{"id":520195,"date":"2024-11-05T14:58:08","date_gmt":"2024-11-05T14:58:08","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/csa-iso-iec-18033-620\/"},"modified":"2024-11-05T14:58:08","modified_gmt":"2024-11-05T14:58:08","slug":"csa-iso-iec-18033-620","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/csa\/csa-iso-iec-18033-620\/","title":{"rendered":"CSA ISO\/IEC 18033-6:20"},"content":{"rendered":"
CSA Preface<\/strong><\/p>\n <\/p>\n Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the SCC Mirror Committee (SMC) on ISO\/IEC Joint Technical Committee 1 on Information Technology (ISO\/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T).<\/p>\n <\/p>\n At the time of publication, ISO\/IEC 18033-6:2019 is available from ISO and IEC in English only. CSA Group will publish the French version when it becomes available from ISO and IEC.<\/p>\n <\/p>\n This Standard has been formally approved, without modification, by the Technical Committee and has been developed in compliance with Standards Council of Canada requirements for National Standards of Canada. It has been published as a National Standard of Canada by CSA Group.<\/p>\n <\/p>\n Scope<\/strong><\/p>\n <\/p>\n This document specifies the following mechanisms for homomorphic encryption.<\/p>\n <\/p>\n \u2014 Exponential ElGamal encryption;<\/p>\n <\/p>\n \u2014 Paillier encryption.<\/p>\n <\/p>\n For each mechanism, this document specifies the process for:<\/p>\n <\/p>\n \u2014 generating parameters and the keys of the involved entities;<\/p>\n <\/p>\n \u2014 encrypting data;<\/p>\n <\/p>\n \u2014 decrypting encrypted data; and<\/p>\n <\/p>\n \u2014 homomorphically operating on encrypted data.<\/p>\n <\/p>\n Annex A defines the object identifiers assigned to the mechanisms specified in this document. Annex B provides numerical examples.<\/p>\n","protected":false},"excerpt":{"rendered":" IT Security techniques \u2014 Encryption algorithms \u2014 Part 6: Homomorphic encryption<\/b><\/p>\n\n\n
\n Published By<\/td>\n Publication Date<\/td>\n Number of Pages<\/td>\n<\/tr>\n \n CSA<\/b><\/a><\/td>\n 2020<\/td>\n 34<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":520207,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[656,2674],"product_tag":[],"class_list":{"0":"post-520195","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-030","7":"product_cat-csa","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/520195","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/520207"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=520195"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=520195"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=520195"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}