Information security -- Encryption algorithms

Titre manque

General Information

Status
Published
Current Stage
4020 - DIS ballot initiated: 5 months
Start Date
27-Nov-2020
Completion Date
27-Nov-2020
Ref Project

RELATIONS

Buy Standard

Draft
ISO/IEC DIS 18033-1 - Information security -- Encryption algorithms
English language
18 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (sample)

DRAFT INTERNATIONAL STANDARD
ISO/IEC DIS 18033-1
ISO/IEC JTC 1/SC 27 Secretariat: DIN
Voting begins on: Voting terminates on:
2020-11-27 2021-02-19
Information security — Encryption algorithms —
Part 1:
General
Partie 1: Généralités
ICS: 35.030
THIS DOCUMENT IS A DRAFT CIRCULATED
FOR COMMENT AND APPROVAL. IT IS
THEREFORE SUBJECT TO CHANGE AND MAY
NOT BE REFERRED TO AS AN INTERNATIONAL
STANDARD UNTIL PUBLISHED AS SUCH.
IN ADDITION TO THEIR EVALUATION AS
BEING ACCEPTABLE FOR INDUSTRIAL,
This document is circulated as received from the committee secretariat.
TECHNOLOGICAL, COMMERCIAL AND
USER PURPOSES, DRAFT INTERNATIONAL
STANDARDS MAY ON OCCASION HAVE TO
BE CONSIDERED IN THE LIGHT OF THEIR
POTENTIAL TO BECOME STANDARDS TO
WHICH REFERENCE MAY BE MADE IN
Reference number
NATIONAL REGULATIONS.
ISO/IEC DIS 18033-1:2020(E)
RECIPIENTS OF THIS DRAFT ARE INVITED
TO SUBMIT, WITH THEIR COMMENTS,
NOTIFICATION OF ANY RELEVANT PATENT
RIGHTS OF WHICH THEY ARE AWARE AND TO
PROVIDE SUPPORTING DOCUMENTATION. ISO/IEC 2020
---------------------- Page: 1 ----------------------
ISO/IEC DIS 18033-1:2020(E)
COPYRIGHT PROTECTED DOCUMENT
© ISO/IEC 2020

All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may

be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting

on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address

below or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
ii © ISO/IEC 2020 – All rights reserved
---------------------- Page: 2 ----------------------
ISO/IEC DIS 18033-1:2020(E)
Contents Page

Foreword ........................................................................................................................................................................................................................................iv

Introduction ..................................................................................................................................................................................................................................v

1 Scope ................................................................................................................................................................................................................................. 1

2 Normative references ...................................................................................................................................................................................... 1

3 Terms and definitions ..................................................................................................................................................................................... 1

4 Symbols and abbreviated terms ........................................................................................................................................................... 5

4.1 Symbols ......................................................................................................................................................................................................... 5

4.2 Abbreviated terms ............................................................................................................................................................................... 5

5 The nature of encryption ............................................................................................................................................................................. 5

5.1 The purpose of encryption ........................................................................................................................................................... 5

5.2 Symmetric and asymmetric ciphers ..................................................................................................................................... 6

5.3 Key management ................................................................................................................................................................................... 6

6 The use and properties of encryption ............................................................................................................................................ 6

6.1 General ........................................................................................................................................................................................................... 6

6.2 Asymmetric ciphers ............................................................................................................................................................................ 6

6.3 Block ciphers ............................................................................................................................................................................................ 7

6.3.1 General...................................................................................................................................................................................... 7

6.3.2 Modes of operation ........................................................................................................................................................ 7

6.3.3 Message Authentication Codes (MACs)........................................................................................................ 7

6.4 Stream ciphers ........................................................................................................................................................................................ 8

6.5 Identity-based ciphers ......... ............................................................................................................................................................. 8

6.6 Homomorphic ciphers ...................................................................................................................................................................... 8

7 Object identifiers ................................................................................................................................................................................................. 8

