ISO-18033-3-2005.pdf
《ISO-18033-3-2005.pdf》由会员分享,可在线阅读,更多相关《ISO-18033-3-2005.pdf(78页珍藏版)》请在三一文库上搜索。
1、 Reference number ISO/IEC 18033-3:2005(E) ISO/IEC 2005 INTERNATIONAL STANDARD ISO/IEC 18033-3 First edition 2005-07-01 Information technology Security techniques Encryption algorithms Part 3: Block ciphers Technologies de linformation Techniques de scurit Algorithmes de chiffrement Partie 3: Chiffre
2、ment par blocs Copyright International Organization for Standardization Provided by IHS under license with ISO Licensee=HP Monitoring/1111111164 Not for Resale, 12/04/2007 20:57:16 MSTNo reproduction or networking permitted without license from IHS -,-,- ISO/IEC 18033-3:2005(E) PDF disclaimer This P
3、DF file may contain embedded typefaces. In accordance with Adobes licensing policy, this file may be printed or viewed but shall not be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In downloading this file, parties accept therei
4、n the responsibility of not infringing Adobes licensing policy. The ISO Central Secretariat accepts no liability in this area. Adobe is a trademark of Adobe Systems Incorporated. Details of the software products used to create this PDF file can be found in the General Info relative to the file; the
5、PDF-creation parameters were optimized for printing. Every care has been taken to ensure that the file is suitable for use by ISO member bodies. In the unlikely event that a problem relating to it is found, please inform the Central Secretariat at the address given below. ISO/IEC 2005 All rights res
6、erved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or ISOs member body in the country of the reque
7、ster. ISO copyright office Case postale 56 CH-1211 Geneva 20 Tel. + 41 22 749 01 11 Fax + 41 22 749 09 47 E-mail copyrightiso.org Web www.iso.org Published in Switzerland ii ISO/IEC 2005 All rights reserved Copyright International Organization for Standardization Provided by IHS under license with I
8、SO Licensee=HP Monitoring/1111111164 Not for Resale, 12/04/2007 20:57:16 MSTNo reproduction or networking permitted without license from IHS -,-,- ISO/IEC 18033-3:2005(E) ISO/IEC 2005 All rights reserved iii Contents Page Introduction .vi 1 Scope1 2 Terms and definitions.1 3 Symbols2 4 64-bit block
9、ciphers.2 4.1 TDEA.3 4.1.1 TDEA encryption/decryption3 4.1.2 TDEA keying options .3 4.2 MISTY13 4.2.1 MISTY1 encryption3 4.2.2 MISTY1 decryption4 4.2.3 MISTY1 functions 4 4.2.4 MISTY1 key schedule9 4.3 CAST-12810 4.3.1 CAST-128 encryption10 4.3.2 CAST-128 decryption10 4.3.3 CAST-128 functions 10 4.3
10、.4 CAST-128 key schedule17 5 128-bit block ciphers.20 5.1 AES .20 5.1.1 AES encryption20 5.1.2 AES decryption21 5.1.3 AES transformations.21 5.1.4 AES key schedule26 5.2 Camellia27 5.2.1 Camellia encryption 27 5.2.2 Camellia decryption 29 5.2.3 Camellia functions.32 5.2.4 Camellia key schedule38 5.3
11、 SEED.42 5.3.1 SEED encryption .42 5.3.2 SEED decryption .42 5.3.3 SEED functions43 5.3.4 SEED key schedule.46 Annex A (normative) Description of DES47 A.1. DES encryption47 A.2. DES decryption47 A.3. DES functions47 A.3.1 Initial permutation IP.47 A.3.2 Inverse initial permutation IP-1.48 A.3.3 Fun
12、ction f .49 A.3.4 Expansion permutation E.49 A.3.5 Permutation P50 A.3.6 S-Boxes 50 A.4 DES key schedule (KS)51 Annex B (normative) ASN.1 module53 Annex C (informative) Algebraic forms of MISTY1 and Camellia S-boxes 55 C.1 MISTY1 S-boxes.55 Foreword v Copyright International Organization for Standar
13、dization Provided by IHS under license with ISO Licensee=HP Monitoring/1111111164 Not for Resale, 12/04/2007 20:57:16 MSTNo reproduction or networking permitted without license from IHS -,-,- ISO/IEC 18033-3:2005(E) iv ISO/IEC 2005 All rights reserved C.1.1 MISTY1 S-box S7. 55 C.1.2 MISTY1 S-box S9.
14、 55 C.2 Camellia S-box . 55 Annex D (informative) Test vectors. 57 D.1 TDEA test vectors. 57 D.1.1 TDEA encryption. 57 D.1.2 DES encryption and decryption 58 D.2 MISTY1 test vectors 59 D.3 CAST-128 test vectors 60 D.4 AES test vectors . 60 D.4.1 AES encryption. 60 D.4.2 Key expansion example. 61 D.4
15、.3 Cipher example. 63 D.5 Camellia test vectors 65 D.5.1 Camellia encryption 65 D.6 SEED test vectors. 68 Annex E (informative) Feature table 70 Bibliography. 71 Copyright International Organization for Standardization Provided by IHS under license with ISO Licensee=HP Monitoring/1111111164 Not for
16、Resale, 12/04/2007 20:57:16 MSTNo reproduction or networking permitted without license from IHS -,-,- ISO/IEC 18033-3:2005(E) ISO/IEC 2005 All rights reserved v Foreword ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) form the speciali
17、zed system for worldwide standardization. National bodies that are members of ISO or IEC participate in the development of International Standards through technical committees established by the respective organization to deal with particular fields of technical activity. ISO and IEC technical commi
18、ttees collaborate in fields of mutual interest. Other international organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1. Internationa
19、l Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2. The main task of the joint technical committee is to prepare International Standards. Draft International Standards adopted by the joint technical committee are circulated to national bodies for voting. Pub
20、lication as an International Standard requires approval by at least 75 % of the national bodies casting a vote. Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. ISO and IEC shall not be held responsible for identifying any or all s
21、uch patent rights. ISO/IEC 18033-3 was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology, Subcommittee SC 27, IT Security techniques. ISO/IEC 18033 consists of the following parts, under the general title Information technology Security techniques Encryption algorithms: Par
22、t 1: General Part 2: Asynnetric ciphers Part 3: Block ciphers Part 4: Stream ciphers Copyright International Organization for Standardization Provided by IHS under license with ISO Licensee=HP Monitoring/1111111164 Not for Resale, 12/04/2007 20:57:16 MSTNo reproduction or networking permitted withou
23、t license from IHS -,-,- ISO/IEC 18033-3:2005(E) vi ISO/IEC 2005 All rights reserved Introduction The International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC) draw attention to the fact that it is claimed that compliance with this document may involve
24、the use of patents. The ISO and IEC take no position concerning the evidence, validity and scope of this patent right. The holder of this patent right has assured the ISO and IEC that he is willing to negotiate licences under reasonable and non-discriminatory terms and conditions with applicants thr
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ISO 18033 2005
链接地址:https://www.31doc.com/p-3776467.html