{"id":633673,"date":"2024-11-06T00:43:55","date_gmt":"2024-11-06T00:43:55","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/iso-iec-18033-22006\/"},"modified":"2024-11-06T00:43:55","modified_gmt":"2024-11-06T00:43:55","slug":"iso-iec-18033-22006","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/iso\/iso-iec-18033-22006\/","title":{"rendered":"ISO\/IEC 18033-2:2006"},"content":{"rendered":"

ISO\/IEC 18033-2:2006 specifies encryption systems (ciphers) for the purpose of data confidentiality. The primary purpose of encryption (or encipherment<\/i>) techniques is to protect the confidentiality of stored or transmitted data. An encryption algorithm is applied to data (often called plaintext<\/i> or cleartext<\/i>) to yield encrypted data (or ciphertext<\/i>); this process is known as encryption<\/i>. The encryption algorithm should be designed so that the ciphertext yields no information about the plaintext except, perhaps, its length. Associated with every encryption algorithm is a corresponding decryption algorithm<\/i>, which transforms ciphertext back into its original plaintext.<\/p>\n

An asymmetric, i.e. public-key, encryption scheme allows a sender to use a recipient's public key to transmit an encryption of a message to the receiver, who can use his secret key to decrypt the given ciphertext, thereby obtaining the original message. <\/p>\n

Such a scheme should be secure in the sense that no information about the message should be leaked to a (resource-bounded) attacker, even if that attacker mounts a so-called 'chosen ciphertext' attack, in which he may obtain decryptions of other ciphertexts. This is the strongest type of attack that has been proposed for a public-key encryption scheme. <\/p>\n

ISO\/IEC 18033-2:2006 specifies the functional interface of such a scheme, and in addition specifies a number of particular schemes that appear to be secure against chosen ciphertext attack. The different schemes offer different trade-offs between security properties and efficiency.<\/p>\n","protected":false},"excerpt":{"rendered":"

Information technology \u2014 Security techniques \u2014 Encryption algorithms \u2014 Part 2: Asymmetric ciphers<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
ISO<\/b><\/a><\/td>\n2006-05<\/td>\n132<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":633687,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[656,2634],"product_tag":[],"class_list":{"0":"post-633673","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-030","7":"product_cat-iso","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/633673","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/633687"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=633673"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=633673"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=633673"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}