ISO/IEC INTERNATIONAL STANDARD 18033-3 Second edition 2010-12-15 Information technology Security techniques Encryption algorithms - Part 3: Block ciphers Technologies de I'information - Techniques de sécurite-Algorithmes dechiffrement Partie 3: Chiffrement par blocs Reference number ISO/IEC 18033-3:2010(E) IEC ISO @ ISO/IEC 2010 py IHS under ted without license from IHS Not for Resale ISO/IEC 18033-3:2010(E) PDF disclaimer This PDF file may contain embedded typefaces. In accordance with Adobe's licensing policy, this file may be printed or viewed but shall not be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In accepts no liability in this area. Adobe is a trademark of Adobe Systems Incorporated. Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-creation parameters were optimized for printing. Every care has been taken to ensure that the file is suitable for use by Iso member bodies. In COPYRIGHTPROTECTEDDOCUMENT ISO/IEC2010 All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means, IsO's member body in the country of the requester. ISO copyright office Case postale 56. CH-1211 Geneva 20 Tel. + 41 22 749 01 11 Fax + 41 22 749 09 47 E-mail [email protected] Web www.iso.org Published in Switzerland @ ISO/IEC 2010 - All rights reserved py IHS unde I without license from IHS Not for Resale ISO/IEC 18033-3:2010(E) Contents Page Foreword 1 Scope.. 2 Termsanddefinitions 3 Symbols..... 4 4.1 Introduction.... 4.2 TDEA... 4.2.1 4.2.2 TDEA encryption/decryption.... 4.2.3 TDEA keying options.. 4.3 MISTY1 4.3.1 The MISTY1 algorithm... 4.3.2 MISTY1 encryption. 4.3.3 MISTY1 decryption. 4.3.4 MISTY1 functions ... 4.3.5 MISTY1 key schedule 4.4 CAST-128. 1 4.4.1 The CAST-128 algorithm. 4.4.2 CAST-128 encryption, 4.4.3 CAST-128 decryption 11 4.4.4 CAST-128 functions 4.4.5 CAST-128 key schedule 18 4.5 4.5.1 The HIGHT algorithm. 20 4.5.2 HIGHT encryption. 21 4.5.3 HIGHT decryption .. 4.5.4 HIGHT functions 23 4.5.5 HIGHT key schedule. 23 5 128-bit block ciphers... 24 5.1 Introduction.. 24 5.2 5.2.1 The AES algorithm 24 5.2.2 AES encryption... 24 5.2.3 AES decryption.... 25 5.2.4 AES transformations. 26 5.2.5 AES key schedule.. 30 5.3 Camellia.. 32 5.3.1 The Camellia algorithm. 32 5.3.2 Camellia encryption 32 5.3.3 Camellia decryption ... 34 5.3.4 Camellia functions.... 37 5.3.5 Camellia key schedule. ..43 5.4 SEED. 47 5.4.1 The SEED algorithm 47 5.4.2 SEED encryption 5.4.3 SEED decryption 5.4.4 SEED functions. 48 5.4.5 SEED key schedule. 50 Annex A (normative) Description of DES @ ISO/IEC 2010 All rights reserved ii Copyright International Organization for Standardization Not for Resale
ISO IEC 18033-3 2010 Information technology — Security techniques — Encryption algorithms — Part 3 Block ciphers