• Shopping Cart
    There are no items in your cart

ISO/IEC 18032:2005

Withdrawn

Withdrawn

A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

View Superseded by

Information technology Security techniques Prime number generation

Available format(s)

Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users

Withdrawn date

12-14-2020

Superseded by

ISO/IEC 18032:2020

Language(s)

English

Published date

02-02-2005

US$81.00
Excluding Tax where applicable

ISO/IEC 18032:2005 specifies methods for generating and testing prime numbers. Prime numbers are used in various cryptographic algorithms, mainly in asymmetric encryption algorithms and digital signature algorithms.

Firstly, ISO/IEC 18032:2005 specifies methods for testing whether a given number is prime. The testing methods included in ISO/IEC 18032:2005 can be divided into two groups:

  • Probabilistic primality tests, which have a small error probability. All probabilistic tests described here may declare a composite to be a prime. One test described here may declare a prime to be composite.
  • Deterministic methods, which are guaranteed to give the right verdict. These methods use so-called primality certificates.

Secondly, ISO/IEC 18032:2005 specifies methods to generate prime numbers. Again, both probabilistic and deterministic methods are presented.

DocumentType
Standard
Pages
18
PublisherName
International Organization for Standardization
Status
Withdrawn
SupersededBy

08/30169502 DC : 0 BS ISO/IEC 9798-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO KNOWLEDGE TECHNIQUES
18/30361485 DC : 0 BS ISO/IEC 19896-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY TESTERS AND EVALUATORS - PART 3: KNOWLEDGE, SKILLS AND EFFECTIVENESS REQUIREMENTS FOR ISO/IEC 15408 EVALUATORS
BS ISO/IEC 14888-2:2008 Information technology. Security techniques. Digital signatures with appendix Integer factorization based mechanisms
CSA ISO/IEC 9798-5 : 2010 : R2015 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO-KNOWLEDGE TECHNIQUES
INCITS/ISO/IEC 9797-2 : 2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 2: MECHANISMS USING A DEDICATED HASH-FUNCTION
BS ISO 21188:2006 Public key infrastructure for financial services. Practices and policy framework
CAN/CSA-ISO/IEC 18033-2:06 (R2016) INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS
CSA ISO/IEC 9798-5 : 2010 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO-KNOWLEDGE TECHNIQUES
BS ISO/IEC 18033-2 : 2006 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS
ISO/IEC 18033-2:2006 Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
CSA ISO/IEC 18033-2 :2006 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS
BS ISO/IEC 24713-2:2008 Information technology. Biometric profiles for interoperability and data interchange Physical access control for employees at airports
10/30192164 DC : DRAFT JUNE 2010 BS ISO/IEC 29150 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SIGNCRYPTION
10/30228327 DC : 0 BS ISO/IEC 18031 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION
16/30335567 DC : 0 BS ISO/IEC 15946-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 5: ELLIPTIC CURVE GENERATION
ISO/IEC 11770-4:2017 Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets
BS ISO/IEC 18367:2016 Information technology. Security techniques. Cryptographic algorithms and security mechanisms conformance testing
CSA ISO/IEC 9797-2:2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 2: MECHANISMS USING A DEDICATED HASH-FUNCTION
CAN/CSA-ISO/IEC 9797-2:13 (R2017) Information technology - Security techniques - Message authentication codes (MACs) - Part 2: Mechanisms using a dedicated hash-function (Adopted ISO/IEC 9797-2:2011, second edition, 2011-05-01)
INCITS/ISO/IEC 18033-2 : 2008 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS
CSA ISO/IEC 14888-2 : 2009 : R2014 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 2: INTEGER FACTORIZATION BASED MECHANISMS
BS ISO/IEC 18031 : 2011 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION
ISO/IEC 18370-2:2016 Information technology Security techniques Blind digital signatures Part 2: Discrete logarithm based mechanisms
ISO 21188:2018 Public key infrastructure for financial services — Practices and policy framework
ISO/IEC 18367:2016 Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing
ISO 19092:2008 Financial services — Biometrics — Security framework
04/30040717 DC : DRAFT JUL 2004 ISO/IEC 18033-2 - INFORMATION TECHNOLOGY - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS
17/30281253 DC : 0 BS ISO 21188 - PUBLIC KEY INFRASTRUCTURE FOR FINANCIAL SERVICES - PRACTICES AND POLICY FRAMEWORK
15/30286868 DC : 0 BS ISO/IEC 14888-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 3: DISCRETE LOGARITHM BASED MECHANISMS
16/30266969 DC : 0 BS ISO/IEC 17922 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TELEBIOMETRIC AUTHENTICATION FRAMEWORK USING BIOMETRIC HARDWARE SECURITY MODULE
BS ISO 11568-4:2007 Banking. Key management (retail) Asymmetric cryptosystems. Key management and life cycle
BS ISO/IEC 15946-5:2017 Information technology. Security techniques. Cryptographic techniques based on elliptic curves Elliptic curve generation
