ISO/IEC INTERNATIONAL STANDARD 29192-1 First edition 2012-06-01 Information technology Security techniques Lightweight cryptography - Part 1: General Technologies de I'information - Techniques de sécurité Cryptographiepourenvironnementscontraints- Partie 1: Généralites Reference number ISO/IEC 29192-1:2012(E) IEC Tso @ISO/IEC2012 IHS unde Not for Resale ISO/IEC 29192-1:2012(E) COPYRIGHTPROTECTEDDOCUMENT ?ISO/IEC2012 All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from either isO at the address below or isO's memberbody in the country of the requester. ISO copyright office Case postale 56 . CH-1211 Geneva 20 Tel. + 41 22 749 01 11 Fax + 41 22 749 09 47 E-mail [email protected] Web www.iso.org Published in Switzerland ISO/IEC 2012-All rights reserved itted without license from IHS Not for Resale ISO/IEC 29192-1:2012(E) Contents Page Foreword Introductior 1 Scope 2 Terms and definitions. 3 Categories of constraints for lightweight cryptography. 3.1 Chip area .... 3.2 Energy consumption. 3.3 Program code size and RAM size 3.4 Communication bandwidth 3.5 Execution time ... 4 Requirements.. 4.1 Securityrequirements 4.2 Classification requirements. 4.3 Implementation requirements 5 Lightweight cryptographic mechanisms 5.1 Block ciphers... 5.2 Stream ciphers.. 5.3 Mechanisms using asymmetric techniques Annex A (informative)Selection criteria for inclusion of mechanisms in ISO/lE 29192 Annex B (informative) Obtaining metrics for hardware implementation comparison .8 Annex C (normative) Metrics for hardware targeted block and stream ciphers 11 Annex D (informative) Gate equivalents 12 Bibliography. 13 ii from IHS Not for Res
ISO IEC 29192-1 2012 Information technology — Security techniques — Lightweight cryptography — Part 1 General