å ! Ð - bureau of indian standards10695-10709)_03102016.pdf · conformity assessment --...
TRANSCRIPT
यापक परिचालन मसौदा रलख रषण सञापन
सदभ ददन क
तकनीकी सममतत : एलआईटीडी 17
एलआईटीडी 17/टी- 81 स 106 05 Sep 2016
पान वाल का नाम: 1) सचन रण ली सरष एव ब य मदिक ववषय सममति ,एलीटईीलए 17
2) इलि तनकी एव सचन र य गिकी वव ि पररषद एलीटईीलएसए क रध न सदय
3) अय गच रखन व ल
मह दय(य)
कपय सलनक म सलन रलख क अवल कन कर:
कपय इन मस द क अवल कन कर और अपनए समतिय , यह बि ि हए कक यदद यह रिएय म नक रक मिि ह ि अमल करन म ीप क यवस य म य कदिन टय ी सकिए ह, ज ।
समतिय जन की अतिम तिगि 04-11-2016
यदद क ट समति र ि नही ह िए य समति सप दकीय रकति की ह िए ह ि कपय यि अन िम हि उपर ि मस द क
मलए ीपक अनम दन म न लन की अनमिए द । िि वप, यदद ीपकी समति की रकति िकनएकी ह ि यदद चयरमन ववषय
सममति व र ऐस रहन व तिि ह ि इस ीि की ीवयक क रभव ट क मलए चयरमन ववषय सममति क प स पर मिभ हि
य ववषय सममति क प स अवल क िभ करक अन िम ककय ज एि । यह मस द ीटटसए म नक क अनस र सबध ह िि इस पर क स ि सलन नही ह । ीटटसए म नक क ब द मस द पर ववच र िभ अवल कन ककय ज ए ।
यदद ीटटसए म नक की स ई रति अपषषि ह ि मल व र अनर ध ज ज ए ।
यदद क ट समतिय क ऊपर तनममभि ह ि कपय अध हि षरी क तननमलखखि पि पर सलन फ मई म ज द ।
धयव द,
वदीय,
(रीन ििभ)
रमख (इलि तनकी व ीट ईी) सलनक : उपर ि ट मल: [email protected], [email protected]
टमलफस: 01123237093
सलनक
र.स. रलख स. शीषक
1 एलीटईीलए 17(10695) अन पि मलय कन तनक य क रम खणि उप द की अपष ए
2 एलीटईीलए 17(10696) सचन र ध गिकी - सरष िकनएक - तनजि परख 3 एलीटईीलए 17(10697) सचन र ध गिकी - सरष िकनएक - तनजि मिलपक री
परख 4 एलीटईीलए 17(10698) सचन र ध गिकी - सरष िकनएक - ल इवई किई र फी –
ि 1: स म य 5 एलीटईीलए 17(10699) सचन र ध गिकी - सरष िकनएक - ल इवई किई र फी –
ि 2 : ल क मसफर 6 एलीटईीलए 17(10700) सचन र ध गिकी - सरष िकनएक - ल इवई किई र फी –
ि 3: िीम मसफर 7 एलीटईीलए 17(10701) सचन र ध गिकी - सरष िकनएक - ल इवई किई र फी –
ि 4: असमममि िकनएक क रय ि स यरववय स 8 एलीटईीलए 17(10702) सचन र ध गिकी - सरष िकनएक - अल क र वि पर
ीध ररि किई र कफक िकनएक – ि 1: स म य
9 एलीटईीलए 17(10703) सचन र ध गिकी - सरष िकनएक - एकििन दिमलव रण ली ि 2 : असमममि मसफर
10 एलीटईीलए 17(10704) सचन र ध गिकी - सरष िकनएक - एकििन दिमलव रण ली ि 1: स म य
11 एलीटईीलए 17(10705) सचन र ध गिकी - सरष िकनएक - एकििन दिमलव रण ली ि 3: ल क मसफर
12 एलीटईीलए 17(10706) सचन र ध गिकी - सरष िकनएक - ई इम ईपि सव ए - ि 1 : परख
13 एलीटईीलए 17(10707) सचन र ध गिकी - सरष िकनएक - ि 2 : विर ई कन उप ददि करन क िर
14 एलीटईीलए 17(10708) सचन र ध गिकी - सरष िकनएक - ि 3 : मल ल ई कन उप ददि करन क िर
15 एलीटईीलए 17(10709) सचन र ध गिकी - सरष िकनएक - रलम बएई जनरिन
DRAFT IN
WIDE CIRCULATION Document Dispatch Advice
Technical Committee: LITD 17 Ref Date
LITD17/T- 61 To 95
05-09-2016
ADDRESSED TO: 1. All Members of Information Systems Security Sectional Committee, LITD 17
2. All Principal Members of Electronics and Information Technology Division Council (LITDC)
3. All others interested
Dear Madam/Sir(s),
Please find enclosed draft Indian Standards given in Annex:
Kindly examine these draft standards and forward your views stating any difficulties, which you are likely
to experience in your business or profession, if this is finally adopted as National Standards.