Annex A (informative) Criteria for submission of ciphers for possible inclusion in

the ISO/IEC 18033 series ............................................................................................................................................................................. 9

Annex B (informative) Criteria for the deletion of ciphers from the ISO/IEC 18033 series ....................14

Annex C (informative) Attacks on encryption algorithms ...........................................................................................................15

Bibliography .............................................................................................................................................................................................................................18

© ISO/IEC 2020 – All rights reserved iii
---------------------- Page: 3 ----------------------
ISO/IEC DIS 18033-1:2020(E)
Foreword

ISO (the International Organization for Standardization) is a worldwide federation of national standards

bodies (ISO member bodies). The work of preparing International Standards is normally carried out

through ISO technical committees. Each member body interested in a subject for which a technical

committee has been established has the right to be represented on that committee. International

organizations, governmental and non-governmental, in liaison with ISO, also take part in the work.

ISO collaborates closely with the International Electrotechnical Commission (IEC) on all matters of

electrotechnical standardization.

The procedures used to develop this document and those intended for its further maintenance are

described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed for the

different types of ISO documents should be noted. This document was drafted in accordance with the

editorial rules of the ISO/IEC Directives, Part 2 (see www .iso .org/ directives).

Attention is drawn to the possibility that some of the elements of this document may be the subject of

patent rights. ISO shall not be held responsible for identifying any or all such patent rights. Details of

any patent rights identified during the development of the document will be in the Introduction and/or

on the ISO list of patent declarations received (see www .iso .org/ patents).

Any trade name used in this document is information given for the convenience of users and does not

constitute an endorsement.

For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and

expressions related to conformity assessment, as well as information about ISO's adherence to the

World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT), see www .iso .org/

iso/ foreword .html.

This document was prepared by Joint Technical Committee ISO/IEC JTC 1, Information Technology,

Subcommittee SC 27, Information security, cybersecurity and privacy protection.

This third edition cancels and replaces the second edition (ISO/IEC 18033-1:2015), which has been

technically revised.
The main changes compared to the previous edition are as follows:
— Refining terminology;

— Refining criteria for submission of ciphers for possible inclusion in the ISO/IEC 18033 series; and

— Clarification of the use and security properties of encryption algorithms.
A list of all parts in the ISO/IEC 18033 series can be found on the ISO website.

Any feedback or questions on this document should be directed to the user’s national standards body. A

complete listing of these bodies can be found at www .iso .org/ members .html.
iv © ISO/IEC 2020 – All rights reserved
---------------------- Page: 4 ----------------------
ISO/IEC DIS 18033-1:2020(E)
Introduction

This ISO/IEC 18033 series specifies encryption systems (ciphers) for the purpose of data confidentiality.

The inclusion of ciphers in this document is intended to promote their use as reflecting the current

“state of the art” in encryption techniques.

The primary purpose of encryption (or encipherment) techniques is to protect the confidentiality

of stored or transmitted data. An encryption algorithm is applied to data (often called plaintext or

cleartext) to yield encrypted data (or ciphertext); this process is known as encryption. The encryption

algorithm should be designed so that the ciphertext yields no information about the plaintext except,

perhaps, its length. Associated with every encryption algorithm is a corresponding decryption

algorithm, which transforms ciphertext back into its original plaintext.

Ciphers work in association with a key. In a symmetric cipher, the same key is used in both the

encryption and decryption algorithms. In an asymmetric cipher, different but related keys are used

for encryption and decryption. In this ISO/IEC 18033 series, ISO/IEC 18033-2 and ISO/IEC 18033-5 are

devoted to two different classes of asymmetric ciphers, known as conventional asymmetric ciphers

(or just asymmetric ciphers), and identity-based ciphers. ISO/IEC 18033-3 and ISO/IEC 18033-4 are

devoted to two different classes of symmetric ciphers, known as block ciphers and stream ciphers.

ISO/IEC 18033-6 is devoted to a specific class of encryption algorithms called homomorphic.

