Customer Support: 131 242

  • There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

ISO/IEC 10118-3:2004

Withdrawn

Withdrawn

A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

View Superseded by

Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions

Available format(s)

Hardcopy , PDF 1 User , PDF 3 Users , PDF 5 Users , PDF 9 Users

Withdrawn date

19-02-2019

Superseded by

ISO/IEC 10118-3:2018

Published date

24-02-2004

$118.72
Including GST where applicable

ISO/IEC 10118-3:2004 specifies the following seven dedicated hash-functions, i.e. specially-designed hash-functions:

  • the first hash-function (RIPEMD-160) in Clause 7 provides hash-codes of lengths up to 160 bits;
  • the second hash-function (RIPEMD-128) in Clause 8 provides hash-codes of lengths up to 128 bits;
  • the third hash-function (SHA-1) in Clause 9 provides hash-codes of lengths up to 160 bits;
  • the fourth hash-function (SHA-256) in Clause 10 provides hash-codes of lengths up to 256 bits;
  • the fifth hash-function (SHA-512) in Clause 11 provides hash-codes of lengths up to 512 bits;
  • the sixth hash-function (SHA-384) in Clause 12 provides hash-codes of a fixed length, 384 bits; and
  • the seventh hash-function (WHIRLPOOL) in Clause 13 provides hash-codes of lengths up to 512 bits.

For each of these dedicated hash-functions, ISO/IEC 10118-3:2004 specifies a round-function that consists of a sequence of sub-functions, a padding method, initializing values, parameters, constants, and an object identifier as normative information, and also specifies several computation examples as informative information.

DocumentType
Standard
Pages
94
PublisherName
International Organization for Standardization
Status
Withdrawn
SupersededBy
Supersedes

