Skip to main content

ISO/IEC 18033-2:2006

Date published:

Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers

ISO/IEC 18033-2:2006 specifies encryption systems (ciphers) for the purpose of data confidentiality. The primary purpose of encryption (or encipherment) techniques is to protect the confidentiality of stored or transmitted data. An encryption algorithm is applied to data (often called plaintext or cleartext) to yield encrypted data (or ciphertext); this process is known as encryption. The encryption algorithm should be designed so that the ciphertext yields no information about the plaintext except, perhaps, its length. Associated with every encryption algorithm is a corresponding decryption algorithm, which transforms ciphertext back into its original plaintext.

An asymmetric, i.e. public-key, encryption scheme allows a sender to use a recipient's public key to transmit an encryption of a message to the receiver, who can use his secret key to decrypt the given ciphertext, thereby obtaining the original message.

Such a scheme should be secure in the sense that no information about the message should be leaked to a (resource-bounded) attacker, even if that attacker mounts a so-called 'chosen ciphertext' attack, in which he may obtain decryptions of other ciphertexts. This is the strongest type of attack that has been proposed for a public-key encryption scheme.

ISO/IEC 18033-2:2006 specifies the functional interface of such a scheme, and in addition specifies a number of particular schemes that appear to be secure against chosen ciphertext attack. The different schemes offer different trade-offs between security properties and efficiency.

Get this standard Prices exclude GST
PDF ( Single user document)
$403.48 NZD
HardCopy
$459.13 NZD
Networkable PDF
Price varies
Preview only close
Prev {{ page }}/ {{ numPages }} Next
Preview only close
Prev {{ page }}/ {{ numPages }} Next

Keep me up-to-date

Register to receive notifications when updates are made to this standard.

Related Information

Similar Standards

  • AS/NZS ISO/IEC 27001:2023

    Information security, cybersecurity and privacy protection – Information security management systems – Requirements

  • AS/NZS ISO/IEC 27002:2022

    Information security, cybersecurity and privacy protection — Information security controls

  • AS/NZS ISO/IEC 27551:2024

    Information security, cybersecurity and privacy protection – Requirements for attribute-based unlinkable entity authentication

  • BS 10754-1:2018

    Information technology. Systems trustworthiness, Governance and management specification

Preview only close
Prev {{ page }}/ {{ numPages }} Next
Preview only close
Prev {{ page }}/ {{ numPages }} Next

ISO/IEC 18033-2:2006

Get this standard Prices exclude GST
PDF ( Single user document)
$403.48 NZD
HardCopy
$459.13 NZD
Networkable PDF
Price varies

Request to add this standard to your subscription

ISO/IEC 18033-2:2006

Price varies
Online library subscription

Click "Send request for subscription" to ask your Account Administrator to add this standard to your subscripiton.

Cancel