Customer Support: 131 242

  • There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

INCITS/ISO/IEC 18031 : 2012

Superseded
Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by
superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION
Available format(s)

Hardcopy , PDF

Superseded date

17-02-2020

Language(s)

English

Published date

01-01-2012

Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols
5 Properties and requirements of an RBG
6 RBG model
7 Types of RBGs
8 Overview and requirements for an NRBG
9 Overview and requirements for a DRBG
Annex A (normative) - Combining RBGs
Annex B (normative) - Conversion methods
Annex C (normative) - DRBGs
Annex D (normative) - Application specific constants
Annex E (informative) - NRBG examples
Annex F (informative) - Security considerations
Annex G (informative) - Discussion on the estimation
        of entropy
Annex H (informative) - RBG assurance
Annex I (informative) - RBG boundaries
Annex J (informative) - Rationale for the design of
        statistical tests
Bibliography

Provides a conceptual model for a random bit generator for cryptographic purposes, together with the elements of this model.

Committee
CS1
DocumentType
Standard
Pages
152
PublisherName
Information Technology Industry Council
Status
Superseded
SupersededBy

Standards Relationship
ISO/IEC 18031:2011 Identical

ISO/IEC 18033-1:2015 Information technology Security techniques Encryption algorithms Part 1: General
ISO/IEC 18032:2005 Information technology Security techniques Prime number generation
ANSI X9.82-2 : 2015 RANDOM NUMBER GENERATION - PART 2: ENTROPY SOURCES
ISO/IEC 18033-3:2010 Information technology Security techniques Encryption algorithms Part 3: Block ciphers
ISO/IEC 19790:2012 Information technology Security techniques Security requirements for cryptographic modules
ISO/IEC 10118-1:2016 Information technology Security techniques Hash-functions Part 1: General
ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
ANSI X9.82-3 : 2007(R2017) RANDOM NUMBER GENERATION - PART 3: DETERMINISTIC RANDOM BIT GENERATORS
ISO/IEC 9797-2:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function
ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
ANSI X9.82-1 : 2006(R2013) RANDOM NUMBER GENERATION - PART 1: OVERVIEW AND BASIC PRINCIPLES
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques

View more information
$98.22
Including GST where applicable

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.

Need help?
Call us on 131 242, then click here to start a Screen Sharing session
so we can help right away! Learn more