IEC > Webstore > Search > Register > Check out > Payment > Order confirmation

Publication detail

 
Reference ISO/IEC 18033-2 ed1.0 withdrawn corrigendum
> preview
Title Information technology -- Security techniques -- Encryption algorithms -- Part 2: Asymmetric ciphers
Publication date 2006-05-08
Format, price
(Swiss francs)
and language
198.- 125 pages
198.- 1162 Kb
 
Abstract ISO/IEC 18033-2:2006 specifies encryption systems (ciphers) for the purpose of data confidentiality. The primary purpose of encryption (or encipherment) techniques is to protect the confidentiality of stored or transmitted data. An encryption algorithm is applied to data (often called plaintext or cleartext) to yield encrypted data (or ciphertext); this process is known as encryption. The encryption algorithm should be designed so that the ciphertext yields no information about the plaintext except, perhaps, its length. Associated with every encryption algorithm is a corresponding decryption algorithm, which transforms ciphertext back into its original plaintext.

An asymmetric, i.e. public-key, encryption scheme allows a sender to use a recipient's public key to transmit an encryption of a message to the receiver, who can use his secret key to decrypt the given ciphertext, thereby obtaining the original message.

Such a scheme should be secure in the sense that no information about the message should be leaked to a (resource-bounded) attacker, even if that attacker mounts a so-called 'chosen ciphertext' attack, in which he may obtain decryptions of other ciphertexts. This is the strongest type of attack that has been proposed for a public-key encryption scheme.

ISO/IEC 18033-2:2006 specifies the functional interface of such a scheme, and in addition specifies a number of particular schemes that appear to be secure against chosen ciphertext attack. The different schemes offer different trade-offs between security properties and efficiency.
Technical Committee JTC 1/SC 27 - IT security techniques  RSS
ICS Codes
35.040 Character sets and information coding
*Including coding of audio, picture, multimedia and hypermedia information, IT security techniques, encryption, bar coding, electronic signatures, etc.
 
Replaced by
 
Work in progress
ProjectStage codeForecast publication date
No project under development--


Search

>> Advanced search

Quick access by ref. number



Basket

Your basket is empty
Your country is :
Your TVA is : You must login...

Payment

Accepted credit cards:
Prices in CHF (Swiss francs)
Request a pro forma to pay by bank transfer or cheque
Learn how to share your publications with your colleagues, using networking options
Prices in CHF (Swiss francs)
We accept the following credit cards:
To pay by bank transfer: request a pro forma
If you purchase regularly through the IEC Webstore you can open a corporate account

Just Published

>> Published in the last 30 days

Bestsellers

  1. IEC 60601-1-2 Ed. 4.0
  2. IEC 60529 Ed. 2.2
  3. IEC 60502-2 Ed. 3.0
  4. IEC 60034-30-1 Ed. 1.0
  5. IEC 61000-4-6 Ed. 4.0
  6. IEC 60812 Ed. 2.0
  7. IEC 62446 Ed. 1.0
  8. IEC 61010-1 Ed. 3.0
  9. IEC 60601-1 Ed. 3.1
  10. IEC 61851-24 Ed. 1.0