ISO/IEC 10118-1:2016
Current
The latest, up-to-date edition.
Information technology Security techniques Hash-functions Part 1: General
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
English
14-10-2016
ISO/IEC 10118-1:2016 specifies hash-functions and is therefore applicable to the provision of authentication, integrity and non-repudiation services. Hash-functions map strings of bits of variable (but usually upper bounded) length to fixed-length strings of bits, using a specified algorithm. They can be used for
- reducing a message to a short imprint for input to a digital signature mechanism, and
- committing the user to a given string of bits without revealing this string.
NOTE The hash-functions specified in ISO/IEC 10118 (all parts) do not involve the use of secret keys. However, these hash-functions may be used, in conjunction with secret keys, to build message authentication codes. Message Authentication Codes (MACs) provide data origin authentication as well as message integrity. Techniques for computing a MAC using a hash-function are specified in ISO/IEC 97972 [1].
ISO/IEC 10118-1:2016 contains definitions, symbols, abbreviations and requirements that are common to all the other parts of ISO/IEC 10118. The criteria used to select the algorithms specified in subsequent parts of ISO/IEC 10118 are defined in Annex B of this document.
DevelopmentNote |
NEW CHILD AMD 1 2021 IS NOW ADDED
|
DocumentType |
Standard
|
Pages |
12
|
ProductNote |
NEW CHILD AMD 1 2021 IS NOW ADDED
|
PublisherName |
International Organization for Standardization
|
Status |
Current
|
Supersedes |
Standards | Relationship |
BS ISO/IEC 10118-1:2016 | Identical |
NEN ISO/IEC 10118-1 : 2016 | Identical |
INCITS/ISO/IEC 10118-1:2016(R2019) | Identical |
INCITS/ISO/IEC 10118-1 : 2000 : R2005 | Identical |
INCITS/ISO/IEC 10118-1 : 2000 | Identical |
CAN/CSA-ISO/IEC 10118-1:18 | Identical |
ISO/IEC 29192-4:2013 | Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques |
BS ISO/IEC 10118-4 : 1998 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - HASH-FUNCTIONS - PART 4: HASH-FUNCTIONS USING MODULAR ARITHMETIC |
15/30288056 DC : 0 | BS ISO/IEC 10116 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER |
BS ISO 17068:2017 | Information and documentation. Trusted third party repository for digital records |
UNI CEN ISO/TS 24534-4 : 2008 | AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
BS ISO/IEC 29192-5:2016 | Information technology. Security techniques. Lightweight cryptography Hash-functions |
07/30154069 DC : 0 | BS ISO/IEC 24727-3 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 3: APPLICATION INTERFACE |
ISO 17068:2017 | Information and documentation — Trusted third party repository for digital records |
02/652465 DC : DRAFT MAY 2002 | ISO/IEC CD 10118-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - HASH-FUNCTIONS - PART 3: DEDICATED HASH-FUNCTIONS |
INCITS/ISO/IEC 9797-2 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 2: MECHANISMS USING A DEDICATED HASH-FUNCTION |
INCITS/ISO/IEC 15946-3 : 2002 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 3: KEY ESTABLISHMENT |
CSA ISO/IEC TR 14516 : 2004 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES |
CSA ISO/IEC 13888-1 : 2010 : R2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 1: GENERAL |
BS EN ISO/IEC 7816/4 : 1996 | INFORMATION TECHNOLOGY - IDENTIFICATION CARDS - INTEGRATED CIRCUIT(S) CARDS WITH CONTACTS - INTERINDUSTRY COMMANDS FOR INTERCHANGE |
INCITS/ISO/IEC 11770-4 : 2008 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
BS ISO 9735-10:2014 | Electronic data interchange for administration, commerce and transport (EDIFACT). Application level syntax rules (Syntax version number: 4, Syntax release number: 2) Syntax service directories |
CSA ISO/IEC TR 14516 : 2004 : R2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES |
INCITS/ISO/IEC 15945 : 2002 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
DIN ISO 9735-10:2015-05 | ELECTRONIC DATA INTERCHANGE FOR ADMINISTRATION, COMMERCE AND TRANSPORT (EDIFACT) - APPLICATION LEVEL SYNTAX RULES (SYNTAX VERSION NUMBER: 4, SYNTAX RELEASE NUMBER: 2) - PART 10: SYNTAX SERVICE DIRECTORIES (ISO 9735-10:2014) |
BS ISO/IEC 18033-4 : 2005 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 4: STREAM CIPHERS |
ISO/IEC 15945:2002 | Information technology — Security techniques — Specification of TTP services to support the application of digital signatures |
EN ISO 24534-4:2010 | Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques (ISO 24534-4:2010) |
ISO/IEC TR 29149:2012 | Information technology Security techniques Best practices for the provision and use of time-stamping services |
