ISO/IEC 18032:2020

ISO/IEC 18032:2020

December 2020
International standard Current

Information security - Prime number generation

This document specifies methods for generating and testing prime numbers as required in cryptographic protocols and algorithms.Firstly, this document specifies methods for testing whether a given number is prime. The testing methods included in this document are divided into two groups:— probabilistic primality tests, which have a small error probability. All probabilistic tests described here can declare a composite to be a prime;— deterministic methods, which are guaranteed to give the right verdict. These methods use so-called primality certificates.Secondly, this document specifies methods to generate prime numbers. Again, both probabilistic and deterministic methods are presented.NOTE It is possible that readers with a background in algorithm theory have already had previous encounters with probabilistic and deterministic algorithms. The deterministic methods in this document internally still make use of random bits (to be generated via methods described in ISO/IEC 18031), and "deterministic" only refers to the fact that the output is correct with probability one.Annex A provides error probabilities that are utilized by the Miller-Rabin primality test.Annex B describes variants of the methods for generating primes so that particular cryptographic requirements can be met.Annex C defines primitives utilized by the prime generation and verification methods.

Main informations

Collections

International ISO standards
International IEC standards

Publication date

December 2020

Number of pages

33 p.

Reference

ISO/IEC 18032:2020

ICS Codes

35.030   IT Security

Print number

1
Sumary
Information security - Prime number generation

This document specifies methods for generating and testing prime numbers as required in cryptographic protocols and algorithms.

Firstly, this document specifies methods for testing whether a given number is prime. The testing methods included in this document are divided into two groups:

— probabilistic primality tests, which have a small error probability. All probabilistic tests described here can declare a composite to be a prime;

— deterministic methods, which are guaranteed to give the right verdict. These methods use so-called primality certificates.

Secondly, this document specifies methods to generate prime numbers. Again, both probabilistic and deterministic methods are presented.

NOTE It is possible that readers with a background in algorithm theory have already had previous encounters with probabilistic and deterministic algorithms. The deterministic methods in this document internally still make use of random bits (to be generated via methods described in ISO/IEC 18031), and "deterministic" only refers to the fact that the output is correct with probability one.

Annex A provides error probabilities that are utilized by the Miller-Rabin primality test.

Annex B describes variants of the methods for generating primes so that particular cryptographic requirements can be met.

Annex C defines primitives utilized by the prime generation and verification methods.

Replaced standards (1)
ISO/IEC 18032:2005
January 2005
International standard Cancelled
Information technology - Security techniques - Prime number generation

Need to identify, monitor and decipher standards?

COBAZ is the simple and effective solution to meet the normative needs related to your activity, in France and abroad.

Available by subscription, CObaz is THE modular solution to compose according to your needs today and tomorrow. Quickly discover CObaz!

Request your free, no-obligation live demo

I discover COBAZ