{"id":350683,"date":"2024-10-20T00:43:34","date_gmt":"2024-10-20T00:43:34","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-101162017-tc\/"},"modified":"2024-10-26T00:31:57","modified_gmt":"2024-10-26T00:31:57","slug":"bs-iso-iec-101162017-tc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-101162017-tc\/","title":{"rendered":"BS ISO\/IEC 10116:2017 – TC"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
56<\/td>\n | National foreword <\/td>\n<\/tr>\n | ||||||
60<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
61<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
65<\/td>\n | 4 Symbols, abbreviated terms and notation 4.1 Symbols and abbreviated terms <\/td>\n<\/tr>\n | ||||||
66<\/td>\n | 4.2 Notation 5 Requirements <\/td>\n<\/tr>\n | ||||||
67<\/td>\n | 6 Electronic Codebook (ECB) mode 6.1 Preliminaries 6.2 Encryption 6.3 Decryption <\/td>\n<\/tr>\n | ||||||
68<\/td>\n | 7 Cipher Block Chaining (CBC) mode 7.1 Preliminaries 7.2 Encryption 7.3 Decryption <\/td>\n<\/tr>\n | ||||||
69<\/td>\n | 7.4 Avoiding ciphertext expansion 7.4.1 General 7.4.2 Three ciphertext stealing variants of CBC <\/td>\n<\/tr>\n | ||||||
70<\/td>\n | 8 Cipher Feedback (CFB) mode 8.1 Preliminaries <\/td>\n<\/tr>\n | ||||||
71<\/td>\n | 8.2 Encryption <\/td>\n<\/tr>\n | ||||||
72<\/td>\n | 8.3 Decryption 8.4 Avoiding ciphertext expansion <\/td>\n<\/tr>\n | ||||||
73<\/td>\n | 9 Output Feedback (OFB) mode 9.1 Preliminaries 9.2 Encryption <\/td>\n<\/tr>\n | ||||||
74<\/td>\n | 9.3 Decryption 9.4 Avoiding ciphertext expansion <\/td>\n<\/tr>\n | ||||||
75<\/td>\n | 10 Counter (CTR) mode 10.1 Preliminaries 10.2 Encryption <\/td>\n<\/tr>\n | ||||||
76<\/td>\n | 10.3 Decryption 10.4 Avoiding ciphertext expansion <\/td>\n<\/tr>\n | ||||||
77<\/td>\n | Annex\u00a0A (normative) Object identifiers <\/td>\n<\/tr>\n | ||||||
79<\/td>\n | Annex\u00a0B (informative) Properties of the modes of operation and important security guidance <\/td>\n<\/tr>\n | ||||||
84<\/td>\n | Annex\u00a0C (informative) Figures describing the modes of operation <\/td>\n<\/tr>\n | ||||||
89<\/td>\n | Annex\u00a0D (informative) Numerical examples for the modes of operation <\/td>\n<\/tr>\n | ||||||
101<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Tracked Changes. Information technology. Security techniques. Modes of operation for an n<\/i>-bit block cipher<\/b><\/p>\n |