Home Cart Quotation About-Us
www.ChineseStandard.net
SEARCH

GB/T 17964-2021 English PDF

US$729.00 · In stock
Delivery: <= 6 days. True-PDF full-copy in English will be manually translated and delivered via email.
GB/T 17964-2021: Information security technology - Modes of operation for a block cipher
Status: Valid

GB/T 17964: Historical versions

Standard IDUSDBUY PDFLead-DaysStandard Title (Description)Status
GB/T 17964-2021729 Add to Cart 6 days Information security technology - Modes of operation for a block cipher Valid
GB/T 17964-2008150 Add to Cart Auto, < 3 mins Information technology -- Security techniques -- Modes of operation for a block cipher Obsolete
GB/T 17964-2000679 Add to Cart 3 days IT security technology n-bit block cipher mode of operation Obsolete

Similar standards

GB/T 18336.1   GB/T 18336.2   GB/T 18336.3   GB/T 37027   GB/T 19713   

Basic data

Standard ID: GB/T 17964-2021 (GB/T17964-2021)
Description (Translated English): Information security technology - Modes of operation for a block cipher
Sector / Industry: National Standard (Recommended)
Classification of Chinese Standard: L80
Word Count Estimation: 40,454
Issuing agency(ies): State Administration for Market Regulation, China National Standardization Administration

GB/T 17964-2021: Information security technology - Modes of operation for a block cipher

---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology - Modes of operation for a block cipher ICS 35.030 CCSL80 National Standards of People's Republic of China Replace GB/T 17964-2008 Information Security Technology Working mode of block cipher algorithm Released on 2021-10-11 2022-05-01 implementation State Administration for Market Regulation Issued by the National Standardization Management Committee

Table of contents

Foreword Ⅲ 1 Scope 1 2 Normative references 1 3 Terms and definitions 1 4 Symbols and abbreviations 3 4.1 Symbol 3 4.2 Abbreviations 4 5 Codebook working mode 4 5.1 Variable definition 4 5.2 Description of ECB encryption method 5 5.3 Description of ECB decryption method 5 6 Working mode of ciphertext grouping and linking 5 6.1 Variable definition 5 6.2 Description of CBC encryption method 6 6.3 Description of CBC decryption method 6 7 ciphertext feedback working mode 7 7.1 Variable definition 7 7.2 Description of CFB encryption mode 7 7.3 Description of CFB decryption method 8 8 Output feedback working mode 8 8.1 Variable definition 8 8.2 OFB encryption method description 9 8.3 Description of OFB decryption method 9 9 Counter working mode 10 9.1 Variable definition 10 9.2 Description of CTR encryption mode 10 9.3 Description of CTR decryption method 11 10 XEX adjustable block cipher working mode with ciphertext embezzlement 11 10.1 Variable definition 11 10.2 XTS encryption method description 12 10.2.1 The length of the plaintext satisfies an integer multiple of the packet length 12 10.2.2 The length of the plaintext does not satisfy the integer multiple of the packet length 12 10.3 Description of XTS decryption method 13 10.3.1 The length of the ciphertext satisfies an integer multiple of the packet length 13 10.3.2 The length of the ciphertext does not satisfy an integer multiple of the packet length 13 11 Counter working mode with pan-hash function 14 11.1 Variable definition 14 11.2 Description of HCTR encryption method 15 11.3 Description of HCTR decryption method 15 12 Group link working mode 16 12.1 Variable definition 16 12.2 BC encryption method description 16 12.3 Description of BC decryption method 17 13 Output feedback working mode with nonlinear function 17 13.1 Variable definition 17 13.2 OFBNLF encryption method description 18 13.3 Description of OFBNLF decryption method 18 Appendix A (informative) The nature of the work model 19 Appendix B (Informative) Working Mode Examples 27 Appendix C (informative) Example of filling method 35 Reference 36