07/30154069 DC : 0 BS ISO/IEC 24727-3 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 3: APPLICATION INTERFACE
CSA ISO/IEC 18033-2 :2006 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS
I.S. EN 62940:2017 MARITIME NAVIGATION AND RADIOCOMMUNICATION EQUIPMENT AND SYSTEMS - INTEGRATED COMMUNICATION SYSTEM (ICS) - OPERATIONAL AND PERFORMANCE REQUIREMENTS, METHODS OF TESTING AND REQUIRED TEST RESULTS
TR 119 001 : 1.2.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); THE FRAMEWORK FOR STANDARDIZATION OF SIGNATURES; DEFINITIONS AND ABBREVIATIONS
I.S. EN ISO 12855:2015 ELECTRONIC FEE COLLECTION - INFORMATION EXCHANGE BETWEEN SERVICE PROVISION AND TOLL CHARGING (ISO 12855:2015)
IEEE 1076-2008 REDLINE IEEE Standard VHDL Language Reference Manual
08/30169511 DC : DRAFT DEC 2008 BS ISO/IEC 13888-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES
CSA ISO/IEC 9798-5 : 2010 : R2015 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO-KNOWLEDGE TECHNIQUES
PD CEN/TS 15480-2:2012 Identification card systems. European Citizen Card Logical data structures and security services
INCITS/ISO/IEC 9797-2 : 2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 2: MECHANISMS USING A DEDICATED HASH-FUNCTION
CSA ISO/IEC TR 14516 : 2004 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES
BS ISO 21188:2006 Public key infrastructure for financial services. Practices and policy framework
INCITS/ISO/IEC 15946-3 : 2002 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 3: KEY ESTABLISHMENT
CAN/CSA-ISO/IEC TR 14516-04 (R2017) Information Technology - Security Techniques - Guidelines for the use and Management of Trusted Third Party Services (Adopted ISO/IEC TR 14516:2002, first edition, 2002-06-15)
BS ISO 9735-10:2014 Electronic data interchange for administration, commerce and transport (EDIFACT). Application level syntax rules (Syntax version number: 4, Syntax release number: 2) Syntax service directories
CSA ISO/IEC TR 14516 : 2004 : R2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES
INCITS/ISO/IEC 15945 : 2002 : R2007 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES
INCITS/ISO/IEC 15945 : 2002 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES
INCITS/ISO/IEC 11770-5 : 2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 5: GROUP KEY MANAGEMENT
DIN ISO 9735-10:2015-05 ELECTRONIC DATA INTERCHANGE FOR ADMINISTRATION, COMMERCE AND TRANSPORT (EDIFACT) - APPLICATION LEVEL SYNTAX RULES (SYNTAX VERSION NUMBER: 4, SYNTAX RELEASE NUMBER: 2) - PART 10: SYNTAX SERVICE DIRECTORIES (ISO 9735-10:2014)
CAN/CSA-ISO/IEC 18033-2:06 (R2016) INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS
CSA ISO/IEC 9798-5 : 2010 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO-KNOWLEDGE TECHNIQUES
EN ISO 24534-4:2010 Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques (ISO 24534-4:2010)
IEEE 1363.2 : 2008 SPECIFICATION FOR PASSWORD-BASED PUBLIC-KEY CRYPTOGRAPHIC TECHNIQUES
I.S. EN 62734:2015 INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A
S.R. CEN/TS 15480-2:2012 IDENTIFICATION CARD SYSTEMS - EUROPEAN CITIZEN CARD - PART 2: LOGICAL DATA STRUCTURES AND SECURITY SERVICES
UNI CEN/TS 15480-2 : 2012 IDENTIFICATION CARD SYSTEMS - EUROPEAN CITIZEN CARD - PART 2: LOGICAL DATA STRUCTURES AND SECURITY SERVICES
ISO/IEC 18033-2:2006 Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
BS ISO 16609:2012 Financial services. Requirements for message authentication using symmetric techniques
BS IEC 61691-1-1:2011 Behavioural languages VHDL Language reference manual
UNI CEI ISO/IEC 29500-1 : 2013 INFORMATION TECHNOLOGY - DOCUMENT DESCRIPTION AND PROCESSING LANGUAGES - OFFICE OPEN XML FILE FORMATS - PART 1: FUNDAMENTALS AND MARKUP LANGUAGE REFERENCE
ISO/IEC 25185-1:2016 Identification cards Integrated circuit card authentication protocols Part 1: Protocol for Lightweight Authentication of Identity
IEC 61691-1-1:2011 Behavioural languages - Part 1-1: VHDL Language Reference Manual
ISO/IEC 15945:2002 Information technology — Security techniques — Specification of TTP services to support the application of digital signatures
CEN/TS 16702-2:2015 Electronic fee collection - Secure monitoring for autonomous toll systems - Part 2: Trusted recorder