© ISO/IEC 2020 – All rights reserved v
---------------------- Page: 5 ----------------------
DRAFT INTERNATIONAL STANDARD ISO/IEC DIS 18033-1:2020(E)
Information security — Encryption algorithms —
Part 1:
General
1 Scope

This document is general in nature, and provides definitions that apply in subsequent parts of the

ISO/IEC 18033 series. The nature of encryption is introduced, and certain general aspects of its use and

properties are described.
2 Normative references
There are no normative references in this document.
3 Terms and definitions
For the purposes of this document, the following terms and definitions apply.

ISO and IEC maintain terminological databases for use in standardization at the following addresses:

— ISO Online browsing platform: available at https:// www .iso .org/ obp
— IEC Electropedia: available at http:// www .electropedia .org/
3.1
asymmetric cryptographic technique

cryptographic technique that uses two related transformations, a public transformation (defined by

the public key) and a private transformation (defined by the private key)

Note 1 to entry: The two transformations have the property that, given the public transformation, it is

computationally infeasible to derive the private transformation. Computational feasibility depends on the

specific security requirements and environment.
[SOURCE: ISO/IEC 11770-1:2010, 2.1]]
3.2
asymmetric encryption system
asymmetric cipher
asymmetric encipherment system

system based on asymmetric cryptographic techniques whose public transformation is used for

encryption and whose private transformation is used for decryption
Note 1 to entry: A method for key pair generation is assumed.
[SOURCE: ISO/IEC 9798-1:2010, 3.2]
© ISO/IEC 2020 – All rights reserved 1
---------------------- Page: 6 ----------------------
ISO/IEC DIS 18033-1:2020(E)
3.3
attack

algorithm that performs computations and that can request the encryption and/or decryption of

adaptively chosen texts under a single secret/private key, with the purpose of recovering either the

unknown plaintext for a given ciphertext, which may be adaptively chosen but for which a request to

decrypt the ciphertext is not issued, or a secret/private key
Note 1 to entry: Attacks are discussed in detail in Annex C.
3.4
attack cost

ratio of the average workload of the attack to an equivalent number of calls to the encryption algorithm

under attack multiplied by the success probability of the attack

Note 1 to entry: Using the notation defined in 4.1, the attack cost is equal to the ratio W/P.

Note 2 to entry: Other attack cost metrics and properties, such as memory complexity, data complexity, the

ability to be accelerated by specialized hardware or parallelizability may also be important in judging the impact

of a cryptographic attack.
3.5
block
string of bits of a defined length
3.6
block cipher

symmetric encipherment system with the property that the encryption algorithm operates on a block

of plaintext to yield a block of ciphertext

Note 1 to entry: The block ciphers standardised in ISO/IEC 18033-3 have the property that plaintext and

ciphertext blocks are of the same length.
3.7
ciphertext
data which has been transformed to hide its information content
3.8
cryptanalytic attack
attack against a cipher that makes use of properties of the cipher

Note 1 to entry: Every cryptanalytic attack has its own attack model, some of which may or may not be applicable

to specific implementations. Since the application of a cipher is generally unknown to the cipher designer, all

possible models in the single key setting need to be considered when assessing the security of an algorithm.

Several existing application examples also show the need to consider multi-key settings.

Note 2 to entry: Cryptanalytic attacks do not include implementation-specific attacks, e.g. involving side channel

analysis.
3.9
decryption
decipherment
reversal of a corresponding encryption
[SOURCE: ISO/IEC 11770-1:2010, 2.6]
3.10
decryption algorithm
decipherment algorithm
process which transforms ciphertext into plaintext
2 © ISO/IEC 2020 – All rights reserved
---------------------- Page: 7 ----------------------
ISO/IEC DIS 18033-1:2020(E)
3.11
encryption
encipherment

(reversible) transformation of data by an encryption algorithm to produce ciphertext, i.e. to hide the

information content of the data
[SOURCE: ISO/IEC 9797-1:2011, 3.6, modified – editorial change]
3.12
encryption algorithm
encipherment algorithm
process which transforms plaintext into ciphertext
3.13
encryption system
encipherment system
cipher

cryptographic technique used to protect the confidentiality of data, and which consists of three component

processes: an encryption algorithm, a decryption algorithm, and a method for generating keys

3.14
generic attack

attack against a cipher which does not rely on the cipher design and can be used to recover a secret/

private key or plaintext

Note 1 to entry: Generic attacks depend on models and goals, see Annex A.2 for details.

