GM/T Translated English of Chinese Standard: GM/T CRYPTOGRAPHY INDUSTRY STANDARD

Size: px
Start display at page:

Download "GM/T Translated English of Chinese Standard: GM/T CRYPTOGRAPHY INDUSTRY STANDARD"

Transcription

1 Translated English of Chinese Standard: GM/T Buy True-PDF Auto-delivery. GM CRYPTOGRAPHY INDUSTRY STANDARD OF THE PEOPLE S REPUBLIC OF CHINA ICS L 80 File No.: GM/T Public key cryptographic algorithm SM2 based on elliptic curves - Part 5: Parameter definition SM2 椭圆曲线公钥密码算法第 5 部分 : 参数定义 GM/T How to BUY & immediately GET a full-copy of this standard? Search --> Add to Cart --> Checkout (3-steps); 3. No action is required - Full-copy of this standard will be automatically & immediately delivered to your address in 0~60 minutes. 4. Support: Sales@ChineseStandard.net. Wayne, Sales manager Issued on: March 21, 2012 Implemented on: March 21, 2012 Issued by: State Cryptography Administration Buy True-PDF Auto-delivery. Page 1 of 16

2 Table of Contents Foreword Scope Parameter definition... 4 Annex A (Informative) Example of digital signature and verification... 5 A.1 General requirements... 5 A.2 SM2 elliptic curve digital signature... 5 Annex B (Informative) Example of key exchange and verification... 8 B.1 General requirements... 8 B.2 SM2 elliptic curve key exchange protocol... 8 Annex C (Informative) Examples of message encryption and decryption C.1 General requirements C.2 SM2 message encryption and decryption of elliptic curves Buy True-PDF Auto-delivery. Page 2 of 16

3 Foreword GM/T Public key cryptographic algorithm SM2 based on elliptic curves is divided into 5 parts: Part 1: General; Part 2: Digital signature algorithm; Part 3: Key exchange protocol; Part 4: Public key encryption algorithm; Part 5: Parameter definition. This is Part 5 of GM/T This Part was drafted in accordance with the rules given in GB/T Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. The issuing authority shall not be held responsible for identifying any or all such patent rights. Annex A, Annex B and Annex C of this Part are informative. This Part was proposed by and shall be under the jurisdiction of State Cryptography Administration. Drafting organizations of this Part: Beijing Huada Information Safety Technology Co., Ltd, PLA Information Engineering University, Data Assurance and Communication Security Research Center of Chinese Academy of Sciences. Main drafters of this Part: Chen Jianhua, Zhu Yuefei, Ye Dingfeng, Hu Lei, Pei Dingyi, Peng Guohua, Zhang Yajuan, Zhang Zhenfeng. Buy True-PDF Auto-delivery. Page 3 of 16

4 Public key cryptographic algorithm SM2 based on elliptic curves - Part 5: Parameter definition 1 Scope This Part of GM/T 0003 specifies the curve parameters of the public key cryptographic algorithm SM2 based on elliptic curves, and gives the examples of digital signature and verification, key exchange and verification, message encryption and decryption. 2 Parameter definition SM2 adopts the elliptic curve over a 256-bit prime field. Elliptic curve equation: Curve parameters: Buy True-PDF Auto-delivery. Page 4 of 16

5 Annex A (Informative) Example of digital signature and verification A.1 General requirements This Annex adopts the cryptographic hash function given in GM/T SM3 cryptographic hash algorithm, the input of which is a message bit string less than 2 64 in length, and the output of which is a 256-bit hash value, denoted as. In this Annex, for all hexadecimal digits, the high-order digits are on the left, while the low-order digits are on the right. In this Annex, ASCII encoding is applied to the messages. SUPPOSE that the ASCII encoding of IDA is A.2 SM2 elliptic curve digital signature Elliptic curve equation: EXAMPLE: 256 Prime p: Coefficient a: Coefficient b: Base point,, the order of which is denoted as n. Coordinate : Coordinate : Order n: Message to be signed M: message digest The ASCII code of M is expressed in 6D Private key : Public key, : Buy True-PDF Auto-delivery. Page 5 of 16

--> Buy True-PDF --> Auto-delivered in 0~10 minutes. GM/T Translated English of Chinese Standard: GM/T0044.