CEN/TS 14821-5:2003 | Traffic and Travel Information (TTI) - TTI messages via cellular networks - Part 5: Internal services |
CEN/TS 419261:2015 | Security requirements for trustworthy systems managing certificates and time-stamps |
08/30169505 DC : DRAFT JULY 2008 | BS ISO/IEC 13888-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 1: GENERAL |
09/30202174 DC : 0 | BS EN 50159 - RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
INCITS/ISO/IEC 10118-2 : 2011 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - HASH-FUNCTIONS - PART 2: HASH-FUNCTIONS USING AN N-BIT BLOCK CIPHER |
CSA ISO/IEC 10118-3 : 2004 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - HASH-FUNCTIONS - PART 3: DEDICATED HASH-FUNCTIONS |
PD CEN/TS 419261:2015 | Security requirements for trustworthy systems managing certificates and time-stamps |
11/30228418 DC : DRAFT JUNE 2011 | BS ISO/IEC 29192-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 3: STREAM CIPHERS |
CSA ISO/IEC 10118-3 : 2004 : INC : COR 1 : 2013 : R200900 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - HASH-FUNCTIONS - PART 3: DEDICATED HASH-FUNCTIONS |
BS ISO/IEC 15945:2002 | Information technology. Security techniques. Specification of TTP services to support the application of digital signatures |
CSA ISO/IEC 9797-2:2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 2: MECHANISMS USING A DEDICATED HASH-FUNCTION |
04/30105372 DC : DRAFT DEC 2004 | ISO/IEC 11770-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
CAN/CSA-ISO/IEC 9797-2:13 (R2017) | Information technology - Security techniques - Message authentication codes (MACs) - Part 2: Mechanisms using a dedicated hash-function (Adopted ISO/IEC 9797-2:2011, second edition, 2011-05-01) |
CAN/CSA-ISO/IEC 15945-04 (R2017) | Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures (Adopted ISO/IEC 15945:2002, first edition, 2002-02-01) |
BS ISO/IEC 18031 : 2011 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
ETR 237 : 20001 | SECURITY TECHNIQUES ADVISORY GROUP (STAG) - BASELINE SECURITY STANDARDS - FEATURES AND MECHANISMS |
BS EN ISO 24534-4:2010+A1:2019 | Automatic vehicle and equipment identification. Electronic registration identification (ERI) for vehicles Secure communications using asymmetrical techniques |
PREN 50159 : DRAFT 2009 | RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
BS ISO/IEC 10118-2:2010 | Information technology. Security techniques. Hash-functions Hash-functions using an n-bit block cipher |
I.S. EN ISO/IEC 7816-4:1998 | INFORMATION TECHNOLOGY - IDENTIFICATION CARDS - INTEGRATED CIRCUIT(S) CARDS WITH CONTACTS - PART 4: INTERINDUSTRY COMMANDS FOR INTERCHANGE |
ISO/IEC 13888-1:2009 | Information technology Security techniques Non-repudiation Part 1: General |
ISO 15668:1999 | Banking Secure file transfer (retail) |
BS EN 50159-2:2001 | Railway applications. Communication, signalling and processing systems Safety related communication in open transmission systems |
08/30135059 DC : 0 | ISO/IEC 9797-2 (REV) - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) |
15/30311322 DC : 0 | BS ISO/IEC 29192-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 5: HASH-FUNCTIONS |
CSA ISO/IEC 10118-3 : 2004 : INC : AMD 1 : 2007 : R2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - HASH-FUNCTIONS - PART 3: DEDICATED HASH-FUNCTIONS |
ISO/IEC 29167-17:2015 | Information technology Automatic identification and data capture techniques Part 17: Crypto suite cryptoGPS security services for air interface communications |
BS EN 50159:2010 | Railway applications. Communication, signalling and processing systems. Safety-related communication in transmission systems |
07/30163724 DC : 0 | BS ISO/IEC 24727-4 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS PROGRAMMING INTERFACE - PART 4: API ADMINISTRATION |
12/30228421 DC : 0 | BS ISO/IEC 29192-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES |
BS ISO 15668:1999 | Banking. Secure file transfer (retail) |
TR 102 272 : 1.1.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); ASN.1 FORMAT FOR SIGNATURE POLICIES |
08/30180103 DC : DRAFT MAR 2008 | BS EN 50136-1 - ALARM SYSTEMS - ALARM TRANSMISSION SYSTEMS - PART 1: GENERAL REQUIREMENTS FOR ALARM TRANSMISSION SYSTEMS |
07/30161079 DC : 0 | BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
BS ISO/IEC 29150:2011 | Information technology. Security techniques. Signcryption |
ISO/IEC 29192-5:2016 | Information technology Security techniques Lightweight cryptography Part 5: Hash-functions |
CSA ISO/IEC 18033-4 : 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 4: STREAM CIPHERS |
CAN/CSA-ISO/IEC 18031:13 (R2017) | Information technology - Security techniques - Random bit generation (Adopted ISO/IEC 18031:2011, second edition, 2011-11-15) |
