ISO/IEC 18032:2005
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
View Superseded by
Information technology Security techniques Prime number generation
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
12-14-2020
English
02-02-2005
ISO/IEC 18032:2005 specifies methods for generating and testing prime numbers. Prime numbers are used in various cryptographic algorithms, mainly in asymmetric encryption algorithms and digital signature algorithms.
Firstly, ISO/IEC 18032:2005 specifies methods for testing whether a given number is prime. The testing methods included in ISO/IEC 18032:2005 can be divided into two groups:
- Probabilistic primality tests, which have a small error probability. All probabilistic tests described here may declare a composite to be a prime. One test described here may declare a prime to be composite.
- Deterministic methods, which are guaranteed to give the right verdict. These methods use so-called primality certificates.
Secondly, ISO/IEC 18032:2005 specifies methods to generate prime numbers. Again, both probabilistic and deterministic methods are presented.
DocumentType |
Standard
|
Pages |
18
|
PublisherName |
International Organization for Standardization
|
Status |
Withdrawn
|
SupersededBy |
Standards | Relationship |
19/30346498 DC : 2019 | Identical |
NEN ISO/IEC 18032 : 2005 | Identical |
BS ISO/IEC 18032:2005 | Identical |
INCITS/ISO/IEC 18032 : 2005 | Identical |
CSA ISO/IEC 18032 : 2006 : R2016 | Identical |
CSA ISO/IEC 18032 : 2006 | Identical |
08/30169502 DC : 0 | BS ISO/IEC 9798-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO KNOWLEDGE TECHNIQUES |
18/30361485 DC : 0 | BS ISO/IEC 19896-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY TESTERS AND EVALUATORS - PART 3: KNOWLEDGE, SKILLS AND EFFECTIVENESS REQUIREMENTS FOR ISO/IEC 15408 EVALUATORS |
BS ISO/IEC 14888-2:2008 | Information technology. Security techniques. Digital signatures with appendix Integer factorization based mechanisms |
CSA ISO/IEC 9798-5 : 2010 : R2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO-KNOWLEDGE TECHNIQUES |
INCITS/ISO/IEC 9797-2 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 2: MECHANISMS USING A DEDICATED HASH-FUNCTION |
BS ISO 21188:2006 | Public key infrastructure for financial services. Practices and policy framework |
CAN/CSA-ISO/IEC 18033-2:06 (R2016) | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
CSA ISO/IEC 9798-5 : 2010 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO-KNOWLEDGE TECHNIQUES |
BS ISO/IEC 18033-2 : 2006 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
ISO/IEC 18033-2:2006 | Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers |
CSA ISO/IEC 18033-2 :2006 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
BS ISO/IEC 24713-2:2008 | Information technology. Biometric profiles for interoperability and data interchange Physical access control for employees at airports |
10/30192164 DC : DRAFT JUNE 2010 | BS ISO/IEC 29150 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SIGNCRYPTION |
10/30228327 DC : 0 | BS ISO/IEC 18031 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
16/30335567 DC : 0 | BS ISO/IEC 15946-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 5: ELLIPTIC CURVE GENERATION |
ISO/IEC 11770-4:2017 | Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets |
BS ISO/IEC 18367:2016 | Information technology. Security techniques. Cryptographic algorithms and security mechanisms conformance testing |
CSA ISO/IEC 9797-2:2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 2: MECHANISMS USING A DEDICATED HASH-FUNCTION |
CAN/CSA-ISO/IEC 9797-2:13 (R2017) | Information technology - Security techniques - Message authentication codes (MACs) - Part 2: Mechanisms using a dedicated hash-function (Adopted ISO/IEC 9797-2:2011, second edition, 2011-05-01) |
INCITS/ISO/IEC 18033-2 : 2008 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
CSA ISO/IEC 14888-2 : 2009 : R2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 2: INTEGER FACTORIZATION BASED MECHANISMS |
BS ISO/IEC 18031 : 2011 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
ISO/IEC 18370-2:2016 | Information technology Security techniques Blind digital signatures Part 2: Discrete logarithm based mechanisms |
ISO 21188:2018 | Public key infrastructure for financial services — Practices and policy framework |
ISO/IEC 18367:2016 | Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing |
ISO 19092:2008 | Financial services — Biometrics — Security framework |
04/30040717 DC : DRAFT JUL 2004 | ISO/IEC 18033-2 - INFORMATION TECHNOLOGY - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
17/30281253 DC : 0 | BS ISO 21188 - PUBLIC KEY INFRASTRUCTURE FOR FINANCIAL SERVICES - PRACTICES AND POLICY FRAMEWORK |
15/30286868 DC : 0 | BS ISO/IEC 14888-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 3: DISCRETE LOGARITHM BASED MECHANISMS |
16/30266969 DC : 0 | BS ISO/IEC 17922 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TELEBIOMETRIC AUTHENTICATION FRAMEWORK USING BIOMETRIC HARDWARE SECURITY MODULE |
BS ISO 11568-4:2007 | Banking. Key management (retail) Asymmetric cryptosystems. Key management and life cycle |
BS ISO/IEC 15946-5:2017 | Information technology. Security techniques. Cryptographic techniques based on elliptic curves Elliptic curve generation |
04/30040736 DC : DRAFT DEC 2004 | ISO/IEC 18031 - INFORMATION TECHNOLOGY - RANDOM NUMBER GENERATION |
