{"id":350683,"date":"2024-10-20T00:43:34","date_gmt":"2024-10-20T00:43:34","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-101162017-tc\/"},"modified":"2024-10-26T00:31:57","modified_gmt":"2024-10-26T00:31:57","slug":"bs-iso-iec-101162017-tc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-101162017-tc\/","title":{"rendered":"BS ISO\/IEC 10116:2017 – TC"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
56<\/td>\nNational foreword <\/td>\n<\/tr>\n
60<\/td>\nForeword <\/td>\n<\/tr>\n
61<\/td>\nIntroduction <\/td>\n<\/tr>\n
63<\/td>\n1 Scope
2 Normative references
3 Terms and definitions <\/td>\n<\/tr>\n
65<\/td>\n4 Symbols, abbreviated terms and notation
4.1 Symbols and abbreviated terms <\/td>\n<\/tr>\n
66<\/td>\n4.2 Notation
5 Requirements <\/td>\n<\/tr>\n
67<\/td>\n6 Electronic Codebook (ECB) mode
6.1 Preliminaries
6.2 Encryption
6.3 Decryption <\/td>\n<\/tr>\n
68<\/td>\n7 Cipher Block Chaining (CBC) mode
7.1 Preliminaries
7.2 Encryption
7.3 Decryption <\/td>\n<\/tr>\n
69<\/td>\n7.4 Avoiding ciphertext expansion
7.4.1 General
7.4.2 Three ciphertext stealing variants of CBC <\/td>\n<\/tr>\n
70<\/td>\n8 Cipher Feedback (CFB) mode
8.1 Preliminaries <\/td>\n<\/tr>\n
71<\/td>\n8.2 Encryption <\/td>\n<\/tr>\n
72<\/td>\n8.3 Decryption
8.4 Avoiding ciphertext expansion <\/td>\n<\/tr>\n
73<\/td>\n9 Output Feedback (OFB) mode
9.1 Preliminaries
9.2 Encryption <\/td>\n<\/tr>\n
74<\/td>\n9.3 Decryption
9.4 Avoiding ciphertext expansion <\/td>\n<\/tr>\n
75<\/td>\n10 Counter (CTR) mode
10.1 Preliminaries
10.2 Encryption <\/td>\n<\/tr>\n
76<\/td>\n10.3 Decryption
10.4 Avoiding ciphertext expansion <\/td>\n<\/tr>\n
77<\/td>\nAnnex\u00a0A (normative) Object identifiers <\/td>\n<\/tr>\n
79<\/td>\nAnnex\u00a0B (informative) Properties of the modes of operation and important security guidance <\/td>\n<\/tr>\n
84<\/td>\nAnnex\u00a0C (informative) Figures describing the modes of operation <\/td>\n<\/tr>\n
89<\/td>\nAnnex\u00a0D (informative) Numerical examples for the modes of operation <\/td>\n<\/tr>\n
101<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Tracked Changes. Information technology. Security techniques. Modes of operation for an n<\/i>-bit block cipher<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2020<\/td>\n104<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":350689,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-350683","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/350683","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/350689"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=350683"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=350683"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=350683"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}