CEN/TS 15130:2006 Postal services - DPM infrastructure - Messages supporting DPM applications
CEN ISO/TS 19299:2015 Electronic fee collection - Security framework (ISO/TS 19299:2015)
IEC 62320-2:2016 RLV Maritime navigation and radiocommunication equipment and systems - Automatic identification system (AIS) - Part 2: AIS AtoN Stations - Operational and performance requirements, methods of testing and required test results
EN 61162-460:2015 Maritime navigation and radiocommunication equipment and systems - Digital interfaces - Part 460: Multiple talkers and multiple listeners - Ethernet interconnection - Safety and security
EN 62940:2017 Maritime navigation and radiocommunication equipment and systems - Integrated communication system (ICS) - Operational and performance requirements, methods of testing and required test results
EN 62734:2015 Industrial networks - Wireless communication network and communication profiles - ISA 100.11a
CEN/TS 15480-2:2012 Identification card systems - European Citizen Card - Part 2: Logical data structures and security services
17/30337383 DC : 0 BS ISO/IEC 14888-3 AMD1 - INFORMATION SECURITY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 3: DISCRETE LOGARITHM BASED MECHANISMS
ISO/IEC 11770-5:2011 Information technology Security techniques Key management Part 5: Group key management
08/30169505 DC : DRAFT JULY 2008 BS ISO/IEC 13888-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 1: GENERAL
09/30202174 DC : 0 BS EN 50159 - RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY RELATED COMMUNICATION IN TRANSMISSION SYSTEMS
10/30192164 DC : DRAFT JUNE 2010 BS ISO/IEC 29150 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SIGNCRYPTION
S.R. CEN/TS 16702-2:2015 ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 2: TRUSTED RECORDER
DD CEN/TS 15130:2006 Postal services. DPM infrastructure. Messages supporting DPM applications
10/30228327 DC : 0 BS ISO/IEC 18031 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION
UNI CEI ISO/IEC 29500-4 : 2013 INFORMATION TECHNOLOGY - DOCUMENT DESCRIPTION AND PROCESSING LANGUAGES - OFFICE OPEN XML FILE FORMATS - PART 4: TRANSITIONAL MIGRATION FEATURES
12/30259506 DC : DRAFT JAN 2012 BS EN 62734 - INDUSTRIAL COMMUNICATION NETWORKS - FIELDBUS SPECIFICATIONS - WIRELESS SYSTEMS FOR INDUSTRIAL AUTOMATION: PROCESS CONTROL AND RELATED APPLICATIONS (BASED ON ISA 100.11A)
16/30288045 DC : 0 BS ISO/IEC 20009-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ANONYMOUS ENTITY AUTHENTICATION - PART 4: MECHANISMS BASED ON WEAK SECRETS
BS ISO/IEC 19790:2012 Information technology. Security techniques. Security requirements for cryptographic modules
TS 133 220 : 13.0.0 DIGITAL CELLULAR TELECOMMUNICATIONS SYSTEM (PHASE 2+) (GSM); UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); LTE; GENERIC AUTHENTICATION ARCHITECTURE (GAA); GENERIC BOOTSTRAPPING ARCHITECTURE (GBA) (3GPP TS 33.220 VERSION 14.1.0 RELEASE 14)
PD ISO/TR 14742:2010 Financial services. Recommendations on cryptographic algorithms and their use
S.R. CEN/TS 16439:2013 ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK
BS ISO/IEC 15945:2002 Information technology. Security techniques. Specification of TTP services to support the application of digital signatures
CSA ISO/IEC 13888-3 : 2010 : R2015 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES
CSA ISO/IEC 9797-2:2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 2: MECHANISMS USING A DEDICATED HASH-FUNCTION
04/30105372 DC : DRAFT DEC 2004 ISO/IEC 11770-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS
ECMA 410 : 3ED 2017 NFC-SEC-03: NFC-SEC ENTITY AUTHENTICATION AND KEY AGREEMENT USING ASYMMETRIC CRYPTOGRAPHY
DD CEN/TS 15480-2:2007 Identification card systems. European Citizen Card Logical data structures and card services
CAN/CSA-ISO/IEC 9797-2:13 (R2017) Information technology - Security techniques - Message authentication codes (MACs) - Part 2: Mechanisms using a dedicated hash-function (Adopted ISO/IEC 9797-2:2011, second edition, 2011-05-01)
CAN/CSA-ISO/IEC 15945-04 (R2017) Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures (Adopted ISO/IEC 15945:2002, first edition, 2002-02-01)
