说明:收录全球国际标准 提供单次或批量下载
ISO/IEC INTERNATIONAL STANDARD 18031 Second edition 2011-11-15 Information technology Security techniques Random bit generation Technologies de l'information Techniques de sécurité Génération debitsaléatoires Reference number ISO/IEC 18031:2011(E) Iso IEC @ISO/EC2011 ISO/IEC 18031:2011(E) COPYRIGHT PROTECTED DOCUMENT @ISO/IEC2011 All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means, ISO's member body in the country of the requester. ISO copyright office Case postale 56 : CH-1211 Geneva 20 Tel. + 41 22 749 01 11 Fax + 4122 749 09 47 E-mail [email protected] Web www.iso.org Published in Switzerland ISO/IEC 2011-All riahtsreserved ISO/IEC18031:2011(E) Contents Page Foreword .vi Introduction ..vii 1 Scope 2 Normative references 3 Terms and definitions .. 4 Symbols. .5 5 Properties and requirements of an RBG.... 5.1 Properties of an RBG . 5.2 Requirements of an RBG.. 5.3 Optional requirements for an RBG 6 6.1 Conceptual functional model for random bit generation .. .8 6.2 RBG basic components... 6.2.1 Introduction to the RBG basic components.. 6.2.2 Entropy source .... 6.2.3 Additional inputs .. 10 6.2.4 Internal state .. 6.2.5 Internalstatetransitionfunctions 6.2.6 Output generation function .. 13 6.2.7 Support functions.. 7 Types of RBGs.. 14 7.1 Introduction to the types of RBGs. 14 7.2 Non-deterministic random bit generators.... 7.3 Deterministic random bit generators . 15 7.4 15 8 Overview and requirements for an NRBG. 8.1 16 8.2 Functional model of an NRBG, 16 8.3 NRBG entropy sources... 18 8.3.1 Primary entropy source for an NRBG 18 8.3.2 Physical entropy sources for an NRBG 8.3.3 NRBG non-physical entropy sources. 20 8.3.4 NRBG additional entropy sources. 21 8.3.5 Hybrid NRBGs.... ..22 8.4 NRBG additional inputs 22 8.4.1 NRBG additional inputs overview. 22 8.4.2 Requirements for NRBG additional inputs . 22 8.5 NRBG internall state...... 8.5.1 NRBGinternalstateoverview.. 23 8.5.2 RequirementsfortheNRBGinternalstate.. 23 8.5.3 Optional requirements for the NRBG internal state.... 24 8.6 NRBG internal state transition functions.... 8.6.1 NRBG internal state transition functions overview . 24 8.6.2 Requirements for the NRBG internal state transition functions . 25 8.6.3 Optional requirements for the NRBG internal state transition functions..... 8.7 NRBG output generation function .... 26 8.7.1 NRBG output generation function overview.. 26 8.7.2 Requirements for the NRBG output generation function.... 26 All riahts reserved ili ISO/IEC 18031:2011(E) 8.7.3 8.8 NRBG health tests .. .26 8.8.1 NRBG health tests overview... .26 8.8.2 8.8.3 NRBG health test on deterministic components.. ..27 8.8.4 NRBG health tests on entropy sources... .28 8.8.5 NRBG health tests on random output ... .29 8.9 NRBG component interaction .. 8.9.1 NRBG component interaction overview .. .31 8.9.2 Requirements for NRBG component interaction .... .31 8.9.3 Optional requirements for NRBG component interaction............ 9 Overview and requirements for a DRBG .31 9.1 DRBG overview...... 9.2 Functional model of a DRBG.. ..32 9.3 DRBG entropy source ... .34 9.3.1 9.3.2 Generating seed values for a DRBG... ..36 9.3.3 Additional entropy sources for a DRBG. .36 9.3.4 Hybrid DRBG. .37 9.4 Additional inputs for a DRBG .... 9.5 InternalstateforaDRBG.. .37 9.6 Internal state transition function for a DRBG .38 9.7 Output generation function for a DRBG . 9.8 Support functions for a DRBG . ..39 9.8.1 DRBG support functions overview . .39 9.8.2 DRBGhealthtest .39 9.8.3 DRBG deterministic algorithm test...... 9.8.4 DRBG software/firmware integrity test... ..40 9.8.5 DRBG critical functions test.... .40 9.8.6 DRBG software/firmware load test... ..40 9.8.7 DRBG manual key entry test .... 9.8.8 DRBG continuous random bit generator test.. .40 9.9 Additional requirements for DRBG keys... 41 Annex A (normative) Combining RBGs ..43 Annex B (normative) Conversion methods .. .44 B.1 Random number

.pdf文档 ISO IEC 18031 2011 Information technology — Security techniques — Random bit generation

文档预览
中文文档 5 页 50 下载 1000 浏览 0 评论 309 收藏 3.0分
温馨提示:本文档共5页,可预览 3 页,如浏览全部内容或当前文档出现乱码,可开通会员下载原始文档
ISO IEC 18031 2011 Information technology — Security techniques — Random bit generation 第 1 页 ISO IEC 18031 2011 Information technology — Security techniques — Random bit generation 第 2 页 ISO IEC 18031 2011 Information technology — Security techniques — Random bit generation 第 3 页
下载文档到电脑,方便使用
本文档由 人生无常 于 2026-01-05 20:10:09上传分享
友情链接
站内资源均来自网友分享或网络收集整理,若无意中侵犯到您的权利,敬请联系我们微信(点击查看客服),我们将及时删除相关资源。