Π‘ΠΏΠΈΡΠΎΠΊ ΡΠ΅ΠΊΠΎΠΌΠ΅Π½Π΄ΡΠ΅ΠΌΠΎΠΉ Π»ΠΈΡΠ΅ΡΠ°ΡΡΡΡ
NIST Special Publication 800β56B. Revision 1. Recommendation for Pair-Wise Key-Establishment Schemes Using Integer Factorization Cryptography. September 2014. URL: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800β56Brl.pdf. ΠΠ°ΡΠΈΡΠ΅Π², Π‘. Π. ΠΡΠ½ΠΎΠ²Ρ ΡΠΎΠ²ΡΠ΅ΠΌΠ΅Π½Π½ΠΎΠΉ ΠΊΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΠΈΠΈ: ΡΡΠ΅Π±, ΠΊΡΡΡ / Π‘. Π. ΠΠ°ΡΠΈΡΠ΅Π², Π. Π. ΠΠΎΠ½ΡΠ°ΡΠΎΠ², Π . Π. Π‘Π΅ΡΠΎΠ². — Π.: ΠΠΎΡΡΡΠ°Ρ Π»ΠΈΠ½ΠΈΡ — Π’Π΅Π»Π΅ΠΊΠΎΠΌ, 2011. ISO/IEC… Π§ΠΈΡΠ°ΡΡ Π΅ΡΡ >
Π‘ΠΏΠΈΡΠΎΠΊ ΡΠ΅ΠΊΠΎΠΌΠ΅Π½Π΄ΡΠ΅ΠΌΠΎΠΉ Π»ΠΈΡΠ΅ΡΠ°ΡΡΡΡ (ΡΠ΅ΡΠ΅ΡΠ°Ρ, ΠΊΡΡΡΠΎΠ²Π°Ρ, Π΄ΠΈΠΏΠ»ΠΎΠΌ, ΠΊΠΎΠ½ΡΡΠΎΠ»ΡΠ½Π°Ρ)
- 1. ΠΠ°ΡΠΈΡΠ΅Π², Π‘. Π. ΠΡΠ½ΠΎΠ²Ρ ΡΠΎΠ²ΡΠ΅ΠΌΠ΅Π½Π½ΠΎΠΉ ΠΊΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΠΈΠΈ: ΡΡΠ΅Π±, ΠΊΡΡΡ / Π‘. Π. ΠΠ°ΡΠΈΡΠ΅Π², Π. Π. ΠΠΎΠ½ΡΠ°ΡΠΎΠ², Π . Π. Π‘Π΅ΡΠΎΠ². — Π.: ΠΠΎΡΡΡΠ°Ρ Π»ΠΈΠ½ΠΈΡ — Π’Π΅Π»Π΅ΠΊΠΎΠΌ, 2011.
- 2. ΠΠ°ΡΠΈΠ»ΡΠ΅Π²Π°, Π. Π. ΠΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΠΈΡΠ΅ΡΠΊΠ°Ρ Π·Π°ΡΠΈΡΠ° ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΈ: ΡΡΠ΅Π±, ΠΏΠΎΡΠΎΠ±ΠΈΠ΅ / Π. Π. ΠΠ°ΡΠΈΠ»ΡΠ΅Π²Π°. — Π‘ΠΠ±.: Π‘ΠΠ±ΠΠΠΠ£, 2011.
- 3. ΠΠ°ΡΠΈΠ»ΡΠ΅Π²Π°, Π. Π. ΠΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΠΈΡΠ΅ΡΠΊΠ°Ρ Π·Π°ΡΠΈΡΠ° ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΈ: ΠΏΡΠ°ΠΊΡΠΈΠΊΡΠΌ / Π. Π. ΠΠ°ΡΠΈΠ»ΡΠ΅Π²Π°. — Π‘ΠΠ±.: Π‘ΠΠ±ΠΠΠΠ£, 2011.
