Home>AS Standards>AS 2805.5.2:2009 pdf free

AS 2805.5.2:2009 pdf free

AS 2805.5.2:2009 pdf free.Electronic funds transfer – Requirements for interfaces
For some of the described modes, padding of the plaintext variables may be required. Padding techniques, although important from a security perspective, are not within the scope of this In-ternational Standard, and throughout this standard it is assumed that any padding, as necessary,has already occurred.
NOTE Advice on the selection of a padding method for use with the CBC mode of operation is provided in Annex B.2.3.
For the Cipher Block Chaining (CBC) mode of operation (see clause 7), one parameter m needs to be selected. For the Cipher Feedback (CFB) mode of operation (see clause 8), three parameters r,j and k need to be selected. For the Output Feedback (OFB) mode of operation (see clause 9) and the Counter (CTR) mode of operation (see clause 10), one parameter j needs to be selected. When one of these modes of operation is used the same parameter value(s) need to be chosen and used by all communicating parties. These parameters need not be kept secret.
All modes of operation specified in this International Standard require the parties encrypting and decrypting a data string to share a secret key K for the block cipher in use. All modes of operation apart from the Electronic Codebook (ECB) mode also require the parties to share a starting variable SV,where the length of SV will depend on the mode in use. The value of the starting variable should normally be different for every data string encrypted using a particular key (see also Annex B). How keys and starting variables are managed and distributed is outside the scope of this International Standard.
The ciphertext variable is augmented by placing k:- j one bits in its leftmost bit positions to become the k:-bit feedback variable F. Then the bits of the feedback buffer F B are shifted left by k: places and F is inserted in the rightmost k: places, to produce the new value of the feedback buffer FB. In this shift operation, the leftmost k bits of F B are discarded. The new n leftmost bits of FB are used as the next input X of the encryption process.AS 2805.5.2 pdf free download.

Related standards