INCITS/ISO/IEC 18033-2 : 2008 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS
ISO/IEC 19790:2012 Information technology — Security techniques — Security requirements for cryptographic modules
BS ISO/IEC 18031 : 2011 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION
BS ISO/IEC 18013-3:2017 Information technology. Personal identification. ISO-compliant driving licence Access control, authentication and integrity validation
ETR 237 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG) - BASELINE SECURITY STANDARDS - FEATURES AND MECHANISMS
ISO/IEC 9834-8:2014 Information technology — Procedures for the operation of object identifier registration authorities — Part 8: Generation of universally unique identifiers (UUIDs) and their use in object identifiers
BS EN ISO 24534-4:2010+A1:2019 Automatic vehicle and equipment identification. Electronic registration identification (ERI) for vehicles Secure communications using asymmetrical techniques
ISO/IEC 29500-1:2016 Information technology — Document description and processing languages — Office Open XML File Formats — Part 1: Fundamentals and Markup Language Reference
PREN 50159 : DRAFT 2009 RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS
ISO 21188:2018 Public key infrastructure for financial services — Practices and policy framework
ISO/IEC 11889-1:2015 Information technology Trusted platform module library Part 1: Architecture
ISO/IEC 13888-3:2009 Information technology Security techniques Non-repudiation Part 3: Mechanisms using asymmetric techniques
ISO/IEC 11889-2:2015 Information technology Trusted Platform Module Library Part 2: Structures
IEC 62530:2011 SystemVerilog - Unified Hardware Design, Specification, and Verification Language
NEMA PS3.3 : 2017A DIGITAL IMAGING AND COMMUNICATIONS IN MEDICINE (DICOM) - PART 3: INFORMATION OBJECT DEFINITIONS
NEMA PS 3.15 : 2017A DIGITAL IMAGING AND COMMUNICATIONS IN MEDICINE (DICOM) - PART 15: SECURITY AND SYSTEM MANAGEMENT PROFILES
IEEE 1800-2012 IEEE Standard for SystemVerilog--Unified Hardware Design, Specification, and Verification Language
04/30040717 DC : DRAFT JUL 2004 ISO/IEC 18033-2 - INFORMATION TECHNOLOGY - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS
08/30135059 DC : 0 ISO/IEC 9797-2 (REV) - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS)
17/30281253 DC : 0 BS ISO 21188 - PUBLIC KEY INFRASTRUCTURE FOR FINANCIAL SERVICES - PRACTICES AND POLICY FRAMEWORK
16/30346333 DC : 0 BS EN 61162-460 - MARITIME NAVIGATION AND RADIOCOMMUNICATION EQUIPMENT AND SYSTEMS -DIGITAL INTERFACES - PART 460: MULTIPLE TALKERS AND MULTIPLE LISTENERS - ETHERNET INTERCONNECTION - SAFETY AND SECURITY
BS ISO/IEC 17960:2015 Information technology. Programming languages, their environments and system software interfaces. Code signing for source code
PD CEN/TS 16702-2:2015 Electronic fee collection. Secure monitoring for autonomous toll systems Trusted recorder
BS ISO/IEC 13888-3:1997 Information technology. Security techniques. Non-repudiation Mechanisms using asymmetric techniques
15/30286868 DC : 0 BS ISO/IEC 14888-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 3: DISCRETE LOGARITHM BASED MECHANISMS
BS EN 50159:2010 Railway applications. Communication, signalling and processing systems. Safety-related communication in transmission systems
07/30163724 DC : 0 BS ISO/IEC 24727-4 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS PROGRAMMING INTERFACE - PART 4: API ADMINISTRATION
17/30345248 DC : 0 BS ISO/IEC 9798-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 3: MECHANISMS USING DIGITAL SIGNATURE TECHNIQUES
12/30228421 DC : 0 BS ISO/IEC 29192-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES
08/30180103 DC : DRAFT MAR 2008 BS EN 50136-1 - ALARM SYSTEMS - ALARM TRANSMISSION SYSTEMS - PART 1: GENERAL REQUIREMENTS FOR ALARM TRANSMISSION SYSTEMS
BS ISO/IEC 20009-4:2017 Information technology. Security techniques. Anonymous entity authentication Mechanisms based on weak secrets
TR 102 272 : 1.1.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); ASN.1 FORMAT FOR SIGNATURE POLICIES
PD CEN/TS 15480-3:2014 Identification card systems. European Citizen Card European Citizen Card Interoperability using an application interface