--> Buy True-PDF --> Auto-delivered in 0~10 minutes. GM/T Translated English of Chinese Standard: GM/T0044. Translated English of Chinese Standard: GM/T0044.1-2016 www.chinesestandard.net Buy True-PDF Auto-delivery. Sales@ChineseStandard.net CRYPTOGRAPHY INDUSTRY STANDARD OF THE PEOPLE S REPUBLIC OF CHINA GM

More information

--> Buy True-PDF --> Auto-delivered in 0~10 minutes. GB/T

--> Buy True-PDF --> Auto-delivered in 0~10 minutes. GB/T Translated English of Chinese Standard: GB/T25000.51-2016 www.chinesestandard.net Buy True-PDF Auto-delivery. Sales@ChineseStandard.net ICS 35.080 L 77 NATIONAL STANDARD OF THE PEOPLE S REPUBLIC OF CHINA

More information

--> Buy True-PDF --> Auto-delivered in 0~10 minutes. GM/T Translated English of Chinese Standard: GM/T

--> Buy True-PDF --> Auto-delivered in 0~10 minutes. GM/T Translated English of Chinese Standard: GM/T Translated English of Chinese Standard: GM/T0012-2012 www.chinesestandard.net Buy True-PDF Auto-delivery. Sales@ChineseStandard.net CRYPTOGRAPHY INDUSTRY STANDARD OF THE PEOPLE S REPUBLIC OF CHINA GM ICS

More information

GB/T Translated English of Chinese Standard: GB/T NATIONAL STANDARD OF THE

GB/T Translated English of Chinese Standard: GB/T NATIONAL STANDARD OF THE Translated English of Chinese Standard: GB/T30038-2013 www.chinesestandard.net Buy True-PDF Auto-delivery. Sales@ChineseStandard.net GB NATIONAL STANDARD OF THE PEOPLE S REPUBLIC OF CHINA ICS 43.040.10

More information

GY/T Translated English of Chinese Standard: GY/T

GY/T Translated English of Chinese Standard: GY/T Translated English of Chinese Standard: GY/T268.2-2013 www.chinesestandard.net Sales@ChineseStandard.net GY RADIO, FILM AND TELEVISION INDUSTRY STANDARD OF THE PEOPLE'S REPUBLIC OF CHINA GY/T 268.2-2013

More information

GM/T Translated English of Chinese Standard: GM/T CRYPTOGRAPHY INDUSTRY STANDARD

GM/T Translated English of Chinese Standard: GM/T CRYPTOGRAPHY INDUSTRY STANDARD Translated English of Chinese Standard: GM/T0039-2015 www.chinesestandard.net Buy True-PDF Auto-delivery. Sales@ChineseStandard.net GM CRYPTOGRAPHY INDUSTRY STANDARD OF THE PEOPLE S REPUBLIC OF CHINA ICS

More information

JR/T Translated English of Chinese Standard: JR/T

JR/T Translated English of Chinese Standard: JR/T Translated English of Chinese Standard: JR/T0055.2-2009 www.chinesestandard.net Buy True-PDF Auto-delivery. Sales@ChineseStandard.net JR FINANCIAL INDUSTRY STANDARD OF THE PEOPLE S REPUBLIC OF CHINA ICS

More information

GB/T / IEC :2006

GB/T / IEC :2006 Translated English of Chinese Standard: GB/T14048.2-2008 www.chinesestandard.net Sales@ChineseStandard.net GB NATIONAL STANDARD OF THE PEOPLE S REPUBLIC OF CHINA ICS 29.120.40 K 31 GB/T 14048.2-2008 /

More information

Introduction to the Commercial Cryptography Scheme in China

Introduction to the Commercial Cryptography Scheme in China Introduction to the Commercial Cryptography Scheme in China Di Li Yan Liu di.li@atsec.com yan@atsec.com +86 138 1022 0119 +86 139 1072 6424 atsec China 18 May 2016 atsec information security, 2016 Disclaimer

More information

SM9 identity-based cryptographic algorithms Part 2: Digital signature algorithm

SM9 identity-based cryptographic algorithms Part 2: Digital signature algorithm SM9 identity-based cryptographic algorithms Part 2: Digital signature algorithm Contents 1 Scope... 1 2 Normative references... 1 3 Terms and definitions... 1 3.1 message... 1 3.2 signed message... 1 3.3