04/30040736 DC : DRAFT DEC 2004 ISO/IEC 18031 - INFORMATION TECHNOLOGY - RANDOM NUMBER GENERATION
BS ISO/IEC 14888-3 : 2006 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 3: DISCRETE LOGARITHM BASED MECHANISMS
BS ISO/IEC 29150:2011 Information technology. Security techniques. Signcryption
07/30107763 DC : 0 BS ISO/IEC 24713-2 - INFORMATION TECHNOLOGY - BIOMETRIC PROFILES FOR INTEROPERABILITY AND DATA INTERCHANGE - PART 2: PHYSICAL ACCESS CONTROL FOR EMPLOYEES AT AIRPORTS
CAN/CSA-ISO/IEC 18031:13 (R2017) Information technology - Security techniques - Random bit generation (Adopted ISO/IEC 18031:2011, second edition, 2011-11-15)
CSA ISO/IEC 18031 : 2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION
CSA ISO/IEC 14888-3 : 2018 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 3: DISCRETE LOGARITHM BASED MECHANISMS
CSA ISO/IEC 14888-2 : 2009 : INC : COR 1 : 2016 : R201400 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 2: INTEGER FACTORIZATION BASED MECHANISMS
BS ISO/IEC 20008-2:2013 Information technology. Security techniques. Anonymous digital signatures Mechanisms using a group public key
INCITS/ISO/IEC 24713-2 : 2009 INFORMATION TECHNOLOGY - BIOMETRIC PROFILES FOR INTEROPERABILITY AND DATA INTERCHANGE - PART 2: PHYSICAL ACCESS CONTROL FOR EMPLOYEES AT AIRPORTS
ISO/IEC 15946-5:2017 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 5: Elliptic curve generation
BS ISO/IEC 11770-4:2017 Information technology. Security techniques. Key management Mechanisms based on weak secrets
ISO/IEC 9798-5:2009 Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques
ISO/IEC 9797-2:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function
BS ISO/IEC 18370-2:2016 Information technology. Security techniques. Blind digital signatures Discrete logarithm based mechanisms
BIS IS/ISO 21188 : 2006 PUBLIC KEY INFRASTRUCTURE FOR FINANCIAL SERVICES - PRACTICES AND POLICY FRAMEWORK
12/30236955 DC : 0 BS ISO/IEC 20008-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ANONYMOUS DIGITAL SIGNATURE - PART 2: MECHANISMS USING A GROUP PUBLIC KEY
15/30279582 DC : 0 BS ISO/IEC 18367 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC ALGORITHMS AND SECURITY MECHANISMS CONFORMANCE TESTING
INCITS/ISO/IEC 18031 : 2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION
03/652682 DC : DRAFT NOV 2003 BS ISO/IEC TR 15446 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDE FOR THE PRODUCTION OF PROTECTION PROFILES AND SECURITY TARGETS
16/30335688 DC : 0 BS ISO/IEC 11770-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS
CSA ISO/IEC 14888-2 :2009 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 2: INTEGER FACTORIZATION BASED MECHANISMS
ISO/IEC 24713-2:2008 Information technology Biometric profiles for interoperability and data interchange Part 2: Physical access control for employees at airports
ISO/IEC 20008-2:2013 Information technology — Security techniques — Anonymous digital signatures — Part 2: Mechanisms using a group public key
ISO 19092-1:2006 Financial services Biometrics Part 1: Security framework
ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
ISO/IEC 29150:2011 Information technology — Security techniques — Signcryption
ISO/IEC 14888-2:2008 Information technology Security techniques Digital signatures with appendix Part 2: Integer factorization based mechanisms
ISO/IEC 14888-3:2016 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
INCITS/ISO/IEC 9798-5 : 2010 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO-KNOWLEDGE TECHNIQUES
BS ISO/IEC 9798-5:2009 Information technology. Security techniques. Entity authentication Mechanisms using zero knowledge techniques
15/30268565 DC : 0 BS ISO/IEC 18370-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BLIND DIGITAL SIGNATURES - PART 2: DISCRETE LOGARITHM BASED MECHANISMS
05/30112566 DC : DRAFT JAN 2005 ISO 11568-4 - BANKING - KEY MANAGEMENT (RETAIL) - PART 4: ASYMMETRIC CRYPTOSYSTEMS - KEY MANAGEMENT AND LIFE CYCLE
BS ISO/IEC 9797-2:2011 Information technology. Security techniques. Message Authentication Codes (MACs) Mechanisms using a dedicated hash-function
05/30116896 DC : DRAFT SEP 2005 ISO 19092-1 - FINANCIAL SERVICES - BIOMETRICS - PART 1: SECURITY FRAMEWORK
INCITS/ISO/IEC 11770-4 : 2008 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS
TS 119 312 : 1.2.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); CRYPTOGRAPHIC SUITES
ISO 11568-4:2007 Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle
CSA ISO/IEC 11770-4 : 2007 : R2017 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS
CAN/CSA-ISO/IEC 18367:18 Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing (Adopted ISO/IEC 18367:2016, first edition, 2016-12-15)
CSA ISO/IEC 11770-4 : 2007 : INC : COR 1 : 2010 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS
CSA ISO/IEC 11770-4 : 2007 : R2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS
CSA ISO/IEC 11770-4 : 2007 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS

ISO/IEC 15946-1:2016 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General
AS ISO/IEC 9797.2:2019 Information technology - Security techniques - Message Authentication Codes (MACs) Mechanisms using a dedicated hash-function
ISO/IEC 9796-2:2010 Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.