14/30302807 DC : 0 BS ISO/IEC 11889-4 - INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 4: SUPPORTING ROUTINES
04/30040736 DC : DRAFT DEC 2004 ISO/IEC 18031 - INFORMATION TECHNOLOGY - RANDOM NUMBER GENERATION
INCITS/ISO/IEC 18031 : 2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION
BS ISO/IEC 14888-3 : 2006 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 3: DISCRETE LOGARITHM BASED MECHANISMS
BS ISO/IEC 25185-1:2016 Identification cards. Integrated circuit card authentication protocols Protocol for Lightweight Authentication of Identity
07/30161079 DC : 0 BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
BS ISO/IEC 29150:2011 Information technology. Security techniques. Signcryption
BS EN ISO 12855:2015 Electronic fee collection. Information exchange between service provision and toll charging
ISO/IEC 29167-17:2015 Information technology Automatic identification and data capture techniques Part 17: Crypto suite cryptoGPS security services for air interface communications
ISO/IEC 18013-3:2017 Information technology — Personal identification — ISO-compliant driving licence — Part 3: Access control, authentication and integrity validation
CAN/CSA-ISO/IEC 18031:13 (R2017) Information technology - Security techniques - Random bit generation (Adopted ISO/IEC 18031:2011, second edition, 2011-11-15)
BS EN 62734:2015 Industrial networks. Wireless communication network and communication profiles. ISA 100.11a
CSA ISO/IEC 18031 : 2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION
SR 002 176 : 1.1.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); ALGORITHMS AND PARAMETERS FOR SECURE ELECTRONIC SIGNATURES
CSA ISO/IEC 14888-3 : 2018 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 3: DISCRETE LOGARITHM BASED MECHANISMS
ISO 15764:2004 Road vehicles Extended data link security
I.S. EN 61162-460:2015 MARITIME NAVIGATION AND RADIOCOMMUNICATION EQUIPMENT AND SYSTEMS - DIGITAL INTERFACES - PART 460: MULTIPLE TALKERS AND MULTIPLE LISTENERS - ETHERNET INTERCONNECTION - SAFETY AND SECURITY
BS ISO/IEC 29192-4 : 2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES
I.S. CEN TS 15130:2006 POSTAL SERVICES - DPM INFRASTRUCTURE - MESSAGES SUPPORTING DPM APPLICATIONS
S.R. CWA 16926-65:2015 EXTENSIONS FOR FINANCIAL SERVICES (XFS) INTERFACE SPECIFICATION RELEASE 3.30 - PART 65: PIN KEYPAD DEVICE CLASS INTERFACE - MIGRATION FROM VERSION 3.20 (CWA 16374) TO VERSION 3.30 (THIS CWA) - PROGRAMMER'S REFERENCE
ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
S.R. CEN/TS 15480-3:2014 IDENTIFICATION CARD SYSTEMS - EUROPEAN CITIZEN CARD - PART 3: EUROPEAN CITIZEN CARD INTEROPERABILITY USING AN APPLICATION INTERFACE
S.R. CEN ISO/TS 19299:2015 ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015)
ISO/IEC 29500-4:2016 Information technology — Document description and processing languages — Office Open XML File Formats — Part 4: Transitional Migration Features
CAN/CSA-ISO/IEC 17960:16 Information technology Programming languages, their environments and system software interfaces Code signing for source code (Adopted ISO/IEC 17960:2015, first edition, 2015-09-01)
CAN/CSA-ISO/IEC 11889-4:16 Information technology Trusted Platform Module Library Part 4: Supporting Routines (Adopted ISO/IEC 11889-4:2015, second edition, 2015-12-15)
BS ISO/IEC 11770-4:2017 Information technology. Security techniques. Key management Mechanisms based on weak secrets
TS 123 057 : 13.0.0 DIGITAL CELLULAR TELECOMMUNICATIONS SYSTEM (PHASE 2+) (GSM); UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); MOBILE EXECUTION ENVIRONMENT (MEXE); FUNCTIONAL DESCRIPTION; STAGE 2 (3GPP TS 23.057 VERSION 14.0.0 RELEASE 14)
ISO/IEC 17960:2015 Information technology Programming languages, their environments and system software interfaces Code signing for source code
ISO 24534-4:2010 Automatic vehicle and equipment identification — Electronic registration identification (ERI) for vehicles — Part 4: Secure communications using asymmetrical techniques
ISO 15782-1:2009 Certificate management for financial services Part 1: Public key certificates
ISO/IEC 9798-5:2009 Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques
ISO/TR 14742:2010 Financial services Recommendations on cryptographic algorithms and their use
