Customer Support: 131 242

  • There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

CAN/CSA-ISO/IEC 18033-4:13 (R2017)

Current
Current

The latest, up-to-date edition.

Information technology - Security techniques - Encryption algorithms - Part 4: Stream ciphers (Adopted ISO/IEC 18033-4:2011, second edition, 2011-12-15)
Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

01-01-2013

Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 Framework for stream ciphers
6 General models for stream ciphers
7 Constructing keystream generators from block ciphers
8 Dedicated keystream generators
Annex A (normative) - Object Identifiers
Annex B (informative) - Operations over the finite field
        GF(2[n])
Annex C (informative) - Examples
Annex D (informative) - Security information
Bibliography

Defines: a) output functions to combine a keystream with plaintext; b) keystream generators for producing keystream; and c) object identifiers assigned to dedicated keystream generators in accordance with ISO/IEC 9834.

CSA Preface Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the Canadian Advisory Committee (CAC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T). This Standard supersedes CAN/CSA-ISO/IEC 18033-4-06 (adoption of ISO/IEC 18033-4:2005). At the time of publication, ISO/IEC 18033-4:2011 is available from ISO and IEC in English only. CSA Group will publish the French version when it becomes available from ISO and IEC. Scope This part of ISO/IEC 18033 specifies a) output functions to combine a keystream with plaintext, b) keystream generators for producing keystream, and c) object identifiers assigned to dedicated keystream generators in accordance with ISO/IEC 9834. NOTE 1 The list of assigned object identifiers is given in Annex A. NOTE 2 Any change to the specification of these algorithms resulting in a change of functional behaviour will result in a change of the object identifier assigned to the algorithms concerned.

DevelopmentNote
2006 Edition along with their amendment is still active. (04/2014)
DocumentType
Standard
ISBN
978-1-77139-112-2
Pages
110
ProductNote
Reconfirmed EN
PublisherName
Canadian Standards Association
Status
Current
Supersedes

Standards Relationship
ISO/IEC 18033-4:2011 Identical

ISO/IEC 18033-1:2015 Information technology Security techniques Encryption algorithms Part 1: General
ISO/IEC 10118-1:2016 Information technology Security techniques Hash-functions Part 1: General
ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques

View more information
$446.38
Including GST where applicable

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.

Need help?
Call us on 131 242, then click here to start a Screen Sharing session
so we can help right away! Learn more