Last Date for comments: 04/11/2016
Comments if any, may please be made in the format indicated and mailed to the undersigned t the above
address. In case no comments are received or comments received are of editorial nature. You will kindly
permit us to presume your approval for the above document as finalized. However, in case of comments
of technical in nature are received then it may be finalized either in consultation with the Chairman,
Sectional Committee or referred to the Sectional committee for further necessary action if so desired by
the Chairman, Sectional Committee.
This document is identical with corresponding IEC Standard and is not attached with this letter. For
considering comments on the document corresponding IEC Standard may be referred. In case of soft copy
of IEC standard is required, a request may be sent by mail.
Thanking you,
Yours faithfully,
(Reena Garg )
Head (Electronics & IT)
Annex
Sl.
No
.
Document No/IS No. Title
1 Doc No.: LITD 17 (10695)
/ISO /IEC17065 : 2012
Conformity assessment -- Requirements for bodies certifying products,
2 Doc No.: LITD 17 (10696)
/ISO/IEC 29100:2011
Information technology -- Security techniques -- Privacy framework
3 Doc No.: LITD 17 (10697)
/ISO/IEC 29101:2013
Information technology -- Security techniques -- Privacy architecture
framework
4 Doc No.: LITD 17 (10698)
/ISO/IEC 29192-1:2012
Information technology -- Security techniques -- Lightweight
cryptography -- Part 1: General
5 Doc No.: LITD 17 (10699)
/ISO/IEC 29192-2:2012
Information technology -- Security techniques -- Lightweight
cryptography -- Part 2: Block ciphers
6 Doc No.: LITD 17 (10700)
/ISO/IEC 29192-3:2012
Information technology -- Security techniques -- Lightweight
cryptography -- Part 3: Stream ciphers
7 Doc No.: LITD 17 (10701)
/ISO/IEC 29192-4:2013
Information technology -- Security techniques -- Lightweight
cryptography -- Part 4: Mechanisms using asymmetric techniques
8 Doc No.: LITD 17 (10702)
/ISO/IEC 15946-1:2016
Information technology -- Security techniques -- Cryptographic techniques
based on elliptic curves –Part 1: General
9 Doc No.: LITD 17 (10703)
/ISO/IEC 18033-2:2006
Information technology -- Security techniques -- Encryption algorithms --
Part 2: Asymmetric ciphers
10
Doc No.: LITD 17 (10704)
/ISO/IEC 18033-1:2005
Information technology -- Security techniques -- Encryption algorithms --
Part 1: General
11 Doc No.: LITD 17 (10705)
/ISO/IEC 18033-3:2010
Information technology -- Security techniques -- Encryption algorithms --
Part 3: Block ciphers
12 Doc No.: LITD 17 (10706)
/ISO/IEC 18014-1:2008
Information technology -- Security techniques -- Time-stamping services -
- Part 1: Framework
13 Doc No.: LITD 17 (10707)
/ISO/IEC 18014-2:2009
Information technology -- Security techniques -- Time-stamping services -
- Part 2: Mechanisms producing independent tokens.
14 Doc No.: LITD 17 (10708)
/ISO/IEC 18014-3:2009
Information technology -- Security techniques -- Time-stamping services -
- Part 3: Mechanisms producing linked tokens
15 Doc No.: LITD 17 (10709)
/ISO/IEC 18031:2011
Information technology -- Security techniques -- Random bit generation
Doc No.: LITD 17 (10695) /ISO/IEC 17065: 2012
भारतीय मानक
अन पता मलयाकन — ननकाय क रमाणित उपाद की अपषाए
Indian Standard
CONFORMITY ASSESSMENT — REQUIREMENTS FOR BODIES CERTIFYING
PRODUCTS
ICS 03.120.20
BIS 2016
BUREAU OF INDIAN STANDARDS MANAK BHAVAN, 9 BAHADUR SHAH ZAFAR MARG
NEW DELHI 110002
Sep 2016 Price Group
Information Systems Security and Biometrics Sectional Committee, LITD 17
NATIONAL FOREWORD
This Indian Standard which is identical with ISO/IEC 17065 : 2012 ‘Conformity assessment —
Requirements for bodies certifying products’ issued by the International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC) jointly was
adopted by the Bureau of Indian Standards on the recommendations of the Information
Systems Security and Biometrics Sectional Committee and approval of the Electronics and
Information Technology Division Council.
The text of ISO/IEC Standard has been approved as suitable for publication as an Indian
Standard without deviations. Certain conventions are however not identical to those used in
Indian Standards. Attention is particularly drawn to the following:
a) Wherever the words ‘International Standard’ appear referring to this standard, they should be read as ‘Indian Standard’.
b) Comma (,) has been used as a decimal marker while in Indian Standards, the current
practice is to use a point (.) as the decimal marker.
