• There are no items in your cart

CAN/CSA-ISO/IEC 18031:13 (R2017)

Current
Current

The latest, up-to-date edition.

Information technology - Security techniques - Random bit generation (Adopted ISO/IEC 18031:2011, second edition, 2011-11-15)
Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

01-01-2013

Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols
5 Properties and requirements of an RBG
6 RBG model
7 Types of RBGs
8 Overview and requirements for an NRBG
9 Overview and requirements for a DRBG
Annex A (normative) - Combining RBGs
Annex B (normative) - Conversion methods
Annex C (normative) - DRBGs
Annex D (normative) - Application specific constants
Annex E (informative) - NRBG examples
Annex F (informative) - Security considerations
Annex G (informative) - Discussion on the estimation
        of entropy
Annex H (informative) - RBG assurance
Annex I (informative) - RBG boundaries
Annex J (informative) - Rationale for the design of
        statistical tests
Bibliography

Defines a conceptual model for a random bit generator for cryptographic purposes, together with the elements of this model.

CSA Preface Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the Canadian Advisory Committee (CAC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T). This Standard supersedes CAN/CSA-ISO/IEC 18031-06 (adoption of ISO/IEC 18031:2005). At the time of publication, ISO/IEC 18031:2011 is available from ISO and IEC in English only. CSA Group will publish the French version when it becomes available from ISO and IEC. Scope This International Standard specifies a conceptual model for a random bit generator for cryptographic purposes, together with the elements of this model. This International Standard - specifies the characteristics of the main elements required for a non-deterministic random bit generator - specifies the characteristics of the main elements required for a deterministic random bit generator - establishes the security requirements for both the non-deterministic and the deterministic random bit generator. Where there is a requirement to produce sequences of random numbers from random bit strings, Annex B gives guidelines on how this can be performed. Techniques for statistical testing of random bit generators for the purposes of independent verification or validation, and detailed designs for such generators, are outside the scope of this International Standard.

DocumentType
Standard
ISBN
978-1-77139-111-5
Pages
162
ProductNote
Reconfirmed EN
PublisherName
Canadian Standards Association
Status
Current
Supersedes

Standards Relationship
ISO/IEC 18031:2011 Identical

ISO/IEC 18033-1:2015 Information technology Security techniques Encryption algorithms Part 1: General
ISO/IEC 18032:2005 Information technology Security techniques Prime number generation
ANSI X9.82-2 : 2015 RANDOM NUMBER GENERATION - PART 2: ENTROPY SOURCES
ISO/IEC 18033-3:2010 Information technology Security techniques Encryption algorithms Part 3: Block ciphers
ISO/IEC 19790:2012 Information technology Security techniques Security requirements for cryptographic modules
ISO/IEC 10118-1:2016 Information technology Security techniques Hash-functions Part 1: General
ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
ANSI X9.82-3 : 2007(R2017) RANDOM NUMBER GENERATION - PART 3: DETERMINISTIC RANDOM BIT GENERATORS
ISO/IEC 9797-2:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function
ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
ANSI X9.82-1 : 2006(R2013) RANDOM NUMBER GENERATION - PART 1: OVERVIEW AND BASIC PRINCIPLES
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques

View more information
US$231.00
Excluding Tax where applicable

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.