More information

Straight Cylindrical Involute Splines Metric Module, Side Fit Part 1: Generalities

Straight Cylindrical Involute Splines Metric Module, Side Fit Part 1: Generalities Translated English of Chinese Standard: GB/T3478.1-2008 www.chinesestandard.net Sales@ChineseStandard.net NATIONAL STANDARD OF THE PEOPLE S REPUBLIC OF CHINA GB ICS 21.120.30 J 18 Replacing GB/T 3478.1-1995

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 13157-2 First edition 2010-05-01 Information technology Telecommunications and information exchange between systems NFC Security Part 2: NFC-SEC cryptography standard using

More information

--> Buy True-PDF --> Auto-delivered in 0~10 minutes. GB/T Translated English of Chinese Standard: GB/T

--> Buy True-PDF --> Auto-delivered in 0~10 minutes. GB/T Translated English of Chinese Standard: GB/T Translated English of Chinese Standard: GB/T34658-2017 www.chinesestandard.net Buy True-PDF Auto-delivery. Sales@ChineseStandard.net NATIONAL STANDARD OF THE PEOPLE S REPUBLIC OF CHINA GB ICS 29.200 K

More information

GA Translated English of Chinese Standard: GA

GA Translated English of Chinese Standard: GA Translated English of Chinese Standard: GA1280-2015 www.chinesestandard.net Sales@ChineseStandard.net PUBLIC SECURITY INDUSTRY STANDARD GA OF THE PEOPLE S REPUBLIC OF CHINA GA 1280-2015 Security requirements

More information

Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing

Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing INTERNATIONAL STANDARD ISO/IEC 18367 First edition 2016-12-15 Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing Technologie de l information

More information

SM9 identity-based cryptographic algorithms Part 3: Key exchange protocol

SM9 identity-based cryptographic algorithms Part 3: Key exchange protocol SM9 identity-based cryptographic algorithms Part 3: Key exchange protocol Contents 1 Scope... 1 2 Normative references... 1 3 Terms and definitions... 1 3.1 key exchange... 1 3.2 key agreement... 1 3.3

More information

GB/T Translated English of Chinese Standard: GB/T NATIONAL STANDARD OF

GB/T Translated English of Chinese Standard: GB/T NATIONAL STANDARD OF Translated English of Chinese Standard: GB/T32960.3-2016 www.chinesestandard.net Sales@ChineseStandard.net GB NATIONAL STANDARD OF THE PEOPLE S REPUBLIC OF CHINA ICS 43.040.99 T 35 GB/T 32960.3-2016 Technical

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD This is a preview - click here to buy the full publication ISO/IEC 29192-4 First edition 2013-06-01 Information technology Security techniques Lightweight cryptography Part 4: Mechanisms

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 9797-1 Second edition 2011-03-01 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher Technologies de l'information

More information

JR/T Translated English of Chinese Standard: JR/T

JR/T Translated English of Chinese Standard: JR/T Translated English of Chinese Standard: JR/T0025.6-2013 www.chinesestandard.net Sales@ChineseStandard.net JR FINANCIAL INDUSTRY STANDARD OF THE PEOPLE S REPUBLIC OF CHINA ICS 35.240.40 A 11 Registration

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 15945 First edition 2002-02-01 Information technology Security techniques Specification of TTP services to support the application of digital signatures Technologies de l'information

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO/IEC 7816-15 Second edition 2016-05-15 Identification cards Integrated circuit cards Part 15: Cryptographic information application Cartes d identification Cartes à circuit intégré

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Lightweight cryptography Part 2: Block ciphers

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Lightweight cryptography Part 2: Block ciphers INTERNATIONAL STANDARD This is a preview - click here to buy the full publication ISO/IEC 29192-2 First edition 2012-01-15 Information technology Security techniques Lightweight cryptography Part 2: Block

More information

CNCA-C11-09:2014. Translated English of Chinese CCC Regulations: CNCA C11-09:2014. Translated by:

CNCA-C11-09:2014. Translated English of Chinese CCC Regulations: CNCA C11-09:2014. Translated by: Translated English of Chinese CCC Regulations: CNCA C11-09:2014 Translated by: www.chinesestandard.net Sales@ChineseStandard.net Wayne Zheng et al. CNCA / CCC Serial No.: CNCA-C11-09:2014 CNCA-C11-09-2014

More information

ISO/IEC TR TECHNICAL REPORT. Software engineering Mock up and prototype A categorization of software mock up and prototype models and their use

ISO/IEC TR TECHNICAL REPORT. Software engineering Mock up and prototype A categorization of software mock up and prototype models and their use This is a preview - click here to buy the full publication TECHNICAL REPORT ISO/IEC TR 14759 First edition 1999-12-01 Software engineering Mock up and prototype A categorization of software mock up and

More information

National Standard of The People s Republic of China

National Standard of The People s Republic of China Translated English of Chinese Standard: GB/T17626.5-2008 Translated by: www.chinesestandard.net Wayne Zheng et al. Email: Sales@ChineseStandard.net ICS 33.100 L 06 GB National Standard of The People s

More information

Message Authentication and Hash function 2

Message Authentication and Hash function 2 Message Authentication and Hash function 2 Concept and Example 1 SHA : Secure Hash Algorithm Four secure hash algorithms, SHA-11, SHA-256, SHA-384, and SHA-512. All four of the algorithms are iterative,

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Entity authentication

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Entity authentication INTERNATIONAL STANDARD ISO/IEC 9798-4 Second edition 1999-12-15 Information technology Security techniques Entity authentication Part 4: Mechanisms using a cryptographic check function Technologies de

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD This is a preview - click here to buy the full publication ISO/IEC 9797-3 First edition 2011-11-15 Information technology Security techniques Message Authentication Codes (MACs)

More information

Cryptographic Concepts

Cryptographic Concepts Outline Identify the different types of cryptography Learn about current cryptographic methods Chapter #23: Cryptography Understand how cryptography is applied for security Given a scenario, utilize general

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO/IEC 29192-2 First edition 2012-01-15 Information technology Security techniques Lightweight cryptography Part 2: Block ciphers Technologies de l'information Techniques de sécurité

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 9796-2 Third edition 2010-12-15 Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms

More information

The Application of Elliptic Curves Cryptography in Embedded Systems

The Application of Elliptic Curves Cryptography in Embedded Systems The Application of Elliptic Curves Cryptography in Embedded Systems Wang Qingxian School of Computer Science and Engineering University of Electronic Science and Technology China Introduction to Cryptography

More information

Other Topics in Cryptography. Truong Tuan Anh

Other Topics in Cryptography. Truong Tuan Anh Other Topics in Cryptography Truong Tuan Anh 2 Outline Public-key cryptosystem Cryptographic hash functions Signature schemes Public-Key Cryptography Truong Tuan Anh CSE-HCMUT 4 Outline Public-key cryptosystem

More information

CNCA / CCC Serial No.: CNCA-C11-04:2014

CNCA / CCC Serial No.: CNCA-C11-04:2014 Translated English of Chinese CCC Regulations: CNCA C11-04:2014 Translated by: www.chinesestandard.net Sales@ChineseStandard.net Wayne Zheng et al. CNCA / CCC Serial No.: CNCA-C11-04:2014 CNCA-C11-04-2014

More information

Information technology Security techniques Blind digital signatures. Part 1: General

Information technology Security techniques Blind digital signatures. Part 1: General INTERNATIONAL STANDARD ISO/IEC 18370-1 First edition 2016-11-15 Information technology Security techniques Blind digital signatures Part 1: General Technologie de l information Techniques de sécurité Signatures

More information

IEEE Std and IEEE Std 1363a Ashley Butterworth Apple Inc.