3.15
identity-based encryption system
identity-based cipher

asymmetric cipher in which the encryption algorithm takes an arbitrary string as a public key

[SOURCE: ISO/IEC 18033-5:2015, 3.6]
3.16
key

sequence of symbols that controls the operation of a cryptographic transformation (e.g., encipherment,

decipherment)

[SOURCE: ISO/IEC 11770-1:2010, 2.12, modified – the list of cryptographic mechanisms is removed]

3.17
keystream

pseudorandom sequence of symbols, intended to be secret, used by the encryption and decryption

algorithms of a stream cipher

Note 1 to entry: If a portion of the keystream is known by an attacker, then it shall be computationally infeasible

for the attacker to deduce more than a negligible amount of information about the remainder of the keystream.

Computational feasibility depends on the specific security requirements and environment.

3.18
n-bit block cipher

block cipher with the property that plaintext blocks and ciphertext blocks are n bits in length

3.19
plaintext
cleartext
unencrypted information
© ISO/IEC 2020 – All rights reserved 3
---------------------- Page: 8 ----------------------
ISO/IEC DIS 18033-1:2020(E)
3.20
private key
key of an entity’s asymmetric key pair which should only be used by that entity
Note 1 to entry: A private key should not normally be disclosed.

[SOURCE: ISO/IEC 11770-1:2010, 2.35, modified – editorial change, new text of a note]

3.21
public key

key of an entity’s asymmetric key pair which can usually be made public without compromising security

[SOURCE: ISO/IEC 11770-1:2010, 2.36]
3.22
public key certificate

public key information of an entity signed by the certification authority and thereby rendered

unforgeable
[SOURCE: ISO/IEC 11770-3:2015, 3.34]
3.23
public key infrastructure
PKI

infrastructure able to support the management of public keys able to support authentication,

encryption, integrity or non-repudiation services.
[SOURCE: ISO/IEC 9594-8:2017, 3.5.59]
3.24
secret key
key used with symmetric cryptographic techniques by a specified set of entities
[SOURCE: ISO/IEC 11770-3:2015, 3.36]
3.25
security strength

number associated with the amount of work (e.g. the number of operations) that is required to break a

cryptographic algorithm

Note 1 to entry: For key recovery, a security strength of k bits implies that the workload required to break

the encryption system is equivalent to 2 executions of the encryption system. For further information on the

application of security strength to selecting cryptographic algorithms for this document, see C.1.4.

3.26
stream cipher

symmetric encryption system with the property that the encryption algorithm involves combining a

sequence of plaintext symbols with a sequence of keystream symbols one symbol at a time, using an

invertible function

Note 1 to entry: Two types of stream cipher can be identified: synchronous stream ciphers and self-synchronous

stream ciphers, distinguished by the method used to obtain the keystream.
3.27
symmetric cryptographic technique
cryptographic technique for which all transformations use the same key
3.28
symmetric encryption system
symmetric encipherment system
symmetric cipher
encryption system based on symmetric cryptographic techniques
4 © ISO/IEC 2020 – All rights reserved
---------------------- Page: 9 ----------------------
ISO/IEC DIS 18033-1:2020(E)
3.29
homomorphic cipher
homomorphic encryption system
homomorphic encipherment system

encryption system with the property that if certain computations are performed on the ciphertext, the

plaintext obtained after decryption will have had the same computations applied to it

4 Symbols and abbreviated terms
4.1 Symbols
For the purposes of this document, the following symbols apply.
n Plaintext/ciphertext block length for a block cipher
k Key length
P The probability that a cryptanalytic attack will succeed