In this adopted standard, reference appears to certain International Standards for which Indian
Standards also exist. The corresponding Indian Standards, which are to be substituted in their
places are, listed below along with their degree of equivalence for the editions indicated:
International Standard Corresponding Indian Standard Degree of
Equivalence
ISO/IEC 17000, Conformity
assessment — Vocabulary and general
principles
lS/lSO/lEC 17000:2004
Conformity assessment — Vocabulary
and generaI principles
Identical
ISO/IEC 17020, Conformity
assessment — Requirements for the
operation of various types of bodies
performing inspection
IS/ISO/IEC 17020, Conformity
assessment — Requirements for the
operation of various types of bodies
performing inspection
-do-
ISO/IEC 17021, Conformity
assessment — Requirements for
bodies providing audit and
certification of management systems
IS/ISO/IEC 17021, Conformity
assessment — Requirements for bodies
providing audit and certification of
management systems
-do-
ISO/IEC 17025, General requirements
for the competence of testing and
calibration laboratories
IS/ISO/IEC 17025, General
requirements for the competence of
testing and calibration laboratories
-do-
For the purpose of whether deciding a particular requirement of this standard is complied with,
the final value, observed or calculated, expressing the result of a test or analysis, shall be
rounded off in accordance with IS 2 : 1960 ‘Rules for rounding off numerical values (revised)’. The number of significant places retained in the rounded off value should be same as that of
the specified value in this standard.
Doc No.: LITD 17 (10696) /ISO/IEC 29100 : 2011
भारतीय मानक
सचना रौधौगिकी — सरषा तकनीक — ननजता परखा
Indian Standard
INFORMATION TECHNOLOGY — SECURITY TECHNIQUES — PRIVACY
FRAMEWORK
ICS 35.040
BIS 2016
BUREAU OF INDIAN STANDARDS MANAK BHAVAN, 9 BAHADUR SHAH ZAFAR MARG
NEW DELHI 110002
Sep 2016 Price Group
Information Systems Security and Biometrics Sectional Committee, LITD 17
NATIONAL FOREWORD
This Indian Standard which is identical with ISO/IEC 29100 : 2011 ‘Information technology —
Security techniques — Privacy framework’ issued by the International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC) jointly was
adopted by the Bureau of Indian Standards on the recommendations of the Information
Systems Security and Biometrics Sectional Committee and approval of the Electronics and
Information Technology Division Council.
The text of ISO/IEC Standard has been approved as suitable for publication as an Indian
Standard without deviations. Certain conventions are however not identical to those used in
Indian Standards. Attention is particularly drawn to the following:
a) Wherever the words ‘International Standard’ appear referring to this standard, they should be read as ‘Indian Standard’.
b) Comma (,) has been used as a decimal marker while in Indian Standards, the current
practice is to use a point (.) as the decimal marker.
For the purpose of whether deciding a particular requirement of this standard is complied with,
the final value, observed or calculated, expressing the result of a test or analysis, shall be
rounded off in accordance with IS 2 : 1960 ‘Rules for rounding off numerical values (revised)’. The number of significant places retained in the rounded off value should be same as that of
the specified value in this standard.
Doc No.: LITD 17 (10697) /ISO/IEC 29101: 2013
भारतीय मानक
सचना रौधौगिकी — सरषा तकनीक — ननजता शिपकारी परखा
Indian Standard
INFORMATION TECHNOLOGY —SECURITY TECHNIQUES — PRIVACY
ARCHITECTURE FRAMEWORK
ICS 35.040
BIS 2016
BUREAU OF INDIAN STANDARDS MANAK BHAVAN, 9 BAHADUR SHAH ZAFAR MARG
NEW DELHI 110002
Sep 2016 Price Group
Information Systems Security and Biometrics Sectional Committee, LITD 17
NATIONAL FOREWORD
This Indian Standard which is identical with ISO/IEC 29101 : 2013 ‘Information technology --
Security techniques -- Privacy architecture framework’ issued by the International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC) jointly was
adopted by the Bureau of Indian Standards on the recommendations of the Information
Systems Security and Biometrics Sectional Committee and approval of the Electronics and
Information Technology Division Council.
The text of ISO/IEC Standard has been approved as suitable for publication as an Indian
Standard without deviations. Certain conventions are however not identical to those used in
Indian Standards. Attention is particularly drawn to the following:
a) Wherever the words ‘International Standard’ appear referring to this standard, they should be read as ‘Indian Standard’.
b) Comma (,) has been used as a decimal marker while in Indian Standards, the current
practice is to use a point (.) as the decimal marker.
The technical committee has reviewed the provisions of following International Standard
referred in this adopted standard and has decided that it is acceptable for use in conjunction
with this standard:
International Standard Title
ISO/IEC 29100:2011, Information technology — Security techniques — Privacy
Framework
ISO/IEC/IEEE 42010:2011 Systems and software engineering — Architecture
Description
For the purpose of whether deciding a particular requirement of this standard is complied with,
the final value, observed or calculated, expressing the result of a test or analysis, shall be
rounded off in accordance with IS 2 : 1960 ‘Rules for rounding off numerical values (revised)’. The number of significant places retained in the rounded off value should be same as that of
the specified value in this standard.
