Customer Support: 131 242

  • Shopping Cart
    There are no items in your cart
Please Select Your Option.
It seems you are away from your “home” country. Do you wish to be re-directed to your “home” store? If you choose “YES”, you will see product, taxation, and shipping information relevant to your country. If you select “NO”, the current store's conditions will apply.
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

INCITS/ISO/IEC 15945 : 2002

Current

Current

The latest, up-to-date edition.

INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES

Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

01-01-2007

1 Scope
2 Normative references
3 Definitions
4 Abbreviations
5 Descriptive classification of services
6 Minimal certificate and CRL profile
7 Certificate management messages
8 Data structures for certificate management messages
9 Online Certificate Status Protocol
Annex A - Interworking
Annex B - Algorithms
Annex C - Bibliography

Delineates those TTP services needed to support the application of digital signatures for the purpose of non-repudiation of creation of documents.

DocumentType
Standard
Pages
60
ProductNote
Reconfirmed 2002
PublisherName
Information Technology Industry Council
Status
Current

Standards Relationship
ISO/IEC 15945:2002 Identical

ISO/IEC 13888-2:2010 Information technology Security techniques Non-repudiation Part 2: Mechanisms using symmetric techniques
ISO/IEC 15408-2:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components
ISO/IEC 10181-7:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Security audit and alarms framework
FIPS PUB 140 : 0001 SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES
ISO/IEC 14888-3:2016 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
ISO/IEC 8825-1:2015 Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1:
ISO/IEC 11770-2:2008 Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques
ISO/IEC 15408-3:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components
ISO/IEC 9796-3:2006 Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms
ISO/IEC 8824-2:2015 Information technology Abstract Syntax Notation One (ASN.1): Information object specification Part 2:
ISO/IEC 13888-3:2009 Information technology Security techniques Non-repudiation Part 3: Mechanisms using asymmetric techniques
ISO/IEC 10181-3:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Access control framework
ISO/IEC 10181-1:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Overview
ISO/IEC 9594-8:2017 Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks
ISO/IEC 9594-3:2017 Information technology Open Systems Interconnection The Directory Part 3: Abstract service definition
ISO/IEC 9594-6:2017 Information technology Open Systems Interconnection The Directory Part 6: Selected attribute types
ISO/IEC 8824-4:2015 Information technology Abstract Syntax Notation One (ASN.1): Parameterization of ASN.1 specifications Part 4:
ISO/IEC 14888-1:2008 Information technology — Security techniques — Digital signatures with appendix — Part 1: General
ISO/IEC 10118-1:2016 Information technology Security techniques Hash-functions Part 1: General
ISO/IEC 13888-1:2009 Information technology Security techniques Non-repudiation Part 1: General
ISO/IEC 10181-4:1997 Information technology Open Systems Interconnection Security frameworks for open systems: Non-repudiation framework Part 4:
ISO/IEC 10181-2:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Authentication framework
ISO/IEC 9796-2:2010 Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms
ISO/IEC 15946-2:2002 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 2: Digital signatures
ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
ISO/IEC 10181-5:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Confidentiality framework
ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
ISO/IEC 8824-1:2015 Information technology Abstract Syntax Notation One (ASN.1): Specification of basic notation Part 1:
ISO/IEC 9594-2:2017 Information technology Open Systems Interconnection The Directory Part 2: Models
ISO/IEC 10181-6:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Integrity framework
ISO/IEC 10118-2:2010 Information technology Security techniques Hash-functions Part 2: Hash-functions using an n-bit block cipher
ISO/IEC 14888-2:2008 Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms
ISO/IEC 8824-3:2015 Information technology Abstract Syntax Notation One (ASN.1): Constraint specification Part 3:
ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
ISO/IEC 9594-5:2017 Information technology Open Systems Interconnection The Directory Part 5: Protocol specifications
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.