W Workload or complexity of an attack, measured in terms of the number of calls to the cryp-

tographic algorithm
4.2 Abbreviated terms
For the purposes of this document, the following abbreviated terms apply.
ECB Electronic Code Book
MAC Message authentication code
SC Subcommittee
SD Standing document
WG Working group
5 The nature of encryption
5.1 The purpose of encryption

The primary purpose of encryption (or encipherment) systems is to protect the confidentiality of stored

or transmitted data. Encryption algorithms achieve this by transforming plaintext into ciphertext,

from which it is computationally infeasible to find any information about the content of the plaintext

unless the secret/private key is also known. However, in many cases the length of the ciphertext will

not be concealed by encryption, since the length of the ciphertext will typically be the same as, or a

little larger than, the length of the corresponding plaintext.

It is important to note that encryption may not always, by itself, protect the integrity or the origin of data.

In many cases it is possible, without knowledge of the key, to modify encrypted text with predictable

effects on the recovered plaintext. In order to ensure integrity and origin of data it is often necessary to

use additional techniques, such as those described in ISO/IEC 9796 (all parts), ISO/IEC 9797 (all parts),

ISO/IEC 14888 (all parts), ISO/IEC 19772, ISO/IEC 29192-2, ISO/IEC 29192-3 and ISO/IEC 29192-4.

© ISO/IEC 2020 – All rights reserved 5
---------------------- Page: 10 ----------------------
ISO/IEC DIS 18033-1:2020(E)
5.2 Symmetric and asymmetric ciphers
Symmetric and asymmetric ciphers differ in their method of key generation.

— In a symmetric cipher, the same secret key is used with both the encryption and decryption

algorithms. Knowledge of this key is required to perform both encryption and decryption, and

knowledge of the secret key therefore needs to be restricted to those parties authorized to access

the data which the key is used to encrypt.

— In an asymmetric cipher, different but related keys are used for encryption and decryption. Hence

keys are generated in matching pairs, where one key of the pair is the encryption key and the other is

the decryption key. Even with knowledge of the encryption key it is assumed to be computationally

infeasible to find any information about the content of a plaintext from its corresponding ciphertext.

In many situations it is possible to make the encryption key public, and hence this key is often

referred to as the public key, while the corresponding decryption key typically has only one owner

and remains confidential and hence it is referred to as the private key. Anyone who knows the public

encryption key will be able to encrypt data intended for the holder of the corresponding private key,

while only the private decryption key holder will be able to decrypt it.

ISO/IEC 18033-2 and ISO/IEC 18033-5 are devoted to two different classes of asymmetric ciphers,

known as conventional asymmetric ciphers (or just asymmetric ciphers), and identity-based ciphers.

ISO/IEC 18033-3 and ISO/IEC 18033-4 are devoted to two different classes of symmetric ciphers,

known as block ciphers and stream ciphers. ISO/IEC 18033-6 describes homomorphic ciphers.

5.3 Key management

The use of all types of cryptography relies on the management of cryptographic keys. All ciphers, both

symmetric and asymmetric, require all the parties using the cipher to have access to the necessary

keys. This gives rise to the need for key management, involving the generation, distribution, and

ongoing management of keys. An overall framework for key management is given in ISO/IEC 11770-1.

The problem of key management is rather different depending on whether the keys are for symmetric

or asymmetric ciphers. For symmetric ciphers it is necessary to arrange for secret keys to be generated

and shared by pairs (or larger groups) of entities. For asymmetric ciphers it is necessary for key pairs to

be generated and for public keys to be distributed in such a way that their authenticity is guaranteed. In

an identity-based cipher, the public key is an arbitrary data string, which is usually chosen from some

public information associated with the entity which decrypts ciphertexts.