Doc No.: LITD 17 (10698) /ISO/IEC 29192-1 : 2012
भारतीय मानक
सचना र ध गिकी — सरषा तकनीक — लाइवट रिट राफी भाि 1 सामाय
Indian Standard
INFORMATION TECHNOLOGY — SECURITY TECHNIQUES — LIGHTWEIGHT
CRYPTOGRAPHY
PART 1 GENERAL
ICS 35.040
BIS 2016
BUREAU OF INDIAN STANDARDS MANAK BHAVAN, 9 BAHADUR SHAH ZAFAR MARG
NEW DELHI 110002
Sep 2016 Price Group
Information Systems Security and Biometrics Sectional Committee, LITD 17
NATIONAL FOREWORD
This Indian Standard which is identical with ISO/IEC 29192-1 : 2012 ‘Information technology --
Security techniques — Lightweight cryptography — Part 1: General’ issued by the International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC)
jointly was adopted by the Bureau of Indian Standards on the recommendations of the
Information Systems Security and Biometrics Sectional Committee and approval of the
Electronics and Information Technology Division Council.
The text of ISO/IEC Standard has been approved as suitable for publication as an Indian
Standard without deviations. Certain conventions are however not identical to those used in
Indian Standards. Attention is particularly drawn to the following:
a) Wherever the words ‘International Standard’ appear referring to this standard, they should be read as ‘Indian Standard’.
b) Comma (,) has been used as a decimal marker while in Indian Standards, the current
practice is to use a point (.) as the decimal marker.
For the purpose of whether deciding a particular requirement of this standard is complied with,
the final value, observed or calculated, expressing the result of a test or analysis, shall be
rounded off in accordance with IS 2 : 1960 ‘Rules for rounding off numerical values (revised)’. The number of significant places retained in the rounded off value should be same as that of
the specified value in this standard.
Doc No.: LITD 17 (10699) /ISO/IEC 29192-2 : 2012
भारतीय मानक
सचना र ध गिकी — सरषा तकनीक — लाइवट रिट राफी भाि 2 लॉक ससफर
Indian Standard
INFORMATION TECHNOLOGY — SECURITY TECHNIQUES — LIGHTWEIGHT
CRYPTOGRAPHY
PART 2 BLOCK CIPHERS
ICS 35.040
BIS 2016
BUREAU OF INDIAN STANDARDS MANAK BHAVAN, 9 BAHADUR SHAH ZAFAR MARG
NEW DELHI 110002
Sep 2016 Price Group
Information Systems Security and Biometrics Sectional Committee, LITD 17
NATIONAL FOREWORD
This Indian Standard which is identical with ISO/IEC 29192-2 : 2012 ‘Information technology --
Security techniques — Lightweight cryptography — Part 2: Block ciphers’ issued by the International Organization for Standardization (ISO) and International Electrotechnical
Commission (IEC) jointly was adopted by the Bureau of Indian Standards on the
recommendations of the Information Systems Security and Biometrics Sectional Committee
and approval of the Electronics and Information Technology Division Council.
The text of ISO/IEC Standard has been approved as suitable for publication as an Indian
Standard without deviations. Certain conventions are however not identical to those used in
Indian Standards. Attention is particularly drawn to the following:
a) Wherever the words ‘International Standard’ appear referring to this standard, they should be read as ‘Indian Standard’.
b) Comma (,) has been used as a decimal marker while in Indian Standards, the current
practice is to use a point (.) as the decimal marker.
For the purpose of whether deciding a particular requirement of this standard is complied with,
the final value, observed or calculated, expressing the result of a test or analysis, shall be
rounded off in accordance with IS 2 : 1960 ‘Rules for rounding off numerical values (revised)’. The number of significant places retained in the rounded off value should be same as that of
the specified value in this standard.
Doc No.: LITD 17 (10698) /ISO/IEC 29192-3 : 2012
भारतीय मानक
सचना र ध गिकी — सरषा तकनीक — लाइवट रिट राफी भाि 3 रीम ससफर
Indian Standard
INFORMATION TECHNOLOGY — SECURITY TECHNIQUES — LIGHTWEIGHT
CRYPTOGRAPHY
PART 3 Stream ciphers
ICS 35.040
BIS 2016
BUREAU OF INDIAN STANDARDS MANAK BHAVAN, 9 BAHADUR SHAH ZAFAR MARG
NEW DELHI 110002
Sep 2016 Price Group
Information Systems Security and Biometrics Sectional Committee, LITD 17
NATIONAL FOREWORD
This Indian Standard which is identical with ISO/IEC 29192-3 : 2012 ‘Information technology --
Security techniques — Lightweight cryptography — Part 3: Stream ciphers’ issued by the
International Organization for Standardization (ISO) and International Electrotechnical
Commission (IEC) jointly was adopted by the Bureau of Indian Standards on the
recommendations of the Information Systems Security and Biometrics Sectional Committee
and approval of the Electronics and Information Technology Division Council.
