-
-
Available Formats
- Options
- Availability
- Priced From ( in USD )
-
Available Formats
-
- Immediate download
- $223.00
- Add to Cart
-
- Printed Edition
- Ships in 1-2 business days
- $223.00
- Add to Cart
Customers Who Bought This Also Bought
-
ISO/IEC 13888-1:2020
Priced From $166.00 -
ISO/IEC 29147:2018
Priced From $194.00 -
CAN/CSA-ISO/IEC 19989-2:21
Priced From $148.00 -
ISO/IEC 27040:2024
Priced From $278.00
About This Item
Full Description
ISO/IEC 10116:2017 data during transmission or in storage). The defined modes only provide protection of data confidentiality. Protection of data integrity is not within the scope of this document. Also, most modes do not protect the confidentiality of message length information.
NOTE 1 Methods for protecting the integrity of data using a block cipher are provided in ISO/IEC 9797-1.
NOTE 2 Methods for simultaneously protecting the confidentiality and integrity of data are provided in ISO/IEC 19772.
ISO/IEC 10116:2017 specifies the modes of operation and gives recommendations for choosing values of parameters (as appropriate).
NOTE 3 The modes of operation specified in this document have been assigned object identifiers in accordance with ISO/IEC 9834. The list of assigned object identifiers is given in Annex A. In applications in which object identifiers are used, the object identifiers specified in Annex A are to be used in preference to any other object identifiers that can exist for the mode concerned.
NOTE 4 Annex B contains comments on the properties of each mode and important security guidance.
Document History
-
ISO/IEC 10116:2017
viewing
Information technology - Security techniques - Modes of operation for an n-bit block cipher- Most Recent
-
ISO/IEC 10116 Ed. 1.0 en CORR1:2008
Corrigendum 1 - Information technology -- Security techniques -- Modes of operation for an n-bit block cipher -- Historical Version
-
ISO/IEC 10116:2006
Information technology - Security techniques - Modes of operation for an n-bit block cipher- Historical Version
-
ISO/IEC 10116:1997
Information technology - Security techniques - Modes of operation for an n-bit block cipher- Historical Version