ISO/IEC 9797-2:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function
I.S. EN 62320-2:2017 MARITIME NAVIGATION AND RADIOCOMMUNICATION EQUIPMENT AND SYSTEMS - AUTOMATIC IDENTIFICATION SYSTEM (AIS) - PART 2: AIS ATON STATIONS - OPERATIONAL AND PERFORMANCE REQUIREMENTS, METHODS OF TESTING AND REQUIRED TEST RESULTS
ISO/TS 19299:2015 Electronic fee collection Security framework
UNE-EN 50159:2011 Railway applications - Communication, signalling and processing systems - Safety-related communication in transmission systems
IEC 62734:2014 Industrial networks - Wireless communication network and communication profiles - ISA 100.11a
CEI EN 50159 : 2012 RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS
ONORM ONR CEN/TS 16702-2 : 2015 ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 2: TRUSTED RECORDER (CEN/TS 16702-2:2015)
TS 133 224 : 13.0.0 UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); LTE; GENERIC AUTHENTICATION ARCHITECTURE (GAA); GENERIC BOOTSTRAPPING ARCHITECTURE (GBA) PUSH LAYER (3GPP TS 33.224 VERSION 14.0.0 RELEASE 14)
TS 133 223 : 13.1.0 DIGITAL CELLULAR TELECOMMUNICATIONS SYSTEM (PHASE 2+) (GSM); UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); LTE; GENERIC AUTHENTICATION ARCHITECTURE (GAA); GENERIC BOOTSTRAPPING ARCHITECTURE (GBA) PUSH FUNCTION (3GPP TS 33.223 VERSION 14.0.0 RELEASE 14)
EN 62320-2:2017 MARITIME NAVIGATION AND RADIOCOMMUNICATION EQUIPMENT AND SYSTEMS - AUTOMATIC IDENTIFICATION SYSTEM (AIS) - PART 2: AIS ATON STATIONS - OPERATIONAL AND PERFORMANCE REQUIREMENTS, METHODS OF TESTING AND REQUIRED TEST RESULTS (IEC 62320-2:2016)
UNI CEI ISO/IEC 18013-3 : 2011 INFORMATION TECHNOLOGY - PERSONAL IDENTIFICATION - ISO-COMPLIANT DRIVING LICENCE - PART 3: ACCESS CONTROL, AUTHENTICATION AND INTEGRITY VALIDATION
INCITS/ISO/IEC 11889-4 : 2009(R2014) INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 4: COMMANDS
DD ENV 13729:2000 Health informatics. Secure user identification. Strong authentication microprocessor cards
14/30302798 DC : 0 BS ISO/IEC 11889-1 - INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 1: ARCHITECTURE
BS ISO/IEC 11770-5:2011 Information technology Security techniques. Key management Group key management
BS ISO/IEC 11889-4:2009 Information technology. Trusted platform module Commands
05/30092187 DC : DRAFT APR 2005 ISO 21188 - PUBLIC KEY INFRASTRUCTURE FOR FINANCIAL SERVICES - PRACTICES AND POLICY FRAMEWORK
ECMA 376 : 5ED 2015 OFFICE OPEN XML FILE FORMATS - PART 1: FUNDAMENTALS AND MARKUP LANGUAGE REFERENCE - PART 2: OPEN PACKAGING CONVENTIONS - PART 3: MARKUP COMPATIBILITY AND EXTENSIBILITY - PART 4: TRANSITIONAL MIGRATION FEATURES
BS ISO 15782-1:2009 Certificate management for financial services Public key certificates
BS ISO/IEC TR 14516:2002 Information technology. Security techniques. Guidelines for the use and management of trusted third party services
ISO/IEC 29192-4:2013 Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques
BS ISO/IEC 11889-2:2009 Information technology. Trusted platform module Design principles
10/30237107 DC : DRAFT DEC 2010 BS ISO/IEC 11770-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 5: GROUP KEY MANAGEMENT
UNE-EN ISO 24534-4:2012 Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques (ISO 24534-4:2010)
DIN CEN ISO/TS 19299;DIN SPEC 74125:2016-02 ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015)
BS EN 61162-460:2015 Maritime navigation and radiocommunication equipment and systems. Digital interfaces Multiple talkers and multiple listeners. Ethernet interconnection. Safety and security
14/30302801 DC : 0 BS ISO/IEC 11889-2 - INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 2: STRUCTURES
PD CEN ISO/TS 19299:2015 Electronic fee collection. Security framework
16/30329503 DC : 0 BS ISO 19847 - SHIPS AND MARINE TECHNOLOGY - SHIPBOARD DATA SERVERS TO SHARE FIELD DATA AT SEA
04/30093313 DC : DRAFT JUN 2004 ISO/IEC 9798-6 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 6: MECHANISMS USING MANUAL DATA TRANSFER
UNI CEN/TS 16439 : 2013 ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK
CSA ISO/IEC 15945 : 2004 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES
16/30335688 DC : 0 BS ISO/IEC 11770-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS
ISO/IEC 13157-4:2016 Information technology Telecommunications and information exchange between systems NFC Security Part 4: NFC-SEC entity authentication and key agreement using asymmetric cryptography
TS 101 438 : 7.2.0 DIGITAL CELLULAR TELECOMMUNICATIONS SYSTEM (PHASE 2+); MOBILE STATION APPLICATION EXECUTION ENVIRONMENT (MEXE); FUNCTIONAL DESCRIPTION STAGE 2
ISO/IEC TR 14516:2002 Information technology Security techniques Guidelines for the use and management of Trusted Third Party services
CAN/CSA-ISO/IEC 29167-17:16 Information technology Automatic identification and data capture techniques Part 17: Crypto suite cryptoGPS security services for air interface communications (Adopted ISO/IEC 29167-17:2015, first edition, 2015-06-01)
S.R. CWA 16926-6:2015 EXTENSIONS FOR FINANCIAL SERVICES (XFS) INTERFACE SPECIFICATION RELEASE 3.30 - PART 6: PIN KEYPAD DEVICE CLASS INTERFACE - PROGRAMMER'S REFERENCE
UNI EN ISO 24534-4 : 2011 AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES
ISO/IEC 29150:2011 Information technology — Security techniques — Signcryption
ISO/IEC 14543-5-1:2010 Information technology Home electronic system (HES) architecture Part 5-1: Intelligent grouping and resource sharing for Class 2 and Class 3 Core protocol
ISO/IEC 14888-3:2016 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
IEC PAS 63062:2016 Maritime navigation and radiocommunication equipment and systems - Removable external data source (REDS) - General requirements, methods of testing and required test results
I.S. EN ISO 24534-4:2010/A1:2019 AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES
ISO/IEC 11889-4:2015 Information technology Trusted Platform Module Library Part 4: Supporting Routines
I.S. EN 50159:2010 RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS
ISO/IEC 15444-8:2007 Information technology — JPEG 2000 image coding system: Secure JPEG 2000 — Part 8:
IEC 62280:2014 Railway applications - Communication, signalling and processing systems - Safety related communication in transmission systems
EN 50159:2010 Railway applications - Communication, signalling and processing systems - Safety-related communication in transmission systems
ISO 12855:2015 Electronic fee collection Information exchange between service provision and toll charging
IEC 62320-2:2016 Maritime navigation and radiocommunication equipment and systems - Automatic identification system (AIS) - Part 2: AIS AtoN Stations - Operational and performance requirements, methods of testing and required test results
UNE-ETSI/TS 101733 V1.2.2:2011 Electronic signature formats.
EN ISO 12855:2015 Electronic fee collection - Information exchange between service provision and toll charging (ISO 12855:2015)
INCITS/ISO/IEC 9798-5 : 2010 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO-KNOWLEDGE TECHNIQUES
UNI CEN/TS 15480-3 : 2014 IDENTIFICATION CARD SYSTEMS - EUROPEAN CITIZEN CARD - PART 3: EUROPEAN CITIZEN CARD INTEROPERABILITY USING AN APPLICATION INTERFACE
BS ISO/IEC 11889-1:2009 Information technology. Trusted platform module Overview
BS EN 62320-2:2017 Maritime navigation and radiocommunication equipment and systems. Automatic identification system (AIS) AIS AtoN Stations. Operational and performance requirements, methods of testing and required test results
BS ISO/IEC 9798-5:2009 Information technology. Security techniques. Entity authentication Mechanisms using zero knowledge techniques
BS IEC 62530:2011 SystemVerilog. Unified hardware design, specification, and verification language
DD CEN/TS 15480-3:2010 Identification card systems. European citizen card European citizen card interoperability using an application interface
06/30108755 DC : DRAFT FEB 2006 ISO/IEC 14888-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 1: GENERAL
BS ISO/IEC 14888-1:1998 Information technology. Security techniques. Digital signatures with appendix General
ISO/IEC 11770-4:2017 Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets
DD CEN ISO/TS 17574:2009 Electronic fee collection. Guidelines for security protection profiles
PD ISO/IEC TR 29149:2012 Information technology. Security techniques. Best practices for the provision and use of time-stamping services