The text of ISO/IEC Standard has been approved as suitable for publication as an Indian
Standard without deviations. Certain conventions are however not identical to those used in
Indian Standards. Attention is particularly drawn to the following:
a) Wherever the words ‘International Standard’ appear referring to this standard, they should be read as ‘Indian Standard’.
b) Comma (,) has been used as a decimal marker while in Indian Standards, the current
practice is to use a point (.) as the decimal marker.
The technical committee has reviewed the provisions of following International Standard
referred in this adopted standard and has decided that it is acceptable for use in conjunction
with this standard:
International Standard Title
ISO/IEC 29192-1 : 2011, Information technology — Security techniques —
Lightweight cryptography — Part 1: General
For the purpose of whether deciding a particular requirement of this standard is complied with,
the final value, observed or calculated, expressing the result of a test or analysis, shall be
rounded off in accordance with IS 2 : 1960 ‘Rules for rounding off numerical values (revised)’. The number of significant places retained in the rounded off value should be same as that of
the specified value in this standard.
Doc No.: LITD 17 (10701) /ISO/IEC 29192-4 : 2013
भारतीय मानक
सचना र ध गिकी — सरषा तकनीक — लाइवट रिट राफी भाि 4 असमममत तकनीक क रय ि स यरववयास
Indian Standard
INFORMATION TECHNOLOGY — SECURITY TECHNIQUES — LIGHTWEIGHT
CRYPTOGRAPHY
PART 4 MECHANISMS USING ASYMMETRIC TECHNIQUES
ICS 35.040
BIS 2016
BUREAU OF INDIAN STANDARDS MANAK BHAVAN, 9 BAHADUR SHAH ZAFAR MARG
NEW DELHI 110002
Sep 2016 Price Group
Information Systems Security and Biometrics Sectional Committee, LITD 17
NATIONAL FOREWORD
This Indian Standard which is identical with ISO/IEC 29192-4 : 2013 ‘Information technology --
Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques’ issued by the International Organization for Standardization (ISO) and International
Electrotechnical Commission (IEC) jointly was adopted by the Bureau of Indian Standards on
the recommendations of the Information Systems Security and Biometrics Sectional
Committee and approval of the Electronics and Information Technology Division Council.
The text of ISO/IEC Standard has been approved as suitable for publication as an Indian
Standard without deviations. Certain conventions are however not identical to those used in
Indian Standards. Attention is particularly drawn to the following:
a) Wherever the words ‘International Standard’ appear referring to this standard, they should be read as ‘Indian Standard’.
b) Comma (,) has been used as a decimal marker while in Indian Standards, the current
practice is to use a point (.) as the decimal marker.
The technical committee has reviewed the provisions of following International Standard
referred in this adopted standard and has decided that it is acceptable for use in conjunction
with this standard:
International Standard Title
ISO/IEC 15946-1 Information technology — Security techniques —
Cryptographic techniques based on elliptic curves —
Part 1: General
ISO/IEC 29192-1 : 2011, Information technology — Security techniques —
Lightweight cryptography — Part 1: General
For the purpose of whether deciding a particular requirement of this standard is complied with,
the final value, observed or calculated, expressing the result of a test or analysis, shall be
rounded off in accordance with IS 2 : 1960 ‘Rules for rounding off numerical values (revised)’. The number of significant places retained in the rounded off value should be same as that of
the specified value in this standard.
Doc No.: LITD 17 (10702) /ISO/IEC 15946-1:2016
भारतीय मानक
सचना र ध गिकी — सरषा तकनीक — अडाकार वर पर आधाररत ररट रारिक तकनीक भाि 1 सामाय
Indian Standard
INFORMATION TECHNOLOGY — SECURITY TECHNIQUES —
CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES
PART 1 GENERAL
ICS 35.040
BIS 2016
BUREAU OF INDIAN STANDARDS MANAK BHAVAN, 9 BAHADUR SHAH ZAFAR MARG
NEW DELHI 110002
Sep 2016 Price Group
Information Systems Security and Biometrics Sectional Committee, LITD 17
NATIONAL FOREWORD
This Indian Standard which is identical with ISO/IEC 15946-1:2016 ‘Information technology —Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General ’ issued
by the International Organization for Standardization (ISO) and International Electrotechnical
Commission (IEC) jointly was adopted by the Bureau of Indian Standards on the
recommendations of the Information Systems Security and Biometrics Sectional Committee
and approval of the Electronics and Information Technology Division Council.
The text of ISO/IEC Standard has been approved as suitable for publication as an Indian
Standard without deviations. Certain conventions are however not identical to those used in
Indian Standards. Attention is particularly drawn to the following:
a) Wherever the words ‘International Standard’ appear referring to this standard, they should be read as ‘Indian Standard’.
b) Comma (,) has been used as a decimal marker while in Indian Standards, the current
practice is to use a point (.) as the decimal marker.