IEEE Std and IEEE Std 1363a Ashley Butterworth Apple Inc. apple IEEE Std 1363-2000 and IEEE Std 1363a-2004 Ashley Butterworth Apple Inc. The Titles IEEE Std 1363-2000 - IEEE Standard Specifications for Public-Key Cryptography IEED Std 1363a-2004 - IEEE Standard

More information

Information technology - Security techniques - Message Authentication Codes (MACs) - Part 1: Mechanisms using a block cipher

Information technology - Security techniques - Message Authentication Codes (MACs) - Part 1: Mechanisms using a block cipher INCITS/ISO/IEC 9797-1:2011[2014] (ISO/IEC 9797-1:2011, IDT) Information technology - Security techniques - Message Authentication Codes (MACs) - Part 1: Mechanisms using a block cipher INCITS/ISO/IEC 9797-1:2011[2014]

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Key management Part 4: Mechanisms based on weak secrets

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Key management Part 4: Mechanisms based on weak secrets INTERNATIONAL STANDARD ISO/IEC 11770-4 First edition 2006-05-01 Information technology Security techniques Key management Part 4: Mechanisms based on weak secrets Technologies de l'information Techniques

More information

Lecture III : Communication Security Mechanisms

Lecture III : Communication Security Mechanisms Lecture III : Communication Security Mechanisms Internet Security: Principles & Practices John K. Zao, PhD (Harvard) SMIEEE Computer Science Department, National Chiao Tung University 2 X.800 : Security

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Trusted Platform Module Part 1: Overview

ISO/IEC INTERNATIONAL STANDARD. Information technology Trusted Platform Module Part 1: Overview INTERNATIONAL STANDARD ISO/IEC 11889-1 First edition 2009-05-15 Information technology Trusted Platform Module Part 1: Overview Technologies de l'information Module de plate-forme de confiance Partie 1:

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 7816-2 Second edition 2007-10-15 Identification cards Integrated circuit cards Part 2: Cards with contacts Dimensions and location of the contacts Cartes d'identification

More information

GUIDE 63. Guide to the development and inclusion of safety aspects in International Standards for medical devices

GUIDE 63. Guide to the development and inclusion of safety aspects in International Standards for medical devices GUIDE 63 Guide to the development and inclusion of safety aspects in International Standards for medical devices Second edition 2012 ISO/IEC 2012 ISO/IEC GUIDE 63:2012(E) This is a preview - click here

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Hash-functions Part 2: Hash-functions using an n-bit block cipher

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Hash-functions Part 2: Hash-functions using an n-bit block cipher INTERNATIONAL STANDARD ISO/IEC 10118-2 Third edition 2010-10-15 Information technology Security techniques Hash-functions Part 2: Hash-functions using an n-bit block cipher Technologies de l'information

More information

On the Security of a Certificateless Public-Key Encryption

On the Security of a Certificateless Public-Key Encryption On the Security of a Certificateless Public-Key Encryption Zhenfeng Zhang, Dengguo Feng State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080,

More information

ISO/IEC Information technology Common Biometric Exchange Formats Framework Security block format specifications

ISO/IEC Information technology Common Biometric Exchange Formats Framework Security block format specifications INTERNATIONAL STANDARD ISO/IEC 19785-4 First edition 2010-08-15 Information technology Common Biometric Exchange Formats Framework Part 4: Security block format specifications Technologies de l'information

More information

Pretty Good Privacy (PGP

Pretty Good Privacy (PGP PGP - S/MIME - Internet Firewalls for Trusted System: Roles of Firewalls Firewall related terminology- Types of Firewalls - Firewall designs - SET for E-Commerce Transactions. Pretty Good Privacy (PGP

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 7816-2 Second edition 2007-10-15 Identification cards Integrated circuit cards Part 2: Cards with contacts Dimensions and location of the contacts Cartes d'identification

More information

ISO/IEC INTERNATIONAL STANDARD. Identification cards Integrated circuit card programming interfaces Part 2: Generic card interface

ISO/IEC INTERNATIONAL STANDARD. Identification cards Integrated circuit card programming interfaces Part 2: Generic card interface INTERNATIONAL STANDARD ISO/IEC 24727-2 First edition 2008-10-01 Identification cards Integrated circuit card programming interfaces Part 2: Generic card interface Cartes d'identification Interfaces programmables

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Biometric information protection

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Biometric information protection INTERNATIONAL STANDARD ISO/IEC 24745 First edition 2011-06-15 Information technology Security techniques Biometric information protection Technologies de l'information Techniques de sécurité Protection

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 9797-1 Second edition 2011-03-01 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher Technologies de l'information

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 14888-2 Second edition 2008-04-15 Information technology Security techniques Digital signatures with appendix Part 2: Integer factorization based mechanisms Technologies

