ISO/IEC 9979

Register of Cryptographic Algorithms

Contents

Introduction to the register; ISO/IEC 9979; Summary of entries in register; How to get an algorithm added to the register; Acknowledgements; Footnotes


Introduction to the register

These pages no longer have any official status, and are displayed here for historical purposes only. The standard (ISO/IEC 9979) under whose authority these pages were maintained was withdrawn on 9th February 2006, and hence these pages lost their official status as of that date. The decision to start the withdrawal process is recorded in a document produced in October 2004 (see SC27 N4261rev1), in which ISO/IEC JTC1 SC27 recommended that ISO/IEC 9979 be withdrawn. This reflects the fact that the register was rendered redundant by the publication of the four-part international standard on encryption, ISO/IEC 18033.

The ISO/IEC Register of cryptographic algorithms serves as a common reference point for the identification of cryptographic algorithms by a unique name. The register is also a repository of basic parameters identified with the register entry. The principal purpose of the register is to enable entities to identify and negotiate an agreed cryptographic algorithm.

International Standard ISO/IEC 9979, produced and maintained by ISO/IEC JTC1/SC27, specifies the procedures for the registering of cryptographic algorithms and the form of register entries.

Back to top of page


ISO/IEC 9979 (2nd edition, 1999)

This standard describes the role of the Registration Authority responsible for the maintenance of the ISO Register and the publishing of Register entries.

This standard also defines the three types of cryptographic algorithm to be registered:

The procedures for registration are presented: covering the submission of new register entries, responsibilities of the submitter, and submissions for the modifications or deletions. This standard defines the general contents of the register: the information that the submitter must supply that is mandatory and information that is optional. It also specifies that exact form of the Register entries, with examples. Finally the standard provides a definition of a cryptographic algorithm for the purposes of registration.

Back to top of page


Summary of entries in register

For details of a register entry please click on the Entry index. This links directly to a pdf file containing a copy of the original register submission; html versions of the register entries will be prepared as and when resources allow.

Entry index

ISO entry name

Proprietary entry name

Sponsoring body / Requested by

Date registered

Date amended

0001

{ iso standard 9979 b-crypt (1) }

B-CRYPT

BSI / BT Development and

Procurement

19 August 92

 

0002

{ iso standard 9979 idea-tm (2) }

IDEAä

SNV / Ascom Tech Ltd

10 May 93

 

0003

{ iso standard 9979 luc-pkcds (3) }

LUC Public-Key Cryptosystem

and Digital Signature

Standards New Zealand / LUC

Encryption Technology Ltd.

29 July 94

 

0004

{ iso standard 9979 des (4) }

Data Encryption Standard (DES)

ANSI / National Communications

System NT

5 September 94

 

0005

{ iso standard 9979 cdmf (5) }

Commercial Data Masking Facility (CDMF)

ANSI / IBM Corporation

29 October 94

 

0006

{ iso standard 9979 skipjack (6) }

Skipjack

ANSI / National Security Agency

31 October 94

 

0007

{ iso standard 9979 rc4-ssc (7) }

RC4 Symmetric Stream Cipherä

ANSI / RSA Data Security Inc

31 October 94

 

0008

{ iso standard 9979 rc2-sbc (8) }

RC2 Symmetric Block Cipherä

ANSI / RSA Data Security Inc

31 October 94

 

0009

{ iso standard 9979 multi2 (9) }

MULTI2

IPA / Hitachi, Ltd

14 November 94

 

0010

{ iso standard 9979 feal (10) }

FEAL

IPA / Nippon Telegraph and Telephone Corporation

14 November 94

 

0011

{ iso standard 9979 baras (11) }

BARAS

ETSI / ETSI

18 August 95

 

0012

{ iso standard 9979 sxal-mbal

(12) }

Substitution Xor Algorithm (SXAL) / Multi Block Algorithm (MBAL)

IPA / Laurel Intelligent Systems Co. Ltd.