The technical committee has reviewed the provisions of following International Standard
referred in this adopted standard and has decided that it is acceptable for use in conjunction
with this standard:
International Standard Title
ISO/IEC 15946-5 Information technology — Security techniques —
Cryptographic techniques based on elliptic curves — Part
5: Elliptic curve generation
For the purpose of whether deciding a particular requirement of this standard is complied with,
the final value, observed or calculated, expressing the result of a test or analysis, shall be
rounded off in accordance with IS 2 : 1960 ‘Rules for rounding off numerical values (revised)’. The number of significant places retained in the rounded off value should be same as that of
the specified value in this standard.
Doc No.: LITD 17 (10703) /ISO/IEC 18033-3:2010
भारतीय मानक
सचना रौधौगिकी — सरषा तकनीक — एरिशन दशमलव रणाली
भाि 2 असमममत मसफर
Indian Standard
INFORMATION TECHNOLOGY — SECURITY TECHNIQUES — ENCRYPTION
ALGORITHMS
PART 2 ASYMMETRIC CIPHERS
ICS 35.040
BIS 2016
BUREAU OF INDIAN STANDARDS MANAK BHAVAN, 9 BAHADUR SHAH ZAFAR MARG
NEW DELHI 110002
Sep 2016 Price Group
Information Systems Security and Biometrics Sectional Committee, LITD 17
NATIONAL FOREWORD
This Indian Standard which is identical with ISO/IEC 18033-2:2010 ‘Information technology
Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers’ issued by the
International Organization for Standardization (ISO) and International Electrotechnical
Commission (IEC) jointly was adopted by the Bureau of Indian Standards on the
recommendations of the Information Systems Security and Biometrics Sectional Committee
and approval of the Electronics and Information Technology Division Council.
The text of ISO/IEC Standard has been approved as suitable for publication as an Indian
Standard without deviations. Certain conventions are however not identical to those used in
Indian Standards. Attention is particularly drawn to the following:
a) Wherever the words ‘International Standard’ appear referring to this standard, they should be read as ‘Indian Standard’.
b) Comma (,) has been used as a decimal marker while in Indian Standards, the current
practice is to use a point (.) as the decimal marker.
The technical committee has reviewed the provisions of following International Standard
referred in this adopted standard and has decided that it is acceptable for use in conjunction
with this standard:
International Standard Title
ISO/IEC 9797-1:1999 Information technology ― Security techniques ― Message Authentication Codes (MACs) ― Part 1: Mechanisms using a
block cipher
ISO/IEC 9797-2:2002 Information technology ― Security techniques― Message Authentication Codes (MACs) ― Part 2: Mechanisms using a dedicated hash-function
ISO/IEC 10118-2:2000 Information technology ― Security techniques ― Hash-functions
― Part 2: Hash functions using an n-bit block cipher
ISO/IEC 10118-3:2004 Information technology ― Security techniques ― Hash-functions
― Part 3:Dedicated hash-functions
ISO/IEC 18033-3:2005 Information technology ― Security techniques ― Encryption algorithms ―Part 3: Block ciphers
For the purpose of whether deciding a particular requirement of this standard is complied with,
the final value, observed or calculated, expressing the result of a test or analysis, shall be
rounded off in accordance with IS 2 : 1960 ‘Rules for rounding off numerical values (revised)’. The number of significant places retained in the rounded off value should be same as that of
the specified value in this standard.
Doc No.: LITD 17 (10704) /ISO/IEC 18033-1:2005
भारतीय मानक
सचना रौधौगिकी — सरषा तकनीक — एरिशन दशमलव रणाली
भाि 1 सामाय
Indian Standard
INFORMATION TECHNOLOGY — SECURITY TECHNIQUES — ENCRYPTION
ALGORITHMS
PART 1 GENERAL
ICS 35.040
BIS 2016
BUREAU OF INDIAN STANDARDS MANAK BHAVAN, 9 BAHADUR SHAH ZAFAR MARG
NEW DELHI 110002
Sep 2016 Price Group
Information Systems Security and Biometrics Sectional Committee, LITD 17
NATIONAL FOREWORD
This Indian Standard which is identical with ISO/IEC 18033-1:2005 ‘Information technology
Security techniques — Encryption algorithms — Part 1: General’ issued by the International
Organization for Standardization (ISO) and International Electrotechnical Commission (IEC)
jointly was adopted by the Bureau of Indian Standards on the recommendations of the
Information Systems Security and Biometrics Sectional Committee and approval of the
Electronics and Information Technology Division Council.
The text of ISO/IEC Standard has been approved as suitable for publication as an Indian
Standard without deviations. Certain conventions are however not identical to those used in
Indian Standards. Attention is particularly drawn to the following:
a) Wherever the words ‘International Standard’ appear referring to this standard, they should be read as ‘Indian Standard’.
b) Comma (,) has been used as a decimal marker while in Indian Standards, the current
practice is to use a point (.) as the decimal marker.
