{"id":390500,"date":"2024-10-20T03:55:00","date_gmt":"2024-10-20T03:55:00","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-18033-12021-tc\/"},"modified":"2024-10-26T07:13:33","modified_gmt":"2024-10-26T07:13:33","slug":"bs-iso-iec-18033-12021-tc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-18033-12021-tc\/","title":{"rendered":"BS ISO\/IEC 18033-1:2021 – TC"},"content":{"rendered":"

This document is general in nature and provides definitions that apply in subsequent parts of the ISO\/IEC 18033 series<\/span><\/span> .<\/p>\n

It introduces the nature of encryption and describes certain general aspects of its use and properties.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
38<\/td>\nNational foreword <\/td>\n<\/tr>\n
42<\/td>\nForeword <\/td>\n<\/tr>\n
43<\/td>\nIntroduction <\/td>\n<\/tr>\n
45<\/td>\n1 Scope
2 Normative references
3 Terms and definitions <\/td>\n<\/tr>\n
49<\/td>\n4 Symbols and abbreviated terms
5 Nature of encryption
5.1 Purpose of encryption <\/td>\n<\/tr>\n
50<\/td>\n5.2 Symmetric and asymmetric encryption systems
5.3 Key management
6 Use and properties of encryption
6.1 General <\/td>\n<\/tr>\n
51<\/td>\n6.2 Asymmetric encryption systems
6.3 Block ciphers
6.3.1 General
6.3.2 Modes of operation
6.3.3 Message authentication codes (MACs) <\/td>\n<\/tr>\n
52<\/td>\n6.4 Stream ciphers
6.5 Identity-based encryption systems
6.6 Homomorphic encryption systems
7 Object identifiers <\/td>\n<\/tr>\n
53<\/td>\nAnnex A (informative) Criteria for submission of encryption systems for possible inclusion in the ISO\/IEC 18033 series <\/td>\n<\/tr>\n
58<\/td>\nAnnex B (informative) Criteria for the deletion of encryption systems from the ISO\/IEC 18033 series <\/td>\n<\/tr>\n
59<\/td>\nAnnex C (informative) Attacks on encryption algorithms <\/td>\n<\/tr>\n
62<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Tracked Changes. Information security. Encryption algorithms – General<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2022<\/td>\n64<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":390508,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-390500","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/390500","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/390508"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=390500"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=390500"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=390500"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}