More information

Part 5: Hash-functions

Part 5: Hash-functions INTERNATIONAL STANDARD ISO/IEC 29192-5 First edition 2016-08-01 Information technology Security techniques Lightweight cryptography Part 5: Hash-functions Technologies de l information Techniques de sécurité

More information

A FAST HANDSHAKE CACHING PROTOCOL WITH CACHING CENTER

A FAST HANDSHAKE CACHING PROTOCOL WITH CACHING CENTER INTERNATIONAL JOURNAL OF INFORMATION AND SYSTEMS SCIENCES Volume 1, Number 2, Pages 137 149 c 2005 Institute for Scientific Computing and Information A FAST HANDSHAKE CACHING PROTOCOL WITH CACHING CENTER

More information

Information technology Security techniques Cryptographic techniques based on elliptic curves. Part 1: General

Information technology Security techniques Cryptographic techniques based on elliptic curves. Part 1: General INTERNATIONAL STANDARD ISO/IEC 15946-1 Third edition 2016-07-01 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General Technologies de l information

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 7816-3 Third edition 2006-11-01 Identification cards Integrated circuit cards Part 3: Cards with contacts Electrical interface and transmission protocols Cartes d'identification

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 23009-4 First edition 2013-07-01 Information technology Dynamic adaptive streaming over HTTP (DASH) Part 4: Segment encryption and authentication Technologies de l'information

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Modes of operation for an n-bit block cipher

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Modes of operation for an n-bit block cipher INTERNATIONAL STANDARD ISO/IEC 10116 Third edition 2006-02-01 Information technology Security techniques Modes of operation for an n-bit block cipher Technologies de l'information Techniques de sécurité

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Trusted Platform Module Part 2: Design principles

ISO/IEC INTERNATIONAL STANDARD. Information technology Trusted Platform Module Part 2: Design principles INTERNATIONAL STANDARD ISO/IEC 11889-2 First edition 2009-05-15 Information technology Trusted Platform Module Part 2: Design principles Technologies de l'information Module de plate-forme de confiance

More information

ISO/IEC Identification cards Integrated circuit cards Part 12: Cards with contacts USB electrical interface and operating procedures

ISO/IEC Identification cards Integrated circuit cards Part 12: Cards with contacts USB electrical interface and operating procedures INTERNATIONAL STANDARD ISO/IEC 7816-12 First edition 2005-10-01 Identification cards Integrated circuit cards Part 12: Cards with contacts USB electrical interface and operating procedures Cartes d'identification

More information

This is a preview - click here to buy the full publication TECHNICAL REPORT

This is a preview - click here to buy the full publication TECHNICAL REPORT TECHNICAL REPORT ISO/IEC TR 14763-2 First edition 2000-07 Information technology Implementation and operation of customer premises cabling Part 2: Planning and installation ISO/IEC 2000 All rights reserved.

More information

NIST Cryptographic Toolkit

NIST Cryptographic Toolkit Cryptographic Toolkit Elaine Barker ebarker@nist.gov National InformationSystem Security Conference October 16, 2000 Toolkit Purpose The Cryptographic Toolkit will provide Federal agencies, and others

More information

Data Hiding on Text Using Big-5 Code

Data Hiding on Text Using Big-5 Code Data Hiding on Text Using Big-5 Code Jun-Chou Chuang 1 and Yu-Chen Hu 2 1 Department of Computer Science and Communication Engineering Providence University 200 Chung-Chi Rd., Shalu, Taichung 43301, Republic

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 18013-2 First edition 2008-05-15 Information technology Personal identification ISO-compliant driving licence Part 2: Machine-readable technologies Technologies de l'information

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 15426-1 Second edition 2006-06-01 Information technology Automatic identification and data capture techniques Bar code verifier conformance specification Part 1: Linear symbols

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology EAN/UCC Application Identifiers and Fact Data Identifiers and Maintenance

ISO/IEC INTERNATIONAL STANDARD. Information technology EAN/UCC Application Identifiers and Fact Data Identifiers and Maintenance INTERNATIONAL STANDARD ISO/IEC 15418 First edition 1999-12-01 Information technology EAN/UCC Application Identifiers and Fact Data Identifiers and Maintenance Technologies de l'information Identificateurs