Methods to establish shared secret keys using symmetric cryptographic techniques are specified in

ISO/IEC 11770-2. Methods to establish shared secret keys using asymmetric cryptographic techniques

are specified in ISO/IEC 11770-3; ISO/IEC 11770-3 also specifies techniques for the reliable distribution

of public keys for asymmetric cryptographic techniques. Methods to establish shared secret keys using

weak secrets are specified in ISO/IEC 11770-4.
6 The use and properties of encryption
6.1 General

The criteria used for submission of ciphers for possible inclusion in, and for their deletion from, the

ISO/IEC 18033 series are defined in Annexes A and B.
6.2 Asymmetric ciphers

The encryption algorithm for an asymmetric cipher defines a mapping from the set of permissible

plaintext messages (typically a set of bit strings) to the set of ciphertext messages (typically also a set of

bit strings). The set of permissible messages and the set of ciphertexts will depend upon both the choice

of cipher and the key pair.
6 © ISO/IEC 2020 – All rights reserved
---------------------- Page: 11 ----------------------
ISO/IEC DIS 18033-1:2020(E)

For an asymmetric cipher the encryption algorithm depends on a public key, whereas decryption

depends on a private key. Hence, while the ciphertext block corresponding to a chosen plaintext block

may be readily computed, it shall be infeasible for anyone, other than the holder of the private key, to

deduce the plaintext block corresponding to a chosen ciphertext block. However, if an interceptor of

ciphertext knows the public key used to produce it, and also knows that the plaintext has been chosen

from a small set of possibilities, it may become possible to deduce the plaintext by an exhaustive search

through all possible plaintexts.

As a result, and in order to achieve a satisfactory level of security, it is necessary to incorporate

random data in the encryption process so that the ciphertext block corresponding to a given plaintext

block cannot be predicted. Detailed techniques for incorporating random data are described in

ISO/IEC 18033-2.

Authenticity of public keys is of great importance when using asymmetric encryption algorithms.

Assurance in the authenticity of a public key can, for example, be provided using a PKI.

6.3 Block ciphers
6.3.1 General

A block cipher is a symmetric cipher with the property that the encryption algorithm operates on blocks

of plaintext, i.e. strings of bits of a defined length, to yield ciphertext blocks. Each key for a block cipher

defines a particular invertible mapping of plaintext blocks to ciphertext blocks (and a corresponding

inverse mapping used for decryption). If, as is typically the case, the plaintext blocks and ciphertext blocks

are all blocks of n binary digits, then each key simply defines a permutation on the set of all n-bit blocks.

Block ciphers can be used in a wide variety of ways. Two of the most important applications are the

modes of operation described in 6.3.2 (modes that provide confidentiality) and 6.3.3 (modes that provide

integrity control), but there are many other uses such as in hash-functions (see ISO/IEC 10118-2) and

random-number generators (see ISO/IEC 18031).

The criteria used for submission of ciphers for possible inclusion in, and for their deletion from, the

ISO/IEC 18033 series are defined in Annexes A and B.
6.3.2 Modes of operation

There are many ways in which an n-bit block cipher can be used to encipher plaintext; such methods are

known as modes of operation for block ciphers. Modes of operation are defined in ISO/IEC 10116. If the

number of bits in the plaintext happens to be n, then encryption can be achieved by simply applying the

encryption process to this block, an encryption mode known as Electronic Code Book (ECB). However,

for arbitrary length plaintext, it is necessary to employ a more sophisticated approach. For this and

other reasons it is often necessary to use one of the other modes of operation defined in ISO/IEC 10116.

6.3.3 Message Authentication Codes (MACs)

Although encryption does not provide data integrity, it is possible to use a block cipher in a specially

defined way to provide a data integrity protection function. In particular, it is possible to use a block

cipher to compute a Message Authentication Code (MAC) for a string of bits. Such a MAC can be used

to provide integrity and origin protection for the string of bits. Ways to achieve this are specified in

ISO/IEC 9797-1. Note that it is sometimes desirable to use a block cipher to both encrypt and compute

a MAC on plaintext. In such an event it is generally necessary to use two different secret keys, one for

encryption and one for a MAC computation. Alternatively, techniques for authenticated encryption,

which simultaneously provide confidentiali
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.