- 4. Π ΡΠ±ΠΊΠΎ, Π. Π―. ΠΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΠΈΡΠ΅ΡΠΊΠΈΠ΅ ΠΌΠ΅ΡΠΎΠ΄Ρ Π·Π°ΡΠΈΡΡ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΈ / Π. Π―. Π ΡΠ±ΠΊΠΎ,
A. Π. Π€ΠΈΠΎΠΈΠΎΠ². — Π.: ΠΠΎΡΡΡΠ°Ρ Π»ΠΈΠ½ΠΈΡ — Π’Π΅Π»Π΅ΠΊΠΎΠΌ, 2012.
5. ΠΠ°ΠΎ, Π. Π‘ΠΎΠ²ΡΠ΅ΠΌΠ΅Π½Π½Π°Ρ ΠΊΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΠΈΡ: ΡΠ΅ΠΎΡΠΈΡ ΠΈ ΠΏΡΠ°ΠΊΡΠΈΠΊΠ°: ΠΏΠ΅Ρ. Ρ Π°Π½Π³Π». /.
B. ΠΠ°ΠΎ. — Π.: ΠΠ·Π΄Π°ΡΠ΅Π»ΡΡΠΊΠΈΠΉ Π΄ΠΎΠΌ «ΠΠΈΠ»ΡΡΠΌΡ», 2005.
- 6. Π‘ΡΠΎΠ»Π»ΠΈΠ½Π³Ρ, Π. ΠΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΠΈΡ ΠΈ Π·Π°ΡΠΈΡΠ° ΡΠ΅ΡΠ΅ΠΉ: ΠΏΡΠΈΠ½ΡΠΈΠΏΡ ΠΈ ΠΏΡΠ°ΠΊΡΠΈΠΊΠ°: ΠΏΠ΅Ρ. Ρ Π°Π½Π³Π». / Π. Π‘ΡΠΎΠ»Π»ΠΈΠ½Π³Ρ. — Π.: ΠΠ·Π΄Π°ΡΠ΅Π»ΡΡΠΊΠΈΠΉ Π΄ΠΎΠΌ «ΠΠΈΠ»ΡΡΠΌΡ», 2001.
- 7. Π€Π΅ΡΠ³ΡΡΠΎΠ½, Π. ΠΡΠ°ΠΊΡΠΈΡΠ΅ΡΠΊΠ°Ρ ΠΊΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΠΈΡ: ΠΏΠ΅Ρ. Ρ Π°Π½Π³Π». / Π. Π€Π΅ΡΠ³ΡΡΠΎΠ½, Π. Π¨Π½Π°ΠΉΠ΅Ρ. — Π.: ΠΠ·Π΄Π°ΡΠ΅Π»ΡΡΠΊΠΈΠΉ Π΄ΠΎΠΌ «ΠΠΈΠ»ΡΡΠΌΡ», 2005.
- 8. Π¨Π΅Π½Π½ΠΎΠ½, Π. Π’Π΅ΠΎΡΠΈΡ ΡΠ²ΡΠ·ΠΈ Π² ΡΠ΅ΠΊΡΠ΅ΡΠ½ΡΡ ΡΠΈΡΡΠ΅ΠΌΠ°Ρ // Π Π°Π±ΠΎΡΡ ΠΏΠΎ ΡΠ΅ΠΎΡΠΈΠΈ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΈ ΠΈ ΠΊΠΈΠ±Π΅ΡΠ½Π΅ΡΠΈΠΊΠ΅: ΠΏΠ΅Ρ. Ρ Π°Π½Π³Π». / Π. Π¨Π΅Π½Π½ΠΎΠ½. — Π.: ΠΠ·Π΄Π°ΡΠ΅Π»ΡΡΡΠ²ΠΎ ΠΈΠ½ΠΎΡΡΡΠ°Π½Π½ΠΎΠΉ Π»ΠΈΡΠ΅ΡΠ°ΡΡΡΡ, 1963. Π‘. 333—369.