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 9594-8 Sixth edition 2008-12-15 Information technology Open Systems Interconnection The Directory: Publickey and attribute certificate frameworks Technologies de l'information

More information

http://www.sis.se http://www.sis.se http://www.sis.se http://www.sis.se http://www.sis.se Provläsningsexemplar / Preview SVENSK STANDARD SS-ISO/IEC 14888-3:2006 Fastställd 2006-11-24 Utgåva 1 Informationsteknik

More information

Information technology - Security techniques - Lightweight cryptography - Part 2: Block ciphers

Information technology - Security techniques - Lightweight cryptography - Part 2: Block ciphers INCITS/ISO/IEC 29192-2:2012[2012] (ISO/IEC 29192-2:2012, IDT) Information technology - Security techniques - Lightweight cryptography - Part 2: Block ciphers INCITS/ISO/IEC 29192-2:2012[2012] PDF disclaimer

More information

ISO/TR TECHNICAL REPORT

ISO/TR TECHNICAL REPORT TECHNICAL REPORT ISO/TR 11548-2 First edition 2001-12-15 Communication aids for blind persons Identifiers, names and assignation to coded character sets for 8-dot Braille characters Part 2: Latin alphabet

More information

Cryptography and Network Security. Sixth Edition by William Stallings

Cryptography and Network Security. Sixth Edition by William Stallings Cryptography and Network Security Sixth Edition by William Stallings Chapter 13 Digital Signatures To guard against the baneful influence exerted by strangers is therefore an elementary dictate of savage

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 16388 First edition 1999-10-15 Information technology Automatic identification and data capture techniques Bar code symbology specifications Code 39 Technologies de l'information

More information

GB/T Translated English of Chinese Standard: GB/T NATIONAL STANDARD OF THE

GB/T Translated English of Chinese Standard: GB/T NATIONAL STANDARD OF THE Translated English of Chinese Standard: GB/T20278-2013 www.chinesestandard.net Sales@ChineseStandard.net GB NATIONAL STANDARD OF THE PEOPLE S REPUBLIC OF CHINA ICS 35.040 L 80 GB/T 20278-2013 Replacing

More information

ECC Elliptic Curve Cryptography. Foundations of Cryptography - ECC pp. 1 / 31

ECC Elliptic Curve Cryptography. Foundations of Cryptography - ECC pp. 1 / 31 ECC Elliptic Curve Cryptography Foundations of Cryptography - ECC pp. 1 / 31 Elliptic Curve an elliptic curve E is a smooth, projective, algebraic curve defined by the following equation: y 2 3 2 a xy

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD This is a preview - click here to buy the full publication ISO/IEC 9834-8 Second edition 2008-12-15 Information technology Open Systems Interconnection Procedures for the operation

More information

Standard Specifications for Public Key Cryptography: Identity Based Key Agreement Scheme (IBKAS)

Standard Specifications for Public Key Cryptography: Identity Based Key Agreement Scheme (IBKAS) IEEE P1363.3 Standard Specifications for Public Key Cryptography: Identity Based Key Agreement Scheme (IBKAS) Abstract. This document specifies pairing based, identity based, and authenticated key agreement

More information

JR/T Translated English of Chinese Standard: JR/T

JR/T Translated English of Chinese Standard: JR/T Translated English of Chinese Standard: JR/T0025.11-2013 www.chinesestandard.net Sales@ChineseStandard.net JR FINANCIAL INDUSTRY STANDARD OF THE PEOPLE S REPUBLIC OF CHINA ICS 35.240.40 A 11 Record number:

More information

Category: Informational September 2004

Category: Informational September 2004 Network Working Group R. Housley Request for Comments: 3874 Vigil Security Category: Informational September 2004 Status of this Memo A 224-bit One-way Hash Function: SHA-224 This memo provides information

More information

FIPS Security Policy

FIPS Security Policy FIPS 140-2 Security Policy BlackBerry Cryptographic Library Version 2.0.0.10 Document Version 1.2 BlackBerry Certifications, Research In Motion This document may be freely copied and distributed provided