For the purpose of whether deciding a particular requirement of this standard is complied with,
the final value, observed or calculated, expressing the result of a test or analysis, shall be
rounded off in accordance with IS 2 : 1960 ‘Rules for rounding off numerical values (revised)’. The number of significant places retained in the rounded off value should be same as that of
the specified value in this standard.
Doc No.: LITD 17 (10705) /ISO/IEC 18033-3:2010
भारतीय मानक
सचना रौधौगिकी — सरषा तकनीक — एरिशन दशमलव रणाली
भाि 3 लॉक ससफर
Indian Standard
INFORMATION TECHNOLOGY — SECURITY TECHNIQUES — ENCRYPTION
ALGORITHMS
PART 3 BLOCK CIPHERS
ICS 35.040
BIS 2016
BUREAU OF INDIAN STANDARDS MANAK BHAVAN, 9 BAHADUR SHAH ZAFAR MARG
NEW DELHI 110002
Sep 2016 Price Group
Information Systems Security and Biometrics Sectional Committee, LITD 17
NATIONAL FOREWORD
This Indian Standard which is identical with ISO/IEC 18033-3:2010 ‘Information technology
Security techniques — Encryption algorithms — Part 3: Block ciphers’ issued by the International
Organization for Standardization (ISO) and International Electrotechnical Commission (IEC)
jointly was adopted by the Bureau of Indian Standards on the recommendations of the
Information Systems Security and Biometrics Sectional Committee and approval of the
Electronics and Information Technology Division Council.
The text of ISO/IEC Standard has been approved as suitable for publication as an Indian
Standard without deviations. Certain conventions are however not identical to those used in
Indian Standards. Attention is particularly drawn to the following:
a) Wherever the words ‘International Standard’ appear referring to this standard, they should be read as ‘Indian Standard’.
b) Comma (,) has been used as a decimal marker while in Indian Standards, the current
practice is to use a point (.) as the decimal marker.
For the purpose of whether deciding a particular requirement of this standard is complied with,
the final value, observed or calculated, expressing the result of a test or analysis, shall be
rounded off in accordance with IS 2 : 1960 ‘Rules for rounding off numerical values (revised)’. The number of significant places retained in the rounded off value should be same as that of
the specified value in this standard.
Doc No.: LITD 17 (10709) /ISO/IEC 18031-1:2011
भारतीय मानक
सचना रौधौगिकी — सरषा तकनीक — रडम बीट जनरशन
Indian Standard
INFORMATION TECHNOLOGY — SECURITY TECHNIQUES — RANDOM BIT
GENERATION
ICS 35.040
BIS 2016
BUREAU OF INDIAN STANDARDS MANAK BHAVAN, 9 BAHADUR SHAH ZAFAR MARG
NEW DELHI 110002
Sep 2016 Price Group
Information Systems Security and Biometrics Sectional Committee, LITD 17
NATIONAL FOREWORD
This Indian Standard which is identical with ISO/IEC 18031-1:2011 ‘Information technology
— Security techniques — Random bit generation’ issued by the International Organization for
Standardization (ISO) and International Electrotechnical Commission (IEC) jointly was
adopted by the Bureau of Indian Standards on the recommendations of the Information
Systems Security and Biometrics Sectional Committee and approval of the Electronics and
Information Technology Division Council.
The text of ISO/IEC Standard has been approved as suitable for publication as an Indian
Standard without deviations. Certain conventions are however not identical to those used in
Indian Standards. Attention is particularly drawn to the following:
a) Wherever the words ‘International Standard’ appear referring to this standard, they should be read as ‘Indian Standard’.
b) Comma (,) has been used as a decimal marker while in Indian Standards, the current
practice is to use a point (.) as the decimal marker.
The technical committee has reviewed the provisions of following International Standard
referred in this adopted standard and has decided that it is acceptable for use in conjunction
with this standard:
International Standard Title
ISO/IEC 9797-2 Information technology — Security techniques — Message
Authentication Codes (MACs) — Part 2: Mechanisms using a
dedicated hash-function
ISO/IEC 10116 Information technology — Security techniques — Modes of
operation for an n-bit block cipher
ISO/IEC 10118-3 Information technology — Security techniques — Hash-
functions — Part 3: Dedicated hash-functions
ISO/IEC 18032 Information technology — Security techniques — Prime number
generation
ISO/IEC 18033-3 Information technology — Security techniques — Encryption
algorithms — Part 3: Block ciphers
ISO/IEC 19790, Information technology — Security techniques — Security
requirements for cryptographic modules
For the purpose of whether deciding a particular requirement of this standard is complied with,
the final value, observed or calculated, expressing the result of a test or analysis, shall be
rounded off in accordance with IS 2 : 1960 ‘Rules for rounding off numerical values (revised)’. The number of significant places retained in the rounded off value should be same as that of
the specified value in this standard.