BS ISO/IEC 18033-2 : 2006 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS
CSA ISO/IEC 15945 : 2004 : R2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES
INCITS/ISO/IEC 29192-4 : 2014 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES
PD CEN/TS 16439:2013 Electronic fee collection. Security framework
BS ISO/IEC 9797-2:2011 Information technology. Security techniques. Message Authentication Codes (MACs) Mechanisms using a dedicated hash-function
09/30199552 DC : DRAFT FEB 2009 BS ISO/IEC 18014-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TIME-STAMPING SERVICES - PART 3: MECHANISMS PRODUCING LINKED TOKENS
BS EN 62940:2017 Maritime navigation and radiocommunication equipment and systems. Integrated communication system (ICS). Operational and performance requirements, methods of testing and required test results
07/30105115 DC : 0 BS ISO/IEC 19772 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - AUTHENTICATED ENCRYPTION
07/30161232 DC : 0 BS ISO/IEC 11770-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES
CAN/CSA-ISO/IEC 11889-2:16 Information technology Trusted Platform Module Library Part 2: Structures (Adopted ISO/IEC 11889-2:2015, second edition, 2015-12-15)
IEEE DRAFT 1363 : D13 99 DRAFT STANDARD SPECIFICATIONS FOR PUBLIC KEY CRYPTOGRAPHY
INCITS/ISO/IEC 11770-4 : 2008 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS
CSA ISO/IEC 13888-3:2010 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES
CAN/CSA-ISO/IEC 11889-1:16 Information technology Trusted Platform Module Library Part 1: Architecture (Adopted ISO/IEC 11889-1:2015, second edition, 2015-12-15)
ISO/IEC 20009-4:2017 Information technology — Security techniques — Anonymous entity authentication — Part 4: Mechanisms based on weak secrets
ISO 16609:2012 Financial services — Requirements for message authentication using symmetric techniques
TS 119 312 : 1.2.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); CRYPTOGRAPHIC SUITES
ISO 9735-10:2014 Electronic data interchange for administration, commerce and transport (EDIFACT) — Application level syntax rules (Syntax version number: 4, Syntax release number: 2) — Part 10: Syntax service directories
TR 119 300 : 1.2.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); GUIDANCE ON THE USE OF STANDARDS FOR CRYPTOGRAPHIC SUITES
ISO/IEC TR 29149:2012 Information technology Security techniques Best practices for the provision and use of time-stamping services
EN 62320-2:2017 MARITIME NAVIGATION AND RADIOCOMMUNICATION EQUIPMENT AND SYSTEMS - AUTOMATIC IDENTIFICATION SYSTEM (AIS) - PART 2: AIS ATON STATIONS - OPERATIONAL AND PERFORMANCE REQUIREMENTS, METHODS OF TESTING AND REQUIRED TEST RESULTS (IEC 62320-2:2016)
CEN/TS 15480-3:2014 Identification card systems - European Citizen Card - Part 3: European Citizen Card Interoperability using an application interface
CEN/TS 16439:2013 Electronic fee collection - Security framework
CSA ISO/IEC 11770-4 : 2007 : R2017 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS
CAN/CSA-ISO/IEC 25185-1:18 Identification cards — Integrated circuit card authentication protocols — Part 1: Protocol for Lightweight Authentication of Identity (Adopted ISO/IEC 25185-1:2016, first edition, 2016-01-15)
CSA ISO/IEC 11770-4 : 2007 : INC : COR 1 : 2010 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS
INCITS/ISO/IEC 15444-8:2007[R2019] Information technology - JPEG 2000 image coding system: Secure JPEG 2000<br>
CSA ISO/IEC 11770-4 : 2007 : R2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS
CSA ISO/IEC 11770-4 : 2007 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS
ANSI X9.79-1 : 2001 FINANCIAL SERVICES PUBLIC KEY INFRASTRUCTURE - PART 1: PKI PRACTICES AND POLICY FRAMEWORK

AS ISO/IEC 9797.2:2019 Information technology - Security techniques - Message Authentication Codes (MACs) Mechanisms using a dedicated hash-function
ISO/IEC 10118-1:2016 Information technology Security techniques Hash-functions Part 1: General

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.

Need help?
Call us on 131 242, then click here to start a Screen Sharing session
so we can help right away! Learn more