Information Technology - Security Techniques - Prime Number Generation (Adopted ISO/IEC 18032:2005, first edition, 2005-01-15)
Formats Available:
Online,Print
Receive a printed paperback book
Shipped via Canada Post
Receive a printed binder(s)
Shipped via Canada Post
Receive a printed hardcover book
Shipped via Canada Post
Receive access to an electronic copy viewable in a web browser or the Orderline Reader app (Click here to view a demo)
Orderline Reader app available for Windows, Mac, Android, and iOS (Click here to download)
Offline access via Orderline Reader app
Reflowable layout suitable for viewing on any device Orderline Reader app
Font-size controls
Text to speech
Built-in search feature
Google and Wikipedia lookup
Ability to add custom highlights, bookmarks, and notes
Can be registered on up to 3 personal devices total (example: computer, laptop, phone)
Receive access to an online PDF copy viewable in a web browser
Offline access via bookmark to a cached web page
Single user access on up to 3 devices
All online copies are watermarked with your license information
Receive access to an online course viewable in a web browser
Receive access to an online course viewable in a web browser
Receive access to an interactive online copy viewable in a web browser (Click here to view a demo)
Searchable
Printable
Expandable images
Drop-down definitions
Links
Receive access to an online webinar hosted through Zoom
Product Overview
CAN/CSA-ISO/IEC 18032-06 (R2016)
CSA Group
Information Technology - Security Techniques - Prime Number Generation (Adopted ISO/IEC 18032:2005, first edition, 2005-01-15)
Total
As low as$122.00
More About This Product
Description
Scope This International Standard specifies methods for generating and testing prime numbers as required in cryptographic protocols and algorithms. Firstly, this International Standard specifies methods for testing whether a given number is prime. The testing methods included in this International Standard can be divided into two groups: - Probabilistic primality tests, which have a small error probability. All probabilistic tests described here may declare a composite to be a prime. One test described here may declare a prime to be composite. - Deterministic methods, which are guaranteed to give the right verdict. These methods use so-called primality certificates. Secondly, this International Standard specifies methods to generate prime numbers. Again, both probabilistic and deterministic methods are presented. Note - Readers with a background in algorithm theory may have had previous encounters with probabilistic and deterministic algorithms. We stress that the deterministic methods in this International Standard internally still make use of random bits, and "deterministic" only refers to the fact that the output is correct with probability one. Annex B describes variants of the methods for generating primes so that particular cryptographic requirements can be met. The methods for generating, proving and verifying primality defined by this International Standard are applicable to cryptographic systems based on the properties of the primes. Note - The specifications of the tests given in this International Standard define the properties to be tested in the simplest possible form. Following these specifications directly will not necessarily produce the most efficient implementations. This is especially the case for the Frobenius-Grantham test.
Scope This International Standard specifies methods for generating and testing prime numbers as required in cryptographic protocols and algorithms. Firstly, this International Standard specifies methods for testing whether a given number is prime. The testing methods included in this International Standard can be divided into two groups: - Probabilistic primality tests, which have a small error probability. All probabilistic tests described here may declare a composite to be a prime. One test described here may declare a prime to be composite. - Deterministic methods, which are guaranteed to give the right verdict. These methods use so-called primality certificates. Secondly, this International Standard specifies methods to generate prime numbers. Again, both probabilistic and deterministic methods are presented. Note - Readers with a background in algorithm theory may have had previous encounters with probabilistic and deterministic algorithms. We stress that the deterministic methods in this International Standard internally still make use of random bits, and "deterministic" only refers to the fact that the output is correct with probability one. Annex B describes variants of the methods for generating primes so that particular cryptographic requirements can be met. The methods for generating, proving and verifying primality defined by this International Standard are applicable to cryptographic systems based on the properties of the primes. Note - The specifications of the tests given in this International Standard define the properties to be tested in the simplest possible form. Following these specifications directly will not necessarily produce the most efficient implementations. This is especially the case for the Frobenius-Grantham test.