BS-ISO-IEC-10116-2006.pdf
《BS-ISO-IEC-10116-2006.pdf》由会员分享,可在线阅读,更多相关《BS-ISO-IEC-10116-2006.pdf(50页珍藏版)》请在三一文库上搜索。
1、BRITISH STANDARD BS ISO/IEC 10116:2006 Incorporating corrigendum March 2008 Information technology Security techniques Modes of operation for an n-bit cipher ICS 35.040 ? Licensed Copy: London South Bank University, South Bank University, 31/01/2009 03:34, Uncontrolled Copy, (c) BSI BS ISO/IEC 10116
2、:2006 This British Standard was published under the authority of the Standards Policy and Strategy Committee on 20 March 2006 BSI 2008 ISBN 978 0 580 59841 8 National foreword This British Standard is the UK implementation of ISO/IEC 10116:2006, incorporating corrigendum March 2008. It supersedes BS
3、 ISO/IEC 10116:1997, which is withdrawn. The start and finish of text introduced or altered by corrigendum is indicated in the text by tags. Text altered by ISO/IEC corrigendum March 2008 is indicated in the text by . The UK participation in its preparation was entrusted to Technical Committee IST/3
4、3, Information technology Security techniques. A list of organizations represented on this committee can be obtained on request to its secretary. This publication does not purport to include all the necessary provisions of a contract. Users are responsible for its correct application. Compliance wit
5、h a British Standard cannot confer immunity from legal obligations. Amendments/corrigenda issued since publication DateComments 30 November 2008Implementation of ISO/IEC corrigendum March 2008 Licensed Copy: London South Bank University, South Bank University, 31/01/2009 03:34, Uncontrolled Copy, (c
6、) BSI Reference number ISO/IEC 10116:2006(E) INTERNATIONAL STANDARD ISO/IEC 10116 Third edition 2006-02-01 Information technology Security techniques Modes of operation for an n-bit block cipher Technologies de linformation Techniques de scurit Modes opratoires pour un chiffrement par blocs de n-bit
7、s BS ISO/IEC 10116:2006 Licensed Copy: London South Bank University, South Bank University, 31/01/2009 03:34, Uncontrolled Copy, (c) BSI ii Licensed Copy: London South Bank University, South Bank University, 31/01/2009 03:34, Uncontrolled Copy, (c) BSI ContentsPage Foreword. . . . . . . . . . . . .
8、. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .vii 1Scope. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 2Normative references . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 3 Terms and defi nitions. . . . . . . . . .
9、 . . . . . . . . . . . . . . . . . . . . . . . . .2 4Symbols (and abbreviated terms) . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3 5Requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5 6Electronic Codebook (ECB) mode . . . . . . . . . . . . . . . .
10、. . . . . . . . . . . .6 6.1Preliminaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6 6.2Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6 6.3Decryption. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6 7C
11、ipher Block Chaining (CBC) mode . . . . . . . . . . . . . . . . . . . . . . . . . . .6 7.1Preliminaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6 7.2Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7 7.3Decryption. . . . . . . . .
12、 . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7 8Cipher Feedback (CFB) mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8 8.1Preliminaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8 8.2Encryption . . . . . . . . . . . . . . . . . . . . . .
13、 . . . . . . . . . . . . . . . .8 8.3Decryption. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9 9Output Feedback (OFB) mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10 9.1Preliminaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
14、 . .10 9.2Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10 9.3Decryption. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11 10Counter (CTR) mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11 10.1Preliminaries
15、. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11 10.2Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12 10.3Decryption. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12 Annex A (normative) Object identifi ers
16、 . . . . . . . . . . . . . . . . . . . . . . . . . . .14 Annex B (informative)Properties of the modes of operation . . . . . . . . . . . . . . . .16 B.1Properties of the Electronic Codebook (ECB) mode of operation . . . . . . . .16 B.2Properties of the Cipher Block Chaining (CBC) mode of operation .
17、 . . . . . .17 B.3Properties of the Cipher Feedback (CFB) mode of operation. . . . . . . . . .18 B.4Properties of the Output Feedback (OFB) mode of operation . . . . . . . . . .20 B.5Properties of the Counter (CTR) mode of operation . . . . . . . . . . . . . . .21 Annex C (informative)Figures descri
18、bing the modes of operation . . . . . . . . . . . . .23 iii BS ISO/IEC 10116:2006 Licensed Copy: London South Bank University, South Bank University, 31/01/2009 03:34, Uncontrolled Copy, (c) BSI Annex D (informative)Examples for the Modes of Operation . . . . . . . . . . . . . . .26 D.1General . . .
19、 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26 D.2Triple Data Encryption Algorithm . . . . . . . . . . . . . . . . . . . . . . . . .26 D.2.1ECB Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27 D.2.2CBC Mode . . . . . . . . . . . . . . . . . .
20、 . . . . . . . . . . . . . . . . .29 D.2.3CFB Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31 D.2.4OFB Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34 D.2.5Counter Mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35 D.3Adv
21、anced Encryption Standard . . . . . . . . . . . . . . . . . . . . . . . . . . .36 D.3.1ECB Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .36 D.3.2CBC Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37 D.3.3CFB Mode . . . . . . . . . . . . . . . .
22、. . . . . . . . . . . . . . . . . . .38 D.3.4OFB Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .39 D.3.5Counter Mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .40 Bibliography. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
23、 . . . .41 Figures C.1The Cipher Block Chaining (CBC) mode of operation with m = 1. . . . . . . . .23 C.2The Cipher Block Chaining (CBC) mode of operation. . . . . . . . . . . . . . . .23 C.3The Cipher Feedback (CFB) mode of operation . . . . . . . . . . . . . . . . . . . .24 C.4The Output Feedback
24、(OFB) mode of operation. . . . . . . . . . . . . . . . . . .24 C.5The Counter (CTR) mode of operation . . . . . . . . . . . . . . . . . . . . . . . . .25 iv BS ISO/IEC 10116:2006 Licensed Copy: London South Bank University, South Bank University, 31/01/2009 03:34, Uncontrolled Copy, (c) BSI Foreword
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- BS ISO IEC 10116 2006
链接地址:https://www.31doc.com/p-3744430.html