<?xml version="1.0" encoding="UTF-8"?><marc:collection xmlns:marc="http://www.loc.gov/MARC21/slim">
  <marc:record>
    <marc:leader>00000nam  2200000zi 4500</marc:leader>
    <marc:controlfield tag="001">9.843597</marc:controlfield>
    <marc:controlfield tag="003">CaOODSP</marc:controlfield>
    <marc:controlfield tag="005">20250507085346</marc:controlfield>
    <marc:controlfield tag="006">m     o  d f      </marc:controlfield>
    <marc:controlfield tag="007">cr mn|||||||||</marc:controlfield>
    <marc:controlfield tag="008">170914e201608##onca    ob   f000 0 eng d</marc:controlfield>
    <marc:datafield tag="040" ind1=" " ind2=" ">
      <marc:subfield code="a">CaOODSP</marc:subfield>
      <marc:subfield code="b">eng</marc:subfield>
      <marc:subfield code="e">rda</marc:subfield>
      <marc:subfield code="c">CaOODSP</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="043" ind1=" " ind2=" ">
      <marc:subfield code="a">n-cn---</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="086" ind1="1" ind2=" ">
      <marc:subfield code="a">D97-3/111-2016E-PDF</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="245" ind1="0" ind2="0">
      <marc:subfield code="a">Cryptographic algorithms for UNCLASSIFIED, PROTECTED A, and PROTECTED B information.</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="250" ind1=" " ind2=" ">
      <marc:subfield code="a">[First release].</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="264" ind1=" " ind2="1">
      <marc:subfield code="a">[Ottawa] : </marc:subfield>
      <marc:subfield code="b">Communications Security Establishment = Centre de la sécurité des télécommunications, </marc:subfield>
      <marc:subfield code="c">August 2016.</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="300" ind1=" " ind2=" ">
      <marc:subfield code="a">1 online resource (24 pages) : </marc:subfield>
      <marc:subfield code="b">colour illustration.</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="336" ind1=" " ind2=" ">
      <marc:subfield code="a">text</marc:subfield>
      <marc:subfield code="b">txt</marc:subfield>
      <marc:subfield code="2">rdacontent</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="337" ind1=" " ind2=" ">
      <marc:subfield code="a">computer</marc:subfield>
      <marc:subfield code="b">c</marc:subfield>
      <marc:subfield code="2">rdamedia</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="338" ind1=" " ind2=" ">
      <marc:subfield code="a">online resource</marc:subfield>
      <marc:subfield code="b">cr</marc:subfield>
      <marc:subfield code="2">rdacarrier</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="490" ind1="1" ind2=" ">
      <marc:subfield code="a">Practitioner series : information technology security guidance ; </marc:subfield>
      <marc:subfield code="v">ITSP.40.111</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="500" ind1=" " ind2=" ">
      <marc:subfield code="a">Issued also in French under title: Algorithmes cryptographiques pour l'information NON CLASSIFIÉ, PROTÉGÉ A et PROTÉGÉ B.</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="500" ind1=" " ind2=" ">
      <marc:subfield code="a">Edition statement supplied from Version 2.</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="504" ind1=" " ind2=" ">
      <marc:subfield code="a">Includes bibliographical references.</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="520" ind1=" " ind2=" ">
      <marc:subfield code="a">"The Government of Canada's (GC) ability to protect sensitive data and information is fundamental to the delivery of programs and services. Cryptography provides security mechanisms which can be used to protect the authenticity, confidentiality, and integrity of GC information. Data authenticity, confidentiality and integrity, stakeholder authentication and accountability, and non-repudiation are all benefits of properly configured cryptography. Several algorithms may be required to satisfy these security requirements, and each algorithm should be selected and implemented to ensure these requirements are met. The information in this publication identifies and describes approved cryptographic algorithms and appropriate methods of use to protect the confidentiality of PROTECTED A and PROTECTED B information and the integrity of information to the medium injury level as defined in CSE's ITSG-33 IT Security Risk Management: A Lifecycle Approach"--Overview, page 3.</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="650" ind1=" " ind2="0">
      <marc:subfield code="a">Electronic government information</marc:subfield>
      <marc:subfield code="x">Access control</marc:subfield>
      <marc:subfield code="z">Canada.</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="650" ind1=" " ind2="0">
      <marc:subfield code="a">Data protection</marc:subfield>
      <marc:subfield code="z">Canada.</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="650" ind1=" " ind2="0">
      <marc:subfield code="a">Data encryption (Computer science)</marc:subfield>
      <marc:subfield code="z">Canada.</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="650" ind1=" " ind2="0">
      <marc:subfield code="a">Computer algorithms.</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="710" ind1="2" ind2=" ">
      <marc:subfield code="a">Communications Security Establishment (Canada), </marc:subfield>
      <marc:subfield code="e">issuing body</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="775" ind1="0" ind2="8">
      <marc:subfield code="t">Algorithmes cryptographiques pour l'information NON CLASSIFIÉ, PROTÉGÉ A et PROTÉGÉ B.</marc:subfield>
      <marc:subfield code="w">(CaOODSP)9.843598</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="794" ind1=" " ind2=" ">
      <marc:subfield code="t">Cryptographic algorithms for unclassified, protected A, and protected B information.</marc:subfield>
      <marc:subfield code="b">(Version 2)</marc:subfield>
      <marc:subfield code="w">(CaOODSP)9.914450</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="830" ind1="#" ind2="0">
      <marc:subfield code="a">Practitioner series (Communications Security Establishment (Canada))</marc:subfield>
      <marc:subfield code="v">ITSP.40.111.</marc:subfield>
      <marc:subfield code="w">(CaOODSP)9.842846</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="856" ind1="4" ind2="0">
      <marc:subfield code="q">PDF</marc:subfield>
      <marc:subfield code="s">474 KB</marc:subfield>
      <marc:subfield code="u">https://publications.gc.ca/collections/collection_2017/cstc-csec/D97-3-111-2016-eng.pdf</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="856" ind1="4" ind2=" ">
      <marc:subfield code="q">HTML</marc:subfield>
      <marc:subfield code="s">N/A</marc:subfield>
      <marc:subfield code="u">https://cyber.gc.ca/en/guidance/cryptographic-algorithms-unclassified-protected-and-protected-b-information-itsp40111</marc:subfield>
    </marc:datafield>
  </marc:record>
</marc:collection>