More information

TC307 SG3 - SECURITY & PRIVACY

TC307 SG3 - SECURITY & PRIVACY TC307 SG3 - SECURITY & PRIVACY 6 layers of security 1. Cryptography 2. Blockchain protocol 3. Application 4. Privacy mechanisms 5. Implementation 6. Operation Security issues Cryptography Lots of understanding

More information

(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography

(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography Code No: RR410504 Set No. 1 1. Write short notes on (a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography 3. (a) Illustrate Diffie-hellman Key Exchange scheme for GF(P) [6M] (b) Consider

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO/IEC 18013-3 Second edition 2017-04 Information technology Personal identification ISO-compliant driving licence Part 3: Access control, authentication and integrity validation

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 11695-3 First edition 2008-11-01 Identification cards Optical memory cards Holographic recording method Part 3: Optical properties and characteristics Cartes d'identification

More information

Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms

Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of

More information

Elliptic Curve Public Key Cryptography

Elliptic Curve Public Key Cryptography Why? Elliptic Curve Public Key Cryptography ECC offers greater security for a given key size. Why? Elliptic Curve Public Key Cryptography ECC offers greater security for a given key size. The smaller key

More information

SSH PK Authentication and Auto login configuration for Chassis Management Controller

SSH PK Authentication and Auto login configuration for Chassis Management Controller SSH PK Authentication and Auto login configuration for Chassis Management Controller Dell technical white paper Dell Engineering May 2016 Author: Elangovan G Revisions Date August 2013 May 2016 Description

More information

ISO INTERNATIONAL STANDARD. Geographic information Simple feature access Part 1: Common architecture

ISO INTERNATIONAL STANDARD. Geographic information Simple feature access Part 1: Common architecture INTERNATIONAL STANDARD ISO 19125-1 First edition 2004-08-01 Corrected version 2004-11-01 Geographic information Simple feature access Part 1: Common architecture Information géographique Accès aux entités

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology MPEG extensible middleware (MXM) Part 3: MXM reference software

ISO/IEC INTERNATIONAL STANDARD. Information technology MPEG extensible middleware (MXM) Part 3: MXM reference software INTERNATIONAL STANDARD This is a preview - click here to buy the full publication ISO/IEC 23006-3 First edition 2011-02-01 Information technology MPEG extensible middleware (MXM) Part 3: MXM reference

More information

ISO INTERNATIONAL STANDARD. Digital cinema (D-cinema) operations Part 1: Key delivery message

ISO INTERNATIONAL STANDARD. Digital cinema (D-cinema) operations Part 1: Key delivery message Provläsningsexemplar / Preview INTERNATIONAL STANDARD ISO 26430-1 First edition 2008-07-15 Digital cinema (D-cinema) operations Part 1: Key delivery message Opérations du cinéma numérique (cinéma D) Partie

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 9594-8 Fifth edition 2005-12-15 Information technology Open Systems Interconnection The Directory: Publickey and attribute certificate frameworks Technologies de l'information

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Encryption algorithms Part 4: Stream ciphers

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Encryption algorithms Part 4: Stream ciphers INTERNATIONAL STANDARD ISO/IEC 18033-4 First edition 2005-07-15 Information technology Security techniques Encryption algorithms Part 4: Stream ciphers Technologies de l'information Techniques de sécurité

More information

ISO INTERNATIONAL STANDARD

ISO INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO 12006-3 First edition 2007-04-15 Building construction Organization of information about construction works Part 3: Framework for object-oriented information Construction immobilière

More information

Intelligent Terminal System Based on Trusted Platform Module

Intelligent Terminal System Based on Trusted Platform Module American Journal of Mobile Systems, Applications and Services Vol. 4, No. 3, 2018, pp. 13-18 http://www.aiscience.org/journal/ajmsas ISSN: 2471-7282 (Print); ISSN: 2471-7290 (Online) Intelligent Terminal

More information

INTERNATIONAL STANDARD

INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO 8655-2 First edition 2002-09-15 Piston-operated volumetric apparatus Part 2: Piston pipettes Appareils volumétriques à piston Partie 2: Pipettes à piston Reference number ISO

More information

ISO INTERNATIONAL STANDARD

ISO INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO 20765-1 First edition 2005-09-15 Natural gas Calculation of thermodynamic properties Part 1: Gas phase properties for transmission and distribution applications Gaz naturel Calcul

More information