- 9. Π¨Π½Π°ΠΉΠ΅Ρ, Π. ΠΡΠΈΠΊΠ»Π°Π΄Π½Π°Ρ ΠΊΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΠΈΡ: ΠΏΡΠΎΡΠΎΠΊΠΎΠ»Ρ, Π°Π»Π³ΠΎΡΠΈΡΠΌΡ, ΠΈΡΡ ΠΎΠ΄Π½ΡΠ΅ ΡΠ΅ΠΊΡΡΡ Π½Π° ΡΠ·ΡΠΊΠ΅ Π‘ΠΈ: ΠΏΠ΅Ρ. Ρ Π°Π½Π³Π». / Π. Π¨Π½Π°ΠΉΠ΅Ρ. — Π.: Π’ΡΠΈΡΠΌΡ, 2012.
ΠΠΎΡΠΌΠ°ΡΠΈΠ²Π½ΠΎ-ΠΌΠ΅ΡΠΎΠ΄ΠΈΡΠ΅ΡΠΊΠΈΠ΅ Π΄ΠΎΠΊΡΠΌΠ΅Π½ΡΡ
- 1. ΠΠΠ‘Π’ 28 147–89 «Π‘ΠΈΡΡΠ΅ΠΌΡ ΠΎΠ±ΡΠ°Π±ΠΎΡΠΊΠΈ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΈ. ΠΠ°ΡΠΈΡΠ° ΠΊΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΠΈΡΠ΅ΡΠΊΠ°Ρ. ΠΠ»Π³ΠΎΡΠΈΡΠΌ ΠΊΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΠΈΡΠ΅ΡΠΊΠΎΠ³ΠΎ ΠΏΡΠ΅ΠΎΠ±ΡΠ°Π·ΠΎΠ²Π°Π½ΠΈΡ».
- 2. ΠΠΠ‘Π’ Π 34.10—2012 «ΠΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½Π½Π°Ρ ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΠΈΡ. ΠΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΠΈΡΠ΅ΡΠΊΠ°Ρ Π·Π°ΡΠΈΡΠ° ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΈ. ΠΡΠΎΡΠ΅ΡΡΡ ΡΠΎΡΠΌΠΈΡΠΎΠ²Π°Π½ΠΈΡ ΠΈ ΠΏΡΠΎΠ²Π΅ΡΠΊΠΈ ΡΠ»Π΅ΠΊΡΡΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠΎΠ²ΠΎΠΉ ΠΏΠΎΠ΄ΠΏΠΈΡΠΈ».
- 3. ΠΠΠ‘Π’ Π 34.11—2012 «ΠΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½Π½Π°Ρ ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΠΈΡ. ΠΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΠΈΡΠ΅ΡΠΊΠ°Ρ Π·Π°ΡΠΈΡΠ° ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΈ. Π€ΡΠ½ΠΊΡΠΈΡ Ρ ΡΡΠΈΡΠΎΠ²Π°Π½ΠΈΡ».
- 4. ΠΠΠ‘Π’ Π 34.12—2015 «ΠΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½Π½Π°Ρ ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΠΈΡ. ΠΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΠΈΡΠ΅ΡΠΊΠ°Ρ Π·Π°ΡΠΈΡΠ° ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΈ. ΠΠ»ΠΎΡΠ½ΡΠ΅ ΡΠΈΡΡΡ».
- 5. ΠΠΠ‘Π’ Π 34.13—2015 «ΠΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½Π½Π°Ρ ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΠΈΡ. ΠΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΠΈΡΠ΅ΡΠΊΠ°Ρ Π·Π°ΡΠΈΡΠ° ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΈ. Π Π΅ΠΆΠΈΠΌΡ ΡΠ°Π±ΠΎΡΡ Π±Π»ΠΎΡΠ½ΡΡ ΡΠΈΡΡΠΎΠ²».
