ISO IEC 19772 CORR 1-2014 Information technology - Security techniques - Authenticated encryption Technical Corrigendum 1《信息技术 安全技术 验证加密术 技术勘误1》.pdf

上传人:terrorscript155 文档编号:1257001 上传时间:2019-09-02 格式:PDF 页数:3 大小:511KB
下载 相关 举报
ISO IEC 19772 CORR 1-2014 Information technology - Security techniques - Authenticated encryption Technical Corrigendum 1《信息技术 安全技术 验证加密术 技术勘误1》.pdf_第1页
第1页 / 共3页
ISO IEC 19772 CORR 1-2014 Information technology - Security techniques - Authenticated encryption Technical Corrigendum 1《信息技术 安全技术 验证加密术 技术勘误1》.pdf_第2页
第2页 / 共3页
ISO IEC 19772 CORR 1-2014 Information technology - Security techniques - Authenticated encryption Technical Corrigendum 1《信息技术 安全技术 验证加密术 技术勘误1》.pdf_第3页
第3页 / 共3页
亲,该文档总共3页,全部预览完了,如果喜欢就下载吧!
资源描述

1、 INTERNATIONAL STANDARD ISO/IEC 19772:2009 TECHNICAL CORRIGENDUM 1 Published 2014-09-01 INTERNATIONAL ORGANIZATION FOR STANDARDIZATION ORGANISATION INTERNATIONALE DE NORMALISATION INTERNATIONAL ELECTROTECHNICAL COMMISSION COMMISSION LECTROTECHNIQUE INTERNATIONALEInformation technology Security techn

2、iques Authenticated encryption TECHNICAL CORRIGENDUM 1 Technologies de linformation Techniques de scurit Chiffrage authentifi RECTIFICATIF TECHNIQUE 1 Technical Corrigendum # to ISO/IEC 19772:2009 was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology. A) Page 15, Clause 10.

3、2 Replace the definition of with the following text: The decryption function, i.e. a function which takes as input a block cipher key K 1 , a Starting Variable S, and an encrypted data string C and, using the selected mode of operation, outputs a decrypted data string: the output is written ) ( , 1

4、C S K . Replace the definition of with the following text: The encryption function, i.e. a function which takes as input a block cipher key K 1 , a Starting Variable S, and a data string D and, using the selected mode of operation, outputs an encrypted data string: the output is written ) ( , 1 D S

5、K . B) Page 16, Clause 10.4 Replace steps a), b) and c) with the following: a) A Starting Variable S appropriate for use with the selected block cipher mode of operation shall be selected. This variable shall be statistically distinct for every message to be protected under a given key, and must be

6、made available to the recipient of the message. Further possible requirements for S are as described in the appropriate clauses of ISO/IEC 10116, and further guidance is provided in A.7. ICS 35.040 Ref. No. ISO/IEC 19772:2009/Cor.1:2014(E) ISO/IEC 2014 All rights reserved Published in Switzerland IS

7、O/IEC 19772:2009/Cor.1:2014(E) 2 ISO/IEC 2014 All rights reservedNOTE If the Starting Variable is chosen uniformly at random from the space of all possible Starting Variables (as is strongly recommended see Annex A.7), and the number of messages encrypted using a single key is bounded appropriately,

8、 then the use of distinct Starting Variables is overwhelmingly likely, i.e. the Starting Variables can be regarded as statistically distinct. b) Let C = ) ( , 1 D S K , using the Starting Variable S. c) Let T = ) | ( 2 C S . f K Replace the last line of 10.4 with the following: C = C | T, together w

9、ith the Starting Variable S. C) Page 16, Clause 10.5 In the first line, replace string C with: string C, with accompanying Starting Variable S Replace step c) with the following: c) Let T = ) | ( 2 C S f K Replace step e) with the following: e) Let D = ) ( , 1 C S K , using the Starting Variable S.

10、D) Page 17, Clause 11.2 In the definition of G, replace 11.4 with 11.5. E) Page 19, Clause 11.6 Replace step h) with the following: h) Let T = (G(H, A, C 1 |C 2 |.|C m ) e K (Y 0 )| t . F) Page 19, Clause 11.7 Replace step e) with the following: e) Let T = (G(H, A, C 1 |C 2 |.|C m ) e K (Y 0 )| t .

11、G) Page 22, Annex A.7 Add the following two paragraphs after the existing text: Regardless of the mode of encryption chosen, use of a Starting Variable chosen uniformly at random from the set of possible Starting Variables is strongly recommended. If this recommendation is not followed then the resu

12、lt of Bellare and Namprempre (referred to in the note in 10.1) will not apply. Moreover, in some circumstances attacks may be possible. In this connection note that, for CBC mode, Annex B.2.1 of ISO/IEC 10116 states that A randomly chosen statistically unique Starting Variable is recommended. ISO/IE

13、C 19772:2009/Cor.1:2014(E) ISO/IEC 2014 All rights reserved 3The choice of MAC technique should take into account the context of use of the authenticated encryption technique, and the advice provided in ISO/IEC 9797 should be carefully followed. In particular, if a block cipher based MAC from ISO/IEC 9797-1 is chosen, then: (a) MAC algorithm 1 should only be used if the message length is fixed, and (b) Padding Method 1 should only be used if the message length is fixed.

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 标准规范 > 国际标准 > 其他

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1