• ISO/IEC 10116:2017

    Current The latest, up-to-date edition.

    Information technology — Security techniques — Modes of operation for an n-bit block cipher

    Available format(s):  Hardcopy, PDF, PDF 3 Users, PDF 5 Users, PDF 9 Users

    Language(s):  English

    Published date:  11-07-2017

    Publisher:  International Organization for Standardization

    Add To Cart

    Abstract - (Show below) - (Hide below)

    ISO/IEC 10116:2017 data during transmission or in storage). The defined modes only provide protection of data confidentiality. Protection of data integrity is not within the scope of this document. Also, most modes do not protect the confidentiality of message length information.

    NOTE 1 Methods for protecting the integrity of data using a block cipher are provided in ISO/IEC 9797-1.

    NOTE 2 Methods for simultaneously protecting the confidentiality and integrity of data are provided in ISO/IEC 19772.

    ISO/IEC 10116:2017 specifies the modes of operation and gives recommendations for choosing values of parameters (as appropriate).

    NOTE 3 The modes of operation specified in this document have been assigned object identifiers in accordance with ISO/IEC 9834. The list of assigned object identifiers is given in Annex A. In applications in which object identifiers are used, the object identifiers specified in Annex A are to be used in preference to any other object identifiers that can exist for the mode concerned.

    NOTE 4 Annex B contains comments on the properties of each mode and important security guidance.

    General Product Information - (Show below) - (Hide below)

    Committee ISO/IEC JTC 1/SC 27
    Development Note NEW CHILD AMD 1 2021 IS NOW ADDED.
    Document Type Standard
    Product Note THIS STANDARD ALSO REFERS TO NIST/SP 800-38A NEW CHILD AMD 1 2021 IS NOW ADDED.
    Publisher International Organization for Standardization
    Status Current
    Supersedes

    Standards Referenced By This Book - (Show below) - (Hide below)

