• There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

CSA ISO/IEC 18031 : 2013

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by

INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION

Available format(s)

Hardcopy , PDF

Superseded date

22-07-2021

Language(s)

English

Published date

01-01-2017

Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols
5 Properties and requirements of an RBG
6 RBG model
7 Types of RBGs
8 Overview and requirements for an NRBG
9 Overview and requirements for a DRBG
Annex A (normative) - Combining RBGs
Annex B (normative) - Conversion methods
Annex C (normative) - DRBGs
Annex D (normative) - Application specific constants
Annex E (informative) - NRBG examples
Annex F (informative) - Security considerations
Annex G (informative) - Discussion on the estimation
        of entropy
Annex H (informative) - RBG assurance
Annex I (informative) - RBG boundaries
Annex J (informative) - Rationale for the design of
        statistical tests
Bibliography

Defines a conceptual model for a random bit generator for cryptographic purposes, together with the elements of this model.

DocumentType
Standard
Pages
162
ProductNote
Reconfirmed EN
PublisherName
Canadian Standards Association
Status
Superseded
SupersededBy
Supersedes

Standards Relationship
ISO/IEC 18031:2011 Identical

ISO/IEC 18033-1:2015 Information technology Security techniques Encryption algorithms Part 1: General
ISO/IEC 18032:2005 Information technology Security techniques Prime number generation
ANSI X9.82-2 : 2015 RANDOM NUMBER GENERATION - PART 2: ENTROPY SOURCES
ISO/IEC 18033-3:2010 Information technology Security techniques Encryption algorithms Part 3: Block ciphers
ISO/IEC 19790:2012 Information technology — Security techniques — Security requirements for cryptographic modules
ISO/IEC 10118-1:2016 Information technology Security techniques Hash-functions Part 1: General
ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
ANSI X9.82-3 : 2007(R2017) RANDOM NUMBER GENERATION - PART 3: DETERMINISTIC RANDOM BIT GENERATORS
ISO/IEC 9797-2:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function
ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
ANSI X9.82-1 : 2006(R2013) RANDOM NUMBER GENERATION - PART 1: OVERVIEW AND BASIC PRINCIPLES
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.