23 October 95

 

0013

{ iso standard 9979 misty1 (13) }

MISTY1

IPA / Mitsubishi Electric Corporation.

27 November 96

 

0014

{ iso standard 9979 encrip (14) }

ENCRiP

IPA/NEC Corporation C&C Laboratories

12 February 97

 

0015

{iso standard 9979 acr (15)}

ACR

AFNOR / SAGEM SA

8 May 97

 

0016

{iso standard 9979 fwz1 (16)}

FWZ1

Standards Institution of Israel (SII) / Check Point Software Technologies Ltd

17 June 97

 

0017

{iso standard 9979 speam1 (17)}

SPEAM1

IPA / Matsushita Electric Industrial Co, Ltd

5 December 97

 

0018

{iso standard 9979 elcurve (18)}

ELCURVE

IPA / Hitachi, Ltd

13 May 98

 

0019

{iso standard 9979 cipher (19)}

CIPHERUNICORN-E

IPA / NEC Corporation C&C Laboratories

6 July 98

 

0020

{ iso standard 9979 m8 (20) }

M8

IPA / Hitachi, Ltd

19 March 99

 

0021

{iso standard 9979 gcc (21) }

GCC

IPA / International Information Science Institute CO., Ltd

4th January 00

 

0022

{iso standard 9979 triplo (22)}

Triplo

IPA / Toshiba Corporation

27th April 00

 

0023

{iso standard 9979 fsango (23)}

FSAngo

IPA / Fujisoft ABC Inc

9th October 00

 

0024

{iso standard 9979 blic (24)}

BLIC

IPA / BSY CO. Ltd

1st February 01

 

Back to top of page


How to get an algorithm added to the register

The register of cryptographic algorithms is kept on behalf of the International Standards Organisation by the:

Information Security Group (ISG)
Royal Holloway
University of London
Egham
Surrey TW20 0EX
United Kingdom

Records are kept in accordance with ISO/IEC 9979 under the terms of resolution 44 of the 13th ISO/IEC JTC1 SC27 plenary meeting held in Seoul, Republic of Korea, October 22-24, 2001.

ISO/IEC JTC 1/SC 27 thanks the UK National Body and Royal Holloway College (University of London) for their very kind offer to provide the register of cryptographic algorithms based on IS 9979. SC 27 gratefully accepts this offer. SC 27 requests ISO/IEC JTC 1 to initiate the appropriate actions.

Entries for registration should be submitted in free-form text, under the headings set out in ISO/IEC 9979, Section 9, Sub-sections 9.2 to 9.13. Submission of new entries may, in accordance with ISO/IEC 9979, only be made by an ISO member body, an ISO technical committee or a liaison organisation.

The Information Security Group of Royal Holloway, University of London (ISG) has not evaluated or made any judgement of the quality of protection provided by the registered algorithms. Registration of an algorithm does not imply that the algorithm is an ISO standard.

For further information, including copies of the entry for an individual algorithm as submitted by the sponsoring ISO Member Body or liaison organisation, please contact:

Professor Chris Mitchell
Information Security Group
Royal Holloway, University of London
Egham
Surrey TW20 0EX
United Kingdom

Tel: +44-1784-443423
Fax: +44-1784-430766

E-mail: me@chrismitchell.net

Back to top of page


Acknowledgements

From its inception in 1992 until late 2001 the register was held and maintained by The NCC, Manchester, UK. Until 1995, the register was maintained by Chris Hook for the National Computing Centre Ltd. From 1996 until 2001 the register was maintained by Dave Bamber (from 1996 to 2000 for the National Computing Centre Ltd., and from 2000 to 2001 for The NCC Group).

Back to top of page


Footnotes

The ISO register of algorithms web pages are hosted by the Information Security Group of Royal Holloway, University of London. Please send any comments, queries or corrections to me@chrismitchell.net. This page was most recently changed on 8th January 2013.