- 6. Π Π΅ΠΊΠΎΠΌΠ΅Π½Π΄Π°ΡΠΈΠΈ ΠΏΠΎ ΡΡΠ°Π½Π΄Π°ΡΡΠΈΠ·Π°ΡΠΈΠΈ. ΠΠ°Π΄Π°Π½ΠΈΠ΅ ΠΏΠ°ΡΠ°ΠΌΠ΅ΡΡΠΎΠ² ΡΠ»Π»ΠΈΠΏΡΠΈΡΠ΅ΡΠΊΠΈΡ ΠΊΡΠΈΠ²ΡΡ Π² ΡΠΎΠΎΡΠ²Π΅ΡΡΡΠ²ΠΈΠΈ Ρ ΠΠΠ‘Π’ Π 34.10—2012. — Π., 2013. URL: https://tc26.ru/mcthods/ recommendation/TK263K.pdf
- 7. Π Π΅ΠΊΠΎΠΌΠ΅Π½Π΄Π°ΡΠΈΠΈ ΠΏΠΎ ΡΡΠ°Π½Π΄Π°ΡΡΠΈΠ·Π°ΡΠΈΠΈ. ΠΡΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°Π½ΠΈΠ΅ ΠΊΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΠΈΡΠ΅ΡΠΊΠΈΡ Π°Π»Π³ΠΎΡΠΈΡΠΌΠΎΠ², ΡΠΎΠΏΡΡΡΡΠ²ΡΡΡΠΈΡ ΠΏΡΠΈΠΌΠ΅Π½Π΅Π½ΠΈΡ ΡΡΠ°Π½Π΄Π°ΡΡΠΎΠ² ΠΠΠ‘Π’ Π 34.10—2012 ΠΈ ΠΠΠ‘Π’ Π 34.11—2012. — Π" 2014. URL: https://tc26.ru/methods/rccommcndation/TK26AJir.pdf
- 8. SO/IEC 18 033−1:2015 Information technology — Security techniques — Encryption algorithms — Part 1: General.
- 9. ISO/IEC 18 033−2:2006 Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers.
- 10. ISO/IEC 18 033−3:2010 Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers.
ll.ISO/IEC 18 033−4:2011 Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers.
- 12. ISO/IEC 10 116:2006 Information technology — Security techniques — Modes of operation for an n-bit block cipher.
- 13. ISO/IEC 9797−1:2011 Information technology — Security techniques — Message Authentication Codes (MACs) — Part 1: Mechanisms using a block cipher.
- 14. ISO/IEC 9797−2:2011 Information technology — Security techniques — Message Authentication Codes (MACs) — Part 2: Mechanisms using a dedicated hash-function.
- 15. ISO/IEC 9797−3:2011 Information technology — Security techniques — Message Authentication Codes (MACs) — Part 3: Mechanisms using a universal hash-function.
- 16. ISO/IEC 10 118−1:2000 Information technology — Security techniques — Hashfunctions — Part 1: General.
- 17. ISO/IEC 10 118−2:2010 Information technology — Security techniques — Hashfunctions — Part 2: Hash-functions using an n-bit block cipher.
- 18. ISO/IEC 10 118−3:2004 Information technology — Security techniques — Hashfunctions — Part 3: Dedicated hash-functions.
- 19. SO/IEC 10 118−3:2004/Amd 1:2006 Dedicated Hash-Function 8 (SHA-224).
- 20. ISO/IEC 10 118−4:1998 Information technology — Security techniques — Hashfunctions — Part 4: Hash-functions using modular arithmetic.
- 21. ISO/IEC 10 118−4:1998/Amd 1:2014 Object identifiers.
- 22. ISO/IEC 14 888−1:2008 Information technology — Security techniques — Digital signatures with appendix — Part 1: General.
- 23. ISO/IEC 14 888−2:2008 Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms.
- 24. ISO/IEC 14 888−3:2006 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms.
- 25. ISO/IEC 14 888−3:2006/Amd 1:2010 Elliptic Curve Russian Digital Signature Algorithm, Schnorr Digital Signature Algorithm, Elliptic Curve Schnorr Digital Signature Algorithm, and Elliptic Curve Full Schnorr Digital Signature Algorithm.
- 26. ISO/IEC 20 008−1:2013 Information technology — Security techniques — Anonymous digital signatures — Part 1: General.
