US$729.00 · In stock Delivery: <= 6 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 17964-2021: Information security technology - Modes of operation for a block cipher Status: Valid GB/T 17964: Evolution and historical versions
Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
GB/T 17964-2021 | English | 729 |
Add to Cart
|
6 days [Need to translate]
|
Information security technology - Modes of operation for a block cipher
| Valid |
GB/T 17964-2021
|
GB/T 17964-2008 | English | 150 |
Add to Cart
|
0--9 seconds. Auto-delivery
|
Information technology -- Security techniques -- Modes of operation for a block cipher
| Obsolete |
GB/T 17964-2008
|
GB/T 17964-2000 | English | 679 |
Add to Cart
|
3 days [Need to translate]
|
IT security technology n-bit block cipher mode of operation
| Obsolete |
GB/T 17964-2000
|
PDF similar to GB/T 17964-2021
Basic data Standard ID | GB/T 17964-2021 (GB/T17964-2021) | Description (Translated English) | Information security technology - Modes of operation for a block cipher | Sector / Industry | National Standard (Recommended) | Classification of Chinese Standard | L80 | Word Count Estimation | 40,454 | Issuing agency(ies) | State Administration for Market Regulation, China National Standardization Administration |
GB/T 17964-2021: Information security technology - Modes of operation for a block cipher---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology - Modes of operation for a block cipher
ICS 35.030
CCSL80
National Standards of People's Republic of China
Replace GB/T 17964-2008
Information Security Technology
Working mode of block cipher algorithm
Released on 2021-10-11
2022-05-01 implementation
State Administration for Market Regulation
Issued by the National Standardization Management Committee
Table of contents
Foreword Ⅲ
1 Scope 1
2 Normative references 1
3 Terms and definitions 1
4 Symbols and abbreviations 3
4.1 Symbol 3
4.2 Abbreviations 4
5 Codebook working mode 4
5.1 Variable definition 4
5.2 Description of ECB encryption method 5
5.3 Description of ECB decryption method 5
6 Working mode of ciphertext grouping and linking 5
6.1 Variable definition 5
6.2 Description of CBC encryption method 6
6.3 Description of CBC decryption method 6
7 ciphertext feedback working mode 7
7.1 Variable definition 7
7.2 Description of CFB encryption mode 7
7.3 Description of CFB decryption method 8
8 Output feedback working mode 8
8.1 Variable definition 8
8.2 OFB encryption method description 9
8.3 Description of OFB decryption method 9
9 Counter working mode 10
9.1 Variable definition 10
9.2 Description of CTR encryption mode 10
9.3 Description of CTR decryption method 11
10 XEX adjustable block cipher working mode with ciphertext embezzlement 11
10.1 Variable definition 11
10.2 XTS encryption method description 12
10.2.1 The length of the plaintext satisfies an integer multiple of the packet length 12
10.2.2 The length of the plaintext does not satisfy the integer multiple of the packet length 12
10.3 Description of XTS decryption method 13
10.3.1 The length of the ciphertext satisfies an integer multiple of the packet length 13
10.3.2 The length of the ciphertext does not satisfy an integer multiple of the packet length 13
11 Counter working mode with pan-hash function 14
11.1 Variable definition 14
11.2 Description of HCTR encryption method 15
11.3 Description of HCTR decryption method 15
12 Group link working mode 16
12.1 Variable definition 16
12.2 BC encryption method description 16
12.3 Description of BC decryption method 17
13 Output feedback working mode with nonlinear function 17
13.1 Variable definition 17
13.2 OFBNLF encryption method description 18
13.3 Description of OFBNLF decryption method 18
Appendix A (informative) The nature of the work model 19
Appendix B (Informative) Working Mode Examples 27
Appendix C (informative) Example of filling method 35
Reference 36
Foreword
This document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for Standardization Work Part 1.Structure and Drafting Rules of Standardization Documents"
Drafting.
This document replaces GB/T 17964-2008 "Working Mode of Information Security Technology Block Cipher Algorithms", and is compatible with GB/T 17964-2008
Compared with.2008, in addition to structural adjustments and editorial changes, the main technical changes are as follows.