BS ISO/IEC 14888-3 : 2006 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 3: DISCRETE LOGARITHM BASED MECHANISMS |
BS ISO/IEC 29150:2011 | Information technology. Security techniques. Signcryption |
07/30107763 DC : 0 | BS ISO/IEC 24713-2 - INFORMATION TECHNOLOGY - BIOMETRIC PROFILES FOR INTEROPERABILITY AND DATA INTERCHANGE - PART 2: PHYSICAL ACCESS CONTROL FOR EMPLOYEES AT AIRPORTS |
CAN/CSA-ISO/IEC 18031:13 (R2017) | Information technology - Security techniques - Random bit generation (Adopted ISO/IEC 18031:2011, second edition, 2011-11-15) |
CSA ISO/IEC 18031 : 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
CSA ISO/IEC 14888-3 : 2018 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 3: DISCRETE LOGARITHM BASED MECHANISMS |
CSA ISO/IEC 14888-2 : 2009 : INC : COR 1 : 2016 : R201400 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 2: INTEGER FACTORIZATION BASED MECHANISMS |
BS ISO/IEC 20008-2:2013 | Information technology. Security techniques. Anonymous digital signatures Mechanisms using a group public key |
INCITS/ISO/IEC 24713-2 : 2009 | INFORMATION TECHNOLOGY - BIOMETRIC PROFILES FOR INTEROPERABILITY AND DATA INTERCHANGE - PART 2: PHYSICAL ACCESS CONTROL FOR EMPLOYEES AT AIRPORTS |
ISO/IEC 15946-5:2017 | Information technology Security techniques Cryptographic techniques based on elliptic curves Part 5: Elliptic curve generation |
BS ISO/IEC 11770-4:2017 | Information technology. Security techniques. Key management Mechanisms based on weak secrets |
ISO/IEC 9798-5:2009 | Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques |
ISO/IEC 9797-2:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function |
BS ISO/IEC 18370-2:2016 | Information technology. Security techniques. Blind digital signatures Discrete logarithm based mechanisms |
BIS IS/ISO 21188 : 2006 | PUBLIC KEY INFRASTRUCTURE FOR FINANCIAL SERVICES - PRACTICES AND POLICY FRAMEWORK |
12/30236955 DC : 0 | BS ISO/IEC 20008-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ANONYMOUS DIGITAL SIGNATURE - PART 2: MECHANISMS USING A GROUP PUBLIC KEY |
15/30279582 DC : 0 | BS ISO/IEC 18367 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC ALGORITHMS AND SECURITY MECHANISMS CONFORMANCE TESTING |
INCITS/ISO/IEC 18031 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
03/652682 DC : DRAFT NOV 2003 | BS ISO/IEC TR 15446 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDE FOR THE PRODUCTION OF PROTECTION PROFILES AND SECURITY TARGETS |
16/30335688 DC : 0 | BS ISO/IEC 11770-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
CSA ISO/IEC 14888-2 :2009 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 2: INTEGER FACTORIZATION BASED MECHANISMS |
ISO/IEC 24713-2:2008 | Information technology Biometric profiles for interoperability and data interchange Part 2: Physical access control for employees at airports |
ISO/IEC 20008-2:2013 | Information technology — Security techniques — Anonymous digital signatures — Part 2: Mechanisms using a group public key |
ISO 19092-1:2006 | Financial services Biometrics Part 1: Security framework |
ISO/IEC 18031:2011 | Information technology Security techniques Random bit generation |
ISO/IEC 29150:2011 | Information technology — Security techniques — Signcryption |
ISO/IEC 14888-2:2008 | Information technology Security techniques Digital signatures with appendix Part 2: Integer factorization based mechanisms |
ISO/IEC 14888-3:2016 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms |
INCITS/ISO/IEC 9798-5 : 2010 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO-KNOWLEDGE TECHNIQUES |
BS ISO/IEC 9798-5:2009 | Information technology. Security techniques. Entity authentication Mechanisms using zero knowledge techniques |
15/30268565 DC : 0 | BS ISO/IEC 18370-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BLIND DIGITAL SIGNATURES - PART 2: DISCRETE LOGARITHM BASED MECHANISMS |
05/30112566 DC : DRAFT JAN 2005 | ISO 11568-4 - BANKING - KEY MANAGEMENT (RETAIL) - PART 4: ASYMMETRIC CRYPTOSYSTEMS - KEY MANAGEMENT AND LIFE CYCLE |
BS ISO/IEC 9797-2:2011 | Information technology. Security techniques. Message Authentication Codes (MACs) Mechanisms using a dedicated hash-function |
05/30116896 DC : DRAFT SEP 2005 | ISO 19092-1 - FINANCIAL SERVICES - BIOMETRICS - PART 1: SECURITY FRAMEWORK |
INCITS/ISO/IEC 11770-4 : 2008 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
TS 119 312 : 1.2.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); CRYPTOGRAPHIC SUITES |
ISO 11568-4:2007 | Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle |
CSA ISO/IEC 11770-4 : 2007 : R2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
CAN/CSA-ISO/IEC 18367:18 | Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing (Adopted ISO/IEC 18367:2016, first edition, 2016-12-15) |
CSA ISO/IEC 11770-4 : 2007 : INC : COR 1 : 2010 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
CSA ISO/IEC 11770-4 : 2007 : R2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
CSA ISO/IEC 11770-4 : 2007 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
ISO/IEC 15946-1:2016 | Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General |
AS ISO/IEC 9797.2:2019 | Information technology - Security techniques - Message Authentication Codes (MACs) Mechanisms using a dedicated hash-function |
ISO/IEC 9796-2:2010 | Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.