Menu
0
Total price
0 €
PRICES include / exclude VAT
Homepage>BS ISO/IEC 18032:2020 Information security. Prime number generation
sklademVydáno: 2020-12-09
BS ISO/IEC 18032:2020 Information security. Prime number generation

BS ISO/IEC 18032:2020

Information security. Prime number generation

Format
Availability
Price and currency
Anglicky Secure PDF
Immediate download
290.07 €
You can read the standard for 1 hour. More information in the category: E-reading
Reading the standard
for 1 hour
29.01 €
You can read the standard for 24 hours. More information in the category: E-reading
Reading the standard
for 24 hours
87.02 €
Anglicky Hardcopy
In stock
290.07 €
Označení normy:BS ISO/IEC 18032:2020
Počet stran:40
Vydáno:2020-12-09
ISBN:978 0 580 95307 1
Status:Standard
DESCRIPTION

BS ISO/IEC 18032:2020


This standard BS ISO/IEC 18032:2020 Information security. Prime number generation is classified in these ICS categories:
  • 35.030 IT Security

This document specifies methods for generating and testing prime numbers as required in cryptographic protocols and algorithms.

Firstly, this document specifies methods for testing whether a given number is prime. The testing methods included in this document are divided into two groups:

  • probabilistic primality tests, which have a small error probability. All probabilistic tests described here can declare a composite to be a prime;

  • deterministic methods, which are guaranteed to give the right verdict. These methods use so-called primality certificates.

Secondly, this document specifies methods to generate prime numbers. Again, both probabilistic and deterministic methods are presented.

NOTE

It is possible that readers with a background in algorithm theory have already had previous encounters with probabilistic and deterministic algorithms. The deterministic methods in this document internally still make use of random bits (to be generated via methods described in ISO/IEC 18031 ), and “ deterministic” only refers to the fact that the output is correct with probability one.

Annex A provides error probabilities that are utilized by the Miller-Rabin primality test.

Annex B describes variants of the methods for generating primes so that particular cryptographic requirements can be met.

Annex C defines primitives utilized by the prime generation and verification methods.