a) Deleted common terms such as "block cipher", and added multiple terms such as "XEX structure" (see Chapter 3,.2008 edition 3.1);
b) Deleted multiple definitions such as "bit array expression" (see 3.2 in the.2008 edition);
c) Added multiple symbols such as bit (S, i) (see 4.1);
d) Acronyms such as "HCTR" and "XTS" have been added (see 4.2);
e) Added a schematic diagram of the encryption algorithm and decryption algorithm of the ECB working mode (see Chapter 5);
f) Deleted 7.1 and 8.1, and added relevant parameter definitions to 4.1 symbols (see Chapter 7 and Chapter 8 of the.2008 edition);
g) Adjusted Chapter 10 "Group Link (BC) Mode" to the newly added Chapter 12, and added "XEX Adjustable Points with Ciphertext Misappropriation"
"Group password working mode" is Chapter 10 (see Chapter 10, Chapter 12, Chapter 10 of the.2008 edition);
h) Adjust Chapter 11 "Operation Mode of Output Feedback with Nonlinear Function (OFBNLF)" to the newly added Chapter 13, adding
"Counter working mode with pan-hash function" is Chapter 11 (see Chapter 11, Chapter 13, Chapter 11 of the.2008 edition);
i) Changed the normative appendix A to informative appendix A (see Appendix A, Appendix A of the.2008 edition);
j) The specific method of ciphertext stealing has been changed, a schematic diagram has been added, and the name of "ciphertext stealing" has been renamed as "ciphertext embezzlement" (see Appendix A,
Appendix A of the.2008 edition);
k) Added the nature of the XTS working mode and the nature of the HCTR working mode (see Appendix A);
l) The block cipher that generates the working mode example is changed to the SM4 algorithm (see Appendix B, Appendix B of the.2008 edition);
m) Added examples of XTS working mode and HCTR working mode (see Appendix B);
n) An informative Appendix C has been added, which lists three common filling methods and gives examples (see Appendix C).
Please note that some of the contents of this document may involve patents. The issuing agency of this document is not responsible for identifying patents.
This document was proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260).
This document was drafted by. Chengdu Weishitong Information Industry Co., Ltd., Institute of Software, Chinese Academy of Sciences, Chinese Academy of Sciences
Communication Protection Research and Education Center, Commercial Password Testing Center of National Cryptography Administration, Geer Software Co., Ltd., Xi'an Xidian Jietong No
Line Network Communications Co., Ltd., Shanghai Information Security Engineering Technology Research Center.
The main drafters of this document. Zhang Liting, Suihan, Tu Binbin, Li Shimin, Luo Jun, Wang Peng, Mao Yingying, Zheng Qiang, Zhang Guoqiang, Xu Mingyi.
The previous releases of this document and the documents it replaced are as follows.
---First published in.2000 as GB/T 17964-2000; first revised in.2008;
---This is the second revision.
Information Security Technology
Working mode of block cipher algorithm
1 Scope
This document describes the working modes of nine block cipher algorithms, and gives the parameters and methods.
This document is suitable for guiding the use of block cipher algorithms when encrypting and decrypting data.
The working mode described in this document is only suitable for protecting the confidentiality of data, not for protecting the integrity of data.
2 Normative references
The content of the following documents constitutes an indispensable clause of this document through normative references in the text. Among them, dated quotations
Only the version corresponding to that date is applicable to this document; for undated reference documents, the latest version (including all amendments) is applicable to
This document.
GB/T 25069-2010 Information Security Technical Terms
GM/Z4001-2013 Cryptographic terms
3 Terms and definitions
The following terms and definitions defined in GB/T 25069-2010 and GM/Z4001-2013 apply to this document.
3.1
Block cipher algorithm working mode blockcipheroperationmode
The use of block cipher algorithms mainly includes codebook working mode, ciphertext group link working mode, ciphertext feedback working mode,
Output feedback working mode, counter working mode, XEX adjustable block cipher working mode with ciphertext embezzlement, counter with pan-hash function
Counter working mode, group link working mode, output feedback working mode with nonlinear function, etc.
[Source. GM/Z4001-2013, 2.26, with modification]
3.2
Electroniccodebook (ECB) operationmode
A working mode of the block cipher algorithm, which is characterized by directly using the plaintext group as the input of the algorithm, and the corresponding output as the ciphertext
Grouping.
[Source. GM/Z4001-2013, 2.10]
3.3
Cipherblockchaining (CBC) operationmode
A working mode of the block cipher algorithm, which is characterized by performing an exclusive OR operation on the current plaintext block and the previous ciphertext block before entering it.
Line encryption to get the current ciphertext packet.
[Source. GM/Z4001-2013, 2.62]
3.4
Cipherfeedback (CFB) operationmode
Use block cipher algorithm to construct a working mode of sequence cipher. It is characterized by using several bits currently output by the grouping algorithm, and
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 17964-2021_English be delivered?Answer: Upon your order, we will start to translate GB/T 17964-2021_English as soon as possible, and keep you informed of the progress. The lead time is typically 4 ~ 6 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GB/T 17964-2021_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 17964-2021_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay. Question 5: Should I purchase the latest version GB/T 17964-2021?Answer: Yes. Unless special scenarios such as technical constraints or academic study, you should always prioritize to purchase the latest version GB/T 17964-2021 even if the enforcement date is in future. Complying with the latest version means that, by default, it also complies with all the earlier versions, technically.
|