1 MISTY1 S-box S7. 55 C.1.2 MISTY1 S-box S9. 55 C.2 Camellia S-box . 55 Annex D (informative) Test vectors. 57 D.1 TDEA test vectors. 57 D.1.1 TDEA encryption. 57 D.1.2 DES encryption and decryption 58 D.2 MISTY1 test vectors 59 D.3 CAST
13、-128 test vectors 60 D.4 AES test vectors . 60 D.4.1 AES encryption . 60 D.4.2 Key expansion example . 61 D.4.3 Cipher example . 63 D.5 Camellia test vectors 65 D.5.1 Camellia encryption 65 D.6 SEED test vectors. 68 Annex E (informative) Feature table 70 Bibliography. 71 INCITS/ISO/IEC 18033-3-2005
14、ITIC 2005 All rights reservedvForeword ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) form the specialized system for worldwide standardization. National bodies that are members of ISO or IEC participate in the development of Internat
15、ional Standards through technical committees established by the respective organization to deal with particular fields of technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international organizations, governmental and non-governmental, in liaison wi
16、th ISO and IEC, also take part in the work. In the field of information technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1. International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2. The main task of the joint technical
17、committee is to prepare International Standards. Draft International Standards adopted by the joint technical committee are circulated to national bodies for voting. Publication as an International Standard requires approval by at least 75 % of the national bodies casting a vote. Attention is drawn
18、to the possibility that some of the elements of this document may be the subject of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights. ISO/IEC 18033-3 was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology, Subcommittee SC
19、 27, IT Security techniques. ISO/IEC 18033 consists of the following parts, under the general title Information technology Security techniques Encryption algorithms: Part 1: General Part 2: Asynnetric ciphers Part 3: Block ciphers Part 4: Stream ciphers INCITS/ISO/IEC 18033-3-2005 ITIC 2005 All righ
20、ts reservedvi Introduction The International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC) draw attention to the fact that it is claimed that compliance with this document may involve the use of patents. The ISO and IEC take no position concerning the evi
21、dence, validity and scope of this patent right. The holder of this patent right has assured the ISO and IEC that he is willing to negotiate licences under reasonable and non-discriminatory terms and conditions with applicants throughout the world. In this respect, the statement of the holder of this
22、 patent right is registered with the ISO and IEC. Information may be obtained from: ISO/IEC JTC 1/SC 27 Standing Document 8 (SD8) “Patent Information“ Standing Document 8 (SD8) is available at http:/www.ni.din.de/sc27 Attention is drawn to the possibility that some of the elements of this document m
23、ay be the subject of patent rights other than those identified above. ISO and IEC shall not be held responsible for identifying any or all such patent rights. INCITS/ISO/IEC 18033-3-2005 ITIC 2005 All rights reserved11 Scope This part of ISO/IEC 18033 specifies block ciphers. A block cipher maps blo
24、cks of n bits to blocks of n bits, under the control of a key of k bits. A total of six different block ciphers are defined. They are categorized in Table 1. Table 1. Block ciphers specified Block length Algorithm name (Clause #) Key lengthTDEA (4.1) 128 or 192 bits MISTY1 (4.2) 64 bits CAST-128 (4.
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ANSIINCITSISOIEC1803332005INFORMATIONTECHNOLOGYSECURITYTECHNIQUESENCRYPTIONALGORITHMSPART3BLOCKCIPHERSPDF

链接地址:http://www.mydoc123.com/p-436265.html