Foreword

This document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for Standardization Work Part 1.Structure and Drafting Rules of Standardization Documents" Drafting. This document replaces GB/T 17964-2008 "Working Mode of Information Security Technology Block Cipher Algorithms", and is compatible with GB/T 17964-2008 Compared with.2008, in addition to structural adjustments and editorial changes, the main technical changes are as follows. a) Deleted common terms such as "block cipher", and added multiple terms such as "XEX structure" (see Chapter 3,.2008 edition 3.1); b) Deleted multiple definitions such as "bit array expression" (see 3.2 in the.2008 edition); c) Added multiple symbols such as bit (S, i) (see 4.1); d) Acronyms such as "HCTR" and "XTS" have been added (see 4.2); e) Added a schematic diagram of the encryption algorithm and decryption algorithm of the ECB working mode (see Chapter 5); f) Deleted 7.1 and 8.1, and added relevant parameter definitions to 4.1 symbols (see Chapter 7 and Chapter 8 of the.2008 edition); g) Adjusted Chapter 10 "Group Link (BC) Mode" to the newly added Chapter 12, and added "XEX Adjustable Points with Ciphertext Misappropriation" "Group password working mode" is Chapter 10 (see Chapter 10, Chapter 12, Chapter 10 of the.2008 edition); h) Adjust Chapter 11 "Operation Mode of Output Feedback with Nonlinear Function (OFBNLF)" to the newly added Chapter 13, adding "Counter working mode with pan-hash function" is Chapter 11 (see Chapter 11, Chapter 13, Chapter 11 of the.2008 edition); i) Changed the normative appendix A to informative appendix A (see Appendix A, Appendix A of the.2008 edition); j) The specific method of ciphertext stealing has been changed, a schematic diagram has been added, and the name of "ciphertext stealing" has been renamed as "ciphertext embezzlement" (see Appendix A, Appendix A of the.2008 edition); k) Added the nature of the XTS working mode and the nature of the HCTR working mode (see Appendix A); l) The block cipher that generates the working mode example is changed to the SM4 algorithm (see Appendix B, Appendix B of the.2008 edition); m) Added examples of XTS working mode and HCTR working mode (see Appendix B); n) An informative Appendix C has been added, which lists three common filling methods and gives examples (see Appendix C). Please note that some of the contents of this document may involve patents. The issuing agency of this document is not responsible for identifying patents. This document was proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260). This document was drafted by. Chengdu Weishitong Information Industry Co., Ltd., Institute of Software, Chinese Academy of Sciences, Chinese Academy of Sciences Communication Protection Research and Education Center, Commercial Password Testing Center of National Cryptography Administration, Geer Software Co., Ltd., Xi'an Xidian Jietong No Line Network Communications Co., Ltd., Shanghai Information Security Engineering Technology Research Center. The main drafters of this document. Zhang Liting, Suihan, Tu Binbin, Li Shimin, Luo Jun, Wang Peng, Mao Yingying, Zheng Qiang, Zhang Guoqiang, Xu Mingyi. The previous releases of this document and the documents it replaced are as follows. ---First published in.2000 as GB/T 17964-2000; first revised in.2008; ---This is the second revision. Information Security Technology Working mode of block cipher algorithm

1 Scope

This document describes the working modes of nine block cipher algorithms, and gives the parameters and methods. This document is suitable for guiding the use of block cipher algorithms when encrypting and decrypting data. The working mode described in this document is only suitable for protecting the confidentiality of data, not for protecting the integrity of data.

2 Normative references

The content of the following documents constitutes an indispensable clause of this document through normative references in the text. Among them, dated quotations Only the version corresponding to that date is applicable to this document; for undated reference documents, the latest version (including all amendments) is applicable to This document. GB/T 25069-2010 Information Security Technical Terms GM/Z4001-2013 Cryptographic terms

3 Terms and definitions

The following terms and definitions defined in GB/T 25069-2010 and GM/Z4001-2013 apply to this document. 3.1 Block cipher algorithm working mode blockcipheroperationmode The use of block cipher algorithms mainly includes codebook working mode, ciphertext group link working mode, ciphertext feedback working mode, Output feedback working mode, counter working mode, XEX adjustable block cipher working mode with ciphertext embezzlement, counter with pan-hash function Counter working mode, group link working mode, output feedback working mode with nonlinear function, etc. [Source. GM/Z4001-2013, 2.26, with modification] 3.2 Electroniccodebook (ECB) operationmode A working mode of the block cipher algorithm, which is characterized by directly using the plaintext group as the input of the algorithm, and the corresponding output as the ciphertext Grouping. [Source. GM/Z4001-2013, 2.10] 3.3 Cipherblockchaining (CBC) operationmode A working mode of the block cipher algorithm, which is characterized by performing an exclusive OR operation on the current plaintext block and the previous ciphertext block before entering it. Line encryption to get the current ciphertext packet. [Source. GM/Z4001-2013, 2.62] 3.4 Cipherfeedback (CFB) operationmode Use block cipher algorithm to construct a working mode of sequence cipher. It is characterized by using several bits currently output by the grouping algorithm, and
......
Image     

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GB/T 17964-2021_English be delivered?

Answer: Upon your order, we will start to translate GB/T 17964-2021_English as soon as possible, and keep you informed of the progress. The lead time is typically 4 ~ 6 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GB/T 17964-2021_English with my colleagues?

Answer: Yes. The purchased PDF of GB/T 17964-2021_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.

Question 5: Should I purchase the latest version GB/T 17964-2021?

Answer: Yes. Unless special scenarios such as technical constraints or academic study, you should always prioritize to purchase the latest version GB/T 17964-2021 even if the enforcement date is in future. Complying with the latest version means that, by default, it also complies with all the earlier versions, technically.