    CSA ISO/IEC 18033-2 :2006 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS
    BS ISO/IEC 11770-5:2011 Information technology Security techniques. Key management Group key management
    03/648634 DC : 0 ISO/IEC 7816-4.2:2002 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS - PART 4: ORGANIZATION, SECURITY AND COMMANDS FOR INTERCHANGE
    10/30135070 DC : DRAFT NOV 2010 BS ISO/IEC 9797-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 3: MECHANISMS USING A UNIVERSAL HASH FUNCTION
    11/30231373 DC : 0 BS ISO 11568-2 - FINANCIAL SERVICES - KEY MANAGEMENT (RETAIL) - PART 2: SYMMETRIC CIPHERS, THEIR KEY MANAGEMENT AND LIFE CYCLE
    15/30327554 DC : 0 BS ISO/IEC 13157-2 - INFORMATION TECHNOLOGY - TELECOMMUNICATIONS AND INFORMATION EXCHANGE BETWEEN SYSTEMS - NFC SECURITY - PART 2: NFC-SEC CRYPTOGRAPHY STANDARD USING ECDH AND AES
    ISO/IEC 13157-2:2016 Information technology Telecommunications and information exchange between systems NFC Security Part 2: NFC-SEC cryptography standard using ECDH and AES
    CAN/CSA-ISO/IEC 10181-2-00 (R2013) Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework (Adopted ISO/IEC 10181-2:1996, first edition, 1996-05-15)
    INCITS/ISO/IEC 24727-2 : 2009(R2014) IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 2: GENERIC CARD INTERFACE
    ETR 232 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG); GLOSSARY OF SECURITY TERMINOLOGY
    CSA ISO/IEC 9797 : 0 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DATA INTEGRITY MECHANISM USING A CRYPTOGRAPHIC CHECK FUNCTION EMPLOYING A BLOCK CIPHER ALGORITHM
    16/30304626 DC : 0 BS ISO 20038 - BANKING AND RELATED FINANCIAL SERVICES - KEY WRAP
    12/30266972 DC : 0 BS ISO/IEC 24727-1 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 1: ARCHITECTURE
    CSA ISO/IEC 18033-1 : 2006 : INC : AMD 1 : 2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL
    CSA ISO/IEC 9798-2:2010 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS
    14/30250091 DC : 0 BS ISO/IEC 18033-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL
    ISO/IEC 9797-3:2011 Information technology — Security techniques — Message Authentication Codes (MACs) — Part 3: Mechanisms using a universal hash-function
    BS EN ISO/IEC 7816/4 : 1996 INFORMATION TECHNOLOGY - IDENTIFICATION CARDS - INTEGRATED CIRCUIT(S) CARDS WITH CONTACTS - INTERINDUSTRY COMMANDS FOR INTERCHANGE
    BS ISO 9735-10:2014 Electronic data interchange for administration, commerce and transport (EDIFACT). Application level syntax rules (Syntax version number: 4, Syntax release number: 2) Syntax service directories
    CSA ISO/IEC 9798-2 : 2010 : R2015 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS
    DIN ISO 9735-10:2015-05 ELECTRONIC DATA INTERCHANGE FOR ADMINISTRATION, COMMERCE AND TRANSPORT (EDIFACT) - APPLICATION LEVEL SYNTAX RULES (SYNTAX VERSION NUMBER: 4, SYNTAX RELEASE NUMBER: 2) - PART 10: SYNTAX SERVICE DIRECTORIES (ISO 9735-10:2014)
    CAN/CSA-ISO/IEC 18033-2:06 (R2016) INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS
    BS ISO/IEC 18033-4 : 2005 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 4: STREAM CIPHERS
    CSA ISO/IEC 11770-2 : 2009 : INC : COR 1 : 2010 : R2014 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 2: MECHANISMS USING SYMMETRIC TECHNIQUES
    I.S. EN 62734:2015 INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A
    BS ISO/IEC 24727-3 : 2008 IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 3: APPLICATION INTERFACE
    ISO/IEC 18033-2:2006 Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
    ECMA 386 : 3ED 2015 NFC-SEC-01: NFC-SEC CRYPTOGRAPHY STANDARD USING ECDH AND AES
    ISO/IEC 25185-1:2016 Identification cards Integrated circuit card authentication protocols Part 1: Protocol for Lightweight Authentication of Identity
    BIS IS 15256-4 : 2013 BANKING - KEY MANAGEMENT (RETAIL) - PART 4: ASYMMETRIC CRYPTOSYSTEMS - KEY MANAGEMENT AND LIFE CYCLE
    14/30249803 DC : 0 BS ISO/IEC 27040 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY
    CEN/TS 14821-1:2003 TRAFFIC AND TRAVEL INFORMATION (TTI) - TTI MESSAGES VIA CELLULAR NETWORKS - PART 1: GENERAL SPECIFICATIONS
    CEN/TS 14821-5:2003 TRAFFIC AND TRAVEL INFORMATION (TTI) - TTI MESSAGES VIA CELLULAR NETWORKS - PART 5: INTERNAL SERVICES
    CEN/TS 14821-8:2003 TRAFFIC AND TRAVEL INFORMATION (TTI) - TTI MESSAGES VIA CELLULAR NETWORKS - PART 8: GSM-SPECIFIC PARAMETERS
    CEN/TS 14821-4:2003 TRAFFIC AND TRAVEL INFORMATION (TTI) - TTI MESSAGES VIA CELLULAR NETWORKS - PART 4: SERVICE-INDEPENDENT PROTOCOLS
    EN 62734:2015 Industrial networks - Wireless communication network and communication profiles - ISA 100.11a
    CEN/TS 14821-6:2003 TRAFFIC AND TRAVEL INFORMATION (TTI) - TTI MESSAGES VIA CELLULAR NETWORKS - PART 6: EXTERNAL SERVICES
    ISO/IEC 11770-5:2011 Information technology Security techniques Key management Part 5: Group key management
    09/30202174 DC : 0 BS EN 50159 - RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY RