Information Technology - Security Techniques - Encryption Algorithms - Part 2: Asymmetric Ciphers (Adopted ISO/IEC 18033-2:2006, first edition, 2006-05-01)
Formats Available:
Online,Print
Receive a printed paperback book
Shipped via Canada Post
Receive a printed binder(s)
Shipped via Canada Post
Receive a printed hardcover book
Shipped via Canada Post
Receive access to an electronic copy viewable in a web browser or the Orderline Reader app (Click here to view a demo)
Orderline Reader app available for Windows, Mac, Android, and iOS (Click here to download)
Offline access via Orderline Reader app
Reflowable layout suitable for viewing on any device Orderline Reader app
Font-size controls
Text to speech
Built-in search feature
Google and Wikipedia lookup
Ability to add custom highlights, bookmarks, and notes
Can be registered on up to 3 personal devices total (example: computer, laptop, phone)
Receive access to an online PDF copy viewable in a web browser
Offline access via bookmark to a cached web page
Single user access on up to 3 devices
All online copies are watermarked with your license information
Receive access to an online course viewable in a web browser
Receive access to an online course viewable in a web browser
Receive access to an interactive online copy viewable in a web browser (Click here to view a demo)
Searchable
Printable
Expandable images
Drop-down definitions
Links
Receive access to an online webinar hosted through Zoom
Product Overview
CAN/CSA-ISO/IEC 18033-2-06 (R2016)
CSA Group
Information Technology - Security Techniques - Encryption Algorithms - Part 2: Asymmetric Ciphers (Adopted ISO/IEC 18033-2:2006, first edition, 2006-05-01)
Total
As low as$281.00
More About This Product
Description
Scope This part of ISO/IEC 18033 specifies several asymmetric ciphers. These specifications prescribe the functional interfaces and correct methods of use of such ciphers in general, as well as the precise functionality and cipher text format for several specific asymmetric ciphers (although conforming systems may choose to use alternative formats for storing and transmitting cipher-texts). A normative annex (Annex A) gives ASN.1 syntax for object identifiers, public keys, and parameter structures to be associated with the algorithms specified in this part of ISO/IEC 18033. However, these specifications do not prescribe protocols for reliably obtaining a public key, for proof of possession of a private key, or for validation of either public or private keys; see ISO/IEC 11770-3 for guidance on such key management issues. The asymmetric ciphers that are specified in this part of ISO/IEC 18033 are indicated in Clause 7.6. NOTE Briefly, the asymmetric ciphers are: - ECIES-HC; PSEC-HC; ACE-HC: generic hybrid ciphers based on ElGamal encryption; - RSA-HC: a generic hybrid cipher based on the RSA transform; - RSAES: the OAEP padding scheme applied to the RSA transform; - HIME(R): a scheme based on the hardness of factoring.
Scope This part of ISO/IEC 18033 specifies several asymmetric ciphers. These specifications prescribe the functional interfaces and correct methods of use of such ciphers in general, as well as the precise functionality and cipher text format for several specific asymmetric ciphers (although conforming systems may choose to use alternative formats for storing and transmitting cipher-texts). A normative annex (Annex A) gives ASN.1 syntax for object identifiers, public keys, and parameter structures to be associated with the algorithms specified in this part of ISO/IEC 18033. However, these specifications do not prescribe protocols for reliably obtaining a public key, for proof of possession of a private key, or for validation of either public or private keys; see ISO/IEC 11770-3 for guidance on such key management issues. The asymmetric ciphers that are specified in this part of ISO/IEC 18033 are indicated in Clause 7.6. NOTE Briefly, the asymmetric ciphers are: - ECIES-HC; PSEC-HC; ACE-HC: generic hybrid ciphers based on ElGamal encryption; - RSA-HC: a generic hybrid cipher based on the RSA transform; - RSAES: the OAEP padding scheme applied to the RSA transform; - HIME(R): a scheme based on the hardness of factoring.