Doc No.: LITD 17 (10707) /ISO/IEC 18014-2:2009
भारतीय मानक
सचना र ध गिकी — सरषा तकनीक — टाइम टमपि सवाए
भाि 2 वतर ट कन उपादित करन का तर
Indian Standard
INFORMATION TECHNOLOGY — SECURITY TECHNIQUES —TIME-STAMPING
SERVICES
PART 2 MECHANISMS PRODUCING INDEPENDENT TOKENS
ICS 35.040
BIS 2016
BUREAU OF INDIAN STANDARDS MANAK BHAVAN, 9 BAHADUR SHAH ZAFAR MARG
NEW DELHI 110002
Sep 2016 Price Group
Information Systems Security and Biometrics Sectional Committee, LITD 17
NATIONAL FOREWORD
This Indian Standard which is identical with ISO/IEC 18014-2:2009 ‘Information technology
— Security techniques — Time-stamping services — Part 2: Mechanisms producing
independent tokens’ issued by the International Organization for Standardization (ISO) and
International Electrotechnical Commission (IEC) jointly was adopted by the Bureau of Indian
Standards on the recommendations of the Information Systems Security and Biometrics
Sectional Committee and approval of the Electronics and Information Technology Division
Council.
The text of ISO/IEC Standard has been approved as suitable for publication as an Indian
Standard without deviations. Certain conventions are however not identical to those used in
Indian Standards. Attention is particularly drawn to the following:
a) Wherever the words ‘International Standard’ appear referring to this standard, they should be read as ‘Indian Standard’.
b) Comma (,) has been used as a decimal marker while in Indian Standards, the current
practice is to use a point (.) as the decimal marker.
The technical committee has reviewed the provisions of following International Standard
referred in this adopted standard and has decided that it is acceptable for use in conjunction
with this standard:
International Standard Title
ISO/IEC 8824-1:1998 Information technology — Abstract Syntax Notation One
(ASN.1): Specification of basic
notation
ISO/IEC 18014-1:2008 Information technology — Security techniques — Time-stamping
services —Part 1: Framework
ISO/IEC 9594-8:2005 Information technology — Open Systems Interconnection — The
Directory: Public-key
and attribute certificate frameworks
For the purpose of whether deciding a particular requirement of this standard is complied with,
the final value, observed or calculated, expressing the result of a test or analysis, shall be
rounded off in accordance with IS 2 : 1960 ‘Rules for rounding off numerical values (revised)’.
The number of significant places retained in the rounded off value should be same as that of
the specified value in this standard.
Doc No.: LITD 17 (10708) /ISO/IEC 18014-3:2009
भारतीय मानक सचना र ध गिकी — सरषा तकनीक — टाइम टमपि सवाए
भाि 3 ल ड ट कन उपादित करन का तर
Indian Standard
INFORMATION TECHNOLOGY — SECURITY TECHNIQUES —TIME-STAMPING
SERVICES
PART 3 MECHANISMS PRODUCING LINKED TOKENS
ICS 35.040
BIS 2016
BUREAU OF INDIAN STANDARDS MANAK BHAVAN, 9 BAHADUR SHAH ZAFAR MARG
NEW DELHI 110002
Sep 2016 Price Group
Information Systems Security and Biometrics Sectional Committee, LITD 17
NATIONAL FOREWORD
This Indian Standard which is identical with ISO/IEC 18014-3:2009 ‘Information technology
— Security techniques — Time-stamping services — Part 3: Mechanisms producing linked
tokens’ issued by the International Organization for Standardization (ISO) and International
Electrotechnical Commission (IEC) jointly was adopted by the Bureau of Indian Standards on
the recommendations of the Information Systems Security and Biometrics Sectional
Committee and approval of the Electronics and Information Technology Division Council.
The text of ISO/IEC Standard has been approved as suitable for publication as an Indian
Standard without deviations. Certain conventions are however not identical to those used in
Indian Standards. Attention is particularly drawn to the following:
a) Wherever the words ‘International Standard’ appear referring to this standard, they should be read as ‘Indian Standard’.
b) Comma (,) has been used as a decimal marker while in Indian Standards, the current
practice is to use a point (.) as the decimal marker.
The technical committee has reviewed the provisions of following International Standard
referred in this adopted standard and has decided that it is acceptable for use in conjunction
with this standard:
International Standard Title
ISO/IEC 10118 (All
parts)
Information technology — Security techniques — Hash-functions
ISO/IEC 18014-1:2008 Information technology — Security techniques — Time-stamping
services —Part 1: Framework
For the purpose of whether deciding a particular requirement of this standard is complied with,
the final value, observed or calculated, expressing the result of a test or analysis, shall be
rounded off in accordance with IS 2 : 1960 ‘Rules for rounding off numerical values (revised)’. The number of significant places retained in the rounded off value should be same as that of
the specified value in this standard.