CSA ISO/IEC 18031 : 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
ISO/IEC 10118-3:2004 | Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions |
BS ISO/IEC 13888-1:2009 | Information technology. Security techniques. Non-repudiation General |
BS ISO/IEC 29192-4 : 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES |
I.S. EN 50159:2010 | RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
ISO/IEC 18031:2011 | Information technology Security techniques Random bit generation |
BS ISO/IEC 10116:2017 | Information technology. Security techniques. Modes of operation for an <i>n</i>-bit block cipher |
ISO/IEC 18033-4:2011 | Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers |
ISO 24534-4:2010 | Automatic vehicle and equipment identification — Electronic registration identification (ERI) for vehicles — Part 4: Secure communications using asymmetrical techniques |
ISO/IEC 9797-2:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function |
S.R. CEN ISO TS 24534-4:2008 | AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
UNE-EN 50159:2011 | Railway applications - Communication, signalling and processing systems - Safety-related communication in transmission systems |
CEI EN 50159 : 2012 | RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
09/30169518 DC : 0 | BS ISO/IEC 10118-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - HASH-FUNCTIONS - PART 2: HASH-FUNCTIONS USING AN N-BIT BLOCK CIPHER |
16/30337318 DC : 0 | BS ISO/IEC 10118-3 - INFORMATION TECHNOLOGIES - SECURITY TECHNIQUES - HASHFUNCTIONS - PART 3: DEDICATED HASH-FUNCTIONS |
INCITS/ISO/IEC 10118-3 : 2003 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - HASH-FUNCTIONS - PART 3: DEDICATED HASH-FUNCTIONS |
DD ENV 13729:2000 | Health informatics. Secure user identification. Strong authentication microprocessor cards |
BS ISO/IEC 10118-3 : 2004 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - HASH-FUNCTIONS - PART 3: DEDICATED HASH-FUNCTIONS |
BS ISO/IEC TR 14516:2002 | Information technology. Security techniques. Guidelines for the use and management of trusted third party services |
DD CEN ISO/TS 17574:2009 | Electronic fee collection. Guidelines for security protection profiles |
UNE-EN ISO 24534-4:2012 | Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques (ISO 24534-4:2010) |
DD CEN ISO/TS 24534-4:2008 | Automatic vehicle and equipment identification. Electronic registration identification (ERI) for vehicles Secure communications using asymmetrical techniques |
INCITS/ISO/IEC 18031 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
07/30173155 DC : 0 | BS ISO/IEC 9798-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
08/30195403 DC : 0 | BS EN ISO 24534-4 - AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
CSA ISO/IEC 13888-1:2010 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 1: GENERAL |
03/652682 DC : DRAFT NOV 2003 | BS ISO/IEC TR 15446 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDE FOR THE PRODUCTION OF PROTECTION PROFILES AND SECURITY TARGETS |
CSA ISO/IEC 15945 : 2004 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
INCITS/ISO/IEC 10116 : 2008 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER |
CAN/CSA-ISO/IEC 18033-4:13 (R2017) | Information technology - Security techniques - Encryption algorithms - Part 4: Stream ciphers (Adopted ISO/IEC 18033-4:2011, second edition, 2011-12-15) |
I.S. CWA 14171:2004 | GENERAL GUIDELINES FOR ELECTRONIC SIGNATURE VERIFICATION |
ISO/IEC TR 14516:2002 | Information technology Security techniques Guidelines for the use and management of Trusted Third Party services |
ISO/IEC 10116:2017 | Information technology — Security techniques — Modes of operation for an n-bit block cipher |
CAN/CSA-ISO/IEC 29167-17:16 | Information technology Automatic identification and data capture techniques Part 17: Crypto suite cryptoGPS security services for air interface communications (Adopted ISO/IEC 29167-17:2015, first edition, 2015-06-01) |
INCITS/ISO/IEC 18033-4 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 4: STREAM CIPHERS |
IEEE 1377-2012 | IEEE Standard for Utility Industry Metering Communication Protocol Application Layer (End Device Data Tables) |
I.S. CWA 14890-2:2004 | APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 2: ADDITIONAL SERVICES |
UNI EN ISO 24534-4 : 2011 | AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
ISO/IEC 29150:2011 | Information technology — Security techniques — Signcryption |
I.S. EN ISO 24534-4:2010/A1:2019 | AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
ISO/IEC 15444-8:2007 | Information technology — JPEG 2000 image coding system: Secure JPEG 2000 — Part 8: |
