iso file download
ISO/IEC INTERNATIONAL STANDARD 18033-3 Second edition 2010-12-15 Information technology Security techniques Encryption algorithms - Part 3: Block ciphers Technologies de I'information - Techniques de sécurite-Algorithmes dechiffrement Partie 3: Chiffrement par blocs Reference number ISO/IEC 18033-3:2010(E) IEC ISO @ ISO/IEC 2010 py IHS under ted without license from IHS Not for Resale ISO/IEC 18033-3:2010(E) PDF disclaimer This PDF file may contain embedded typefaces. In accordance with Adobe's licensing policy, this file may be printed or viewed but shall not be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In accepts no liability in this area. Adobe is a trademark of Adobe Systems Incorporated. Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-creation parameters were optimized for printing. Every care has been taken to ensure that the file is suitable for use by Iso member bodies. In COPYRIGHTPROTECTEDDOCUMENT ISO/IEC2010 All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means, IsO's member body in the country of the requester. ISO copyright office Case postale 56. CH-1211 Geneva 20 Tel. + 41 22 749 01 11 Fax + 41 22 749 09 47 E-mail [email protected] Web www.iso.org Published in Switzerland @ ISO/IEC 2010 - All rights reserved py IHS unde I without license from IHS Not for Resale ISO/IEC 18033-3:2010(E) Contents Page Foreword 1 Scope.. 2 Termsanddefinitions 3 Symbols..... 4 4.1 Introduction.... 4.2 TDEA... 4.2.1 4.2.2 TDEA encryption/decryption.... 4.2.3 TDEA keying options.. 4.3 MISTY1 4.3.1 The MISTY1 algorithm... 4.3.2 MISTY1 encryption. 4.3.3 MISTY1 decryption. 4.3.4 MISTY1 functions ... 4.3.5 MISTY1 key schedule 4.4 CAST-128. 1 4.4.1 The CAST-128 algorithm. 4.4.2 CAST-128 encryption, 4.4.3 CAST-128 decryption 11 4.4.4 CAST-128 functions 4.4.5 CAST-128 key schedule 18 4.5 4.5.1 The HIGHT algorithm. 20 4.5.2 HIGHT encryption. 21 4.5.3 HIGHT decryption .. 4.5.4 HIGHT functions 23 4.5.5 HIGHT key schedule. 23 5 128-bit block ciphers... 24 5.1 Introduction.. 24 5.2 5.2.1 The AES algorithm 24 5.2.2 AES encryption... 24 5.2.3 AES decryption.... 25 5.2.4 AES transformations. 26 5.2.5 AES key schedule.. 30 5.3 Camellia.. 32 5.3.1 The Camellia algorithm. 32 5.3.2 Camellia encryption 32 5.3.3 Camellia decryption ... 34 5.3.4 Camellia functions.... 37 5.3.5 Camellia key schedule. ..43 5.4 SEED. 47 5.4.1 The SEED algorithm 47 5.4.2 SEED encryption 5.4.3 SEED decryption 5.4.4 SEED functions. 48 5.4.5 SEED key schedule. 50 Annex A (normative) Description of DES @ ISO/IEC 2010 All rights reserved ii Copyright International Organization for Standardization Not for Resale

.pdf文档 ISO IEC 18033-3 2010 Information technology — Security techniques — Encryption algorithms — Part 3 Block ciphers

文档预览
中文文档 87 页 50 下载 1000 浏览 0 评论 309 收藏 3.0分
温馨提示:本文档共87页,可预览 3 页,如浏览全部内容或当前文档出现乱码,可开通会员下载原始文档
ISO IEC 18033-3 2010 Information technology — Security techniques — Encryption algorithms — Part 3  Block ciphers 第 1 页 ISO IEC 18033-3 2010 Information technology — Security techniques — Encryption algorithms — Part 3  Block ciphers 第 2 页 ISO IEC 18033-3 2010 Information technology — Security techniques — Encryption algorithms — Part 3  Block ciphers 第 3 页
下载文档到电脑,方便使用
本文档由 人生无常 于 2024-08-31 16:04:38上传分享
站内资源均来自网友分享或网络收集整理,若无意中侵犯到您的权利,敬请联系我们微信(点击查看客服),我们将及时删除相关资源。