- 27. ISO/IEC 20 008−2:2013 Information technology — Security techniques — Anonymous digital signatures — Part 2: Mechanisms using a group public key.
- 28. ISO/IEC 9796−2:2010 Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Integer factorization based mechanisms.
- 29. ISO/IEC 9796−3:2006 Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms.
- 30. ISO/IEC 15 946−1:2008 Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General.
- 31. ISO/IEC 15 946−5:2009 Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generation.
- 32. FIPS PUB 140−2. Federal Information Processing Standards Publication. Security requirements for cryptographic modules. May 2001. URL: http://csrc.nist.gov/ publications/fips/fipsl40−2/fips 1402. pdf
- 33. FIPS PUB 180−4. Federal Information Processing Standards Publication. Secure Hash Standard (SIIS). August 2015. URL: http://nvlpubs.nist.gov/nistpubs/FIPS/ NIST.FIPS.180−4.pdf
- 34. FIPS PUB 186−4. Federal Information Processing Standards Publication. Digital Signature Standard (DSS). July 2013. URL: http://nvlpubs.nist.gov/nistpubs/FIPS/ NIST.FIPS.186−4.pdf
- 35. FIPS PUB 197. Federal Information Processing Standards Publication. Advanced Encryption Standard (AES). November 26,2001. URL: http://csrc.nist.gov/publications/ fips/fipsl97/fips-197.pdf
- 36. FIPS PUB 198−1. Federal Information Processing Standards Publication. The Keyed-Hash Message Authentication Code (HMAC). July 2008. URL: http:// csrc.nist.gov/publications/fips/fipsl98-l/FIPS-198-l_final.pdf
- 37. FIPS PUB 202. Federal Information Processing Standards Publication. SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions. August 2015. URL: http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf
- 38. NIST SP 800−38A 2001 Edition. Recommendation for Block Cipher Modes of Operation. Methods and Techniques. // NIST. — Dec. 2001. URL: http://csrc.nist.gov/ publications/nistpubs/800−38a/sp800−38a.pdf
- 39. Addendum to NIST Special Publication 800−38A Recommendation for Block Cipher Modes of Operation: Three Variants of Ciphertext Stealing for CBC Mode. October 2010. URL: http://csrc.nist.gov/publications/nistpubs/800−38a/addendumto-nist_sp800−38Apdf
- 40. NIST Special Publication 800−38B. Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication. May 2005. URL: http:// csrc.nist.gov/publications/nistpubs/800−38B/SP800−38B.pdf
- 41. NIST Special Publication 800−38C. Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality. May 2004. URL: http://csrc.nist.gov/publications/nistpubs/800−38C/SP800−38C_updatcd-July20_ 2007. pdf
- 42. NIST Special Publication 800−38D. Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC. November 2007. URL: http:// csrc.nist.gov/publications/nistpubs/800−38D/SP-800−38D.pdf
- 43. NIST Special Publication 800−56A Revision 2. Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography. May 2013. URL: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800−56Ar2.pdf
- 44. NIST Special Publication 800−56B. Revision 1. Recommendation for Pair-Wise Key-Establishment Schemes Using Integer Factorization Cryptography. September 2014. URL: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800−56Brl.pdf
- 45. NIST Special Publication 800−67. Revision 1. Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher. July 2011. URL: http://csrc.nist.gov/ publications/nistpubs/800−67-RcT/SP-800−67-Revl.pdf
- 46. NIST Special Publication 800−90A Recommendation for Random Number Generation Using Deterministic Random Bit Generators. January 2012. URL: http:// csrc.nist.gov/publications/nistpubs/800−90A/SP800−90Apdf
- 47. NIST Special Publication 800−106. Randomized Hashing for Digital Signatures. February 2009. URL: http://csrc.nist.gov/publications/nistpubs/800−106/NIST-SP- 800−106.pdf
- 48. NIST Special Publication 800−133. Recommendation for Cryptographic Key Generation. December 2012. URL: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/ NIST.SP.800−133.pdf