IEC 62280:2014 | Railway applications - Communication, signalling and processing systems - Safety related communication in transmission systems |
EN 50159:2010 | Railway applications - Communication, signalling and processing systems - Safety-related communication in transmission systems |
ISO/TS 24534-4:2008 | Automatic vehicle and equipment identification Electronic Registration Identification (ERI) for vehicles Part 4: Secure communications using asymmetrical techniques |
UNE-ETSI/TS 101733 V1.2.2:2011 | Electronic signature formats. |
EN ISO/IEC 7816-4 : 1996 | INFORMATION TECHNOLOGY - IDENTIFICATION CARDS - INTEGRATED CIRCUIT(S) CARDS WITH CONTACTS - PART 4: INTERINDUSTRY COMMANDS FOR INTERCHANGE |
BS ISO/TR 19121:2000 | Geographic information. Imagery and gridded data |
NF EN ISO/IEC 7816-4 : 1996 | INFORMATION TECHNOLOGY - IDENTIFICATION CARDS - INTEGRATED CIRCUIT(S) CARDS WITH CONTACTS - PART 4: INTERINDUSTRY COMMANDS FOR INTERCHANGE |
INCITS/ISO/IEC 29192-4 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES |
BS ISO/IEC 14888-1:1998 | Information technology. Security techniques. Digital signatures with appendix General |
06/30108755 DC : DRAFT FEB 2006 | ISO/IEC 14888-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 1: GENERAL |
PD ISO/IEC TR 29149:2012 | Information technology. Security techniques. Best practices for the provision and use of time-stamping services |
CSA ISO/IEC 15945 : 2004 : R2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
DD CEN/TS 14821-5:2003 | Traffic and Travel Information (TTI). TTI messages via cellular networks Internal services |
BS ISO/IEC 9797-2:2011 | Information technology. Security techniques. Message Authentication Codes (MACs) Mechanisms using a dedicated hash-function |
09/30199552 DC : DRAFT FEB 2009 | BS ISO/IEC 18014-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TIME-STAMPING SERVICES - PART 3: MECHANISMS PRODUCING LINKED TOKENS |
07/30105115 DC : 0 | BS ISO/IEC 19772 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - AUTHENTICATED ENCRYPTION |
CAN/CSA-ISO/IEC TR 14516-04 (R2017) | Information Technology - Security Techniques - Guidelines for the use and Management of Trusted Third Party Services (Adopted ISO/IEC TR 14516:2002, first edition, 2002-06-15) |
07/30161232 DC : 0 | BS ISO/IEC 11770-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
ISO 11568-6:1998 | Banking Key management (retail) Part 6: Key management schemes |
INCITS/ISO/IEC 15945 : 2002 : R2007 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
I.S. EN 50159-2:2001 | RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - PART 2: SAFETY RELATED COMMUNICATION IN OPEN TRANSMISSION SYSTEMS |
INCITS/ISO/IEC 10118-4 : 1998 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - HASH-FUNCTIONS - PART 4: HASH-FUNCTIONS USING MODULAR ARITHMETIC |
ISO 9735-10:2014 | Electronic data interchange for administration, commerce and transport (EDIFACT) — Application level syntax rules (Syntax version number: 4, Syntax release number: 2) — Part 10: Syntax service directories |
S.R. CEN/TS 419261:2015 | SECURITY REQUIREMENTS FOR TRUSTWORTHY SYSTEMS MANAGING CERTIFICATES AND TIME-STAMPS |
EN 50159-2 : 2001 COR 2010 | RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - PART 2: SAFETY RELATED COMMUNICATION IN OPEN TRANSMISSION SYSTEMS |
CEN ISO/TS 24534-4:2008 | Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques (ISO/TS 24534-4:2008) |
CSA ISO/IEC 10116 : 2007 : R2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER |
CSA ISO/IEC 10116 : 2007 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER |
CSA ISO/IEC 10116 : 2007 : R2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER |
CSA ISO/IEC 11770-4 : 2007 : R2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
CSA ISO/IEC 10118-2 : 2012 : INC : COR 1 : 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - HASH-FUNCTIONS - PART 2: HASH-FUNCTIONS USING AN N-BIT BLOCK CIPHER |
CSA ISO/IEC 11770-4 : 2007 : INC : COR 1 : 2010 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
CSA ISO/IEC 11770-4 : 2007 : R2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
CSA ISO/IEC 11770-4 : 2007 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
CSA ISO/IEC 10116 : 2007 : INC : COR 1 : 2009 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER |
CSA ISO/IEC 10118-2 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - HASH-FUNCTIONS - PART 2: HASH-FUNCTIONS USING AN N-BIT BLOCK CIPHER |
CAN/CSA-ISO/IEC 10118-2:12 (R2016) | Information technology - Security techniques - Hash-functions - Part 2: Hash-functions using an n-bit block cipher (Adopted ISO/IEC 10118-2:2010, third edition, 2010-10-15) |
ISO/IEC 9797-2:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.