ISO/IEC 18032:2005
$41.60
Information technology — Security techniques — Prime number generation
Published By | Publication Date | Number of Pages |
ISO | 2005-01 | 24 |
If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]
ISO/IEC 18032:2005 specifies methods for generating and testing prime numbers. Prime numbers are used in various cryptographic algorithms, mainly in asymmetric encryption algorithms and digital signature algorithms.
Firstly, ISO/IEC 18032:2005 specifies methods for testing whether a given number is prime. The testing methods included in ISO/IEC 18032:2005 can be divided into two groups:
- Probabilistic primality tests, which have a small error probability. All probabilistic tests described here may declare a composite to be a prime. One test described here may declare a prime to be composite.
- Deterministic methods, which are guaranteed to give the right verdict. These methods use so-called primality certificates.
Secondly, ISO/IEC 18032:2005 specifies methods to generate prime numbers. Again, both probabilistic and deterministic methods are presented.
Published Code | ISO |
---|---|
Published By | International Organization for Standardization |
Publication Date | 2005-01 |
Pages Count | 24 |
Language | English |
Edition | 1 |
File Size | 245.8 KB |
ICS Codes | 35.030 - IT Security |
Related products
-
ISO/IEC 18033-2:2006/Amd 1:2017
Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers — Amendment…
-
BS ISO/IEC 18033-1:2015
Information technology. Security techniques. Encryption algorithms – General Published By Publication Date Number of Pages…
-
ISO/IEC 21481:2005
Information technology — Telecommunications and information exchange between systems — Near Field Communication Interface and…
-
CSA ISO/IEC 14888-2:09 (R2019):2009 Edition
Information technology – Security techniques – Digital signatures with appendix – Part 2: Integer factorization-based…
-
ISO/IEC 18033-1:2005/Amd 1:2011
Information technology — Security techniques — Encryption algorithms — Part 1: General — Amendment 1…
-
BS EN ISO 18332:2008
Metallic and other inorganic coatings. Definitions and conventions concerning porosity Published By Publication Date Number…
-
CAN/CSA-ISO/IEC 18033-1:16:2016 Edition
Information technology – Security techniques – Encryption algorithms – Part 1: General Published By Publication…
-
ISO/IEC 10116:2006
Information technology — Security techniques — Modes of operation for an n-bit block cipher Published…
-
BS ISO/IEC 18033-2:2006+A1:2017:2018 Edition
Information technology. Security techniques. Encryption algorithms – Asymmetric ciphers Published By Publication Date Number of…
-
ISO/IEC 18033-1:2015
Information technology — Security techniques — Encryption algorithms — Part 1: General Published By Publication…
-
CAN/CSA-ISO/IEC 18033-4:13:2013 Edition
Information technology – Security techniques – Encryption algorithms – Part 4: Stream ciphers Published By…
-
BS ISO 1832:2004:2006 Edition
Indexable inserts for cutting tools. Designation Published By Publication Date Number of Pages BSI 2006…
-
BS ISO/IEC 18033-3:2005:2008 Edition
Information technology. Security techniques. Encryption algorithms – Block ciphers Published By Publication Date Number of…
-
BS ISO/IEC 18033-1:2005+A1:2011
Information technology. Security techniques. Encryption algorithms – General Published By Publication Date Number of Pages…
-
ISO/IEC 18012-1:2004
Information technology — Home Electronic System — Guidelines for product interoperability — Part 1: Introduction…
-
CSA ISO/IEC 18032:21:2021 Edition
Information security — Prime number generation Published By Publication Date Number of Pages CSA 2021…
-
ISO/IEC 18035:2003
Information technology — Icon symbols and functions for controlling multimedia software applications Published By Publication…
-
CAN/CSA-ISO/IEC 18031:13:2013 Edition
Information technology – Security techniques – Random bit generation Published By Publication Date Number of…
-
ISO/IEC 15946-5:2009
Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5:…
-
ISO/TR 19038:2005
Banking and related financial services — Triple DEA — Modes of operation — Implementation guidelines…
-
ISO/IEC 18036:2003
Information technology — Icon symbols and functions for World Wide Web browser toolbars Published By…
-
BS ISO/IEC 18033-4:2005+A1:2009:2010 Edition
Information technology. Security techniques. Encryption algorithms – Stream ciphers Published By Publication Date Number of…
-
CSA ISO/IEC 18033-5:20:2020 Edition
Information technology — Security techniques — Encryption algorithms — Part 5: Identity-based ciphers Published By…
-
AS/NZS ISO/IEC 18033.4:2006
Information technology – Security techniques – Encryption algorithms – Stream ciphers Published By Publication Date…
-
ISO/IEC 18033-1:2005
Information technology — Security techniques — Encryption algorithms — Part 1: General Published By Publication…
-
AS/NZS ISO/IEC 18033.1:2006
Information technology – Security techniques – Encryption algorithms – General Published By Publication Date Number…
-
CAN/CSA-ISO/IEC 18033-3:12:2012 Edition
Information technology – Security techniques – Encryption algorithms – Part 3: Block ciphers Published By…
-
BSI PD ISO/IEC TR 10032:2003:2004 Edition
Information technology. Reference model of data management Published By Publication Date Number of Pages BSI…
-
AS/NZS ISO/IEC 18033.2:2008
Information technology – Security techniques – Encryption algorithms – Part 2: Asymmetric ciphers Published By…
-
AS/NZS ISO/IEC 18033.3:2006
Information technology – Security techniques – Encryption algorithms – Block ciphers Published By Publication Date…
-
BS ISO/IEC 18033-5:2015
Information technology. Security techniques. Encryption algorithms – Identity-based ciphers Published By Publication Date Number of…
-
BS ISO 18932:2005
Imaging materials. Adhesive mounting systems. Specifications Published By Publication Date Number of Pages BSI 2005…
-
ISO/IEC 18033-2:2006
Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers Published By…
-
BSI PD ISO/IEC TR 18037:2008
Programming languages. C. Extensions to support embedded processors Published By Publication Date Number of Pages…
-
BS ISO/IEC 18033-5:2015+A1:2021
Information technology. Security techniques. Encryption algorithms – Identity-based ciphers Published By Publication Date Number of…
-
CSA ISO/IEC TR 18037:09 (R2019):2009 Edition
Programming languages – C – Extensions to support embedded processors Published By Publication Date Number…
-
BS ISO/IEC 18032:2005
Information technology. Security techniques. Prime number generation Published By Publication Date Number of Pages BSI…
-
ISO/IEC 19796-1:2005
Information technology — Learning, education and training — Quality management, assurance and metrics — Part…
-
BS ISO/IEC 18031:2005:2009 Edition
Information technology. Security techniques. Random bit generation Published By Publication Date Number of Pages BSI…
-
BSI PD ISO/IEC TR 18037:2004
Programming languages. C. Extensions to support embedded processors Published By Publication Date Number of Pages…