Skip to main content

ISO/IEC 18033-4:2005

Withdrawn Date published:

Warning: Withdrawn Standard. This document has been replaced by:

Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers

ISO/IEC 18033-4:2005 specifies stream cipher algorithms. A stream cipher is an encryption mechanism that uses a keystream to encrypt a plaintext in bitwise or block-wise manner. A stream cipher is technically specified by choosing a keystream generator and a mode of stream ciphers.

ISO/IEC 18033-4:2005 specifies the following ways to generate keystream.

  • Mechanisms based on a block cipher: OFB, CTR, and CFB modes of block ciphers.
  • Dedicated keystream generators: MUGI and SNOW 2.0.

ISO/IEC 18033-4:2005 specifies the following modes of stream ciphers:

  • binary-additive output function,
  • MULTI-S01 output function.

There are two types of stream cipher: a synchronous stream cipher, in which the keystream is only generated from the secret key (and an initialization vector) and a self-synchronizing stream cipher, in which the keystream is generated from the secret key and some past ciphertexts (and an initialization vector). Typically the encryption operation is the additive bitwise XOR operation between a keystream and the message. ISO/IEC 18033-4:2005 describes pseudorandom number generators for producing both keystream and output functions for stream ciphers.

Get this standard Prices exclude GST
PDF ( Single user document)
$126.00 NZD
HardCopy
$173.00 NZD
Networkable PDF
Price varies
Preview only close
Prev {{ page }}/ {{ numPages }} Next
Preview only close
Prev {{ page }}/ {{ numPages }} Next

Keep me up-to-date

Sign up to receive updates when there are changes to this standard

Related Information

Similar Standards

  • AS/NZS ISO/IEC 27001:2023

    Information security, cybersecurity and privacy protection – Information security management systems – Requirements

  • AS/NZS ISO/IEC 27001:2023 A1

    Information security, cybersecurity and privacy protection - Privacy enhancing data de-identification framework

  • AS/NZS ISO/IEC 27002:2022

    Information security, cybersecurity and privacy protection — Information security controls

  • AS/NZS ISO/IEC 27011:2025

    Information security, cybersecurity and privacy protection – Information security controls based on ISO/IEC 27002 for telecommunications organizations

Preview only close
Prev {{ page }}/ {{ numPages }} Next
Preview only close
Prev {{ page }}/ {{ numPages }} Next

ISO/IEC 18033-4:2005

Get this standard Prices exclude GST
PDF ( Single user document)
$126.00 NZD
HardCopy
$173.00 NZD
Networkable PDF
Price varies

Request to add this standard to your subscription

ISO/IEC 18033-4:2005

Price varies
Online library subscription

Your organisation’s Account Administrator must approve a request to add a standard to your subscription.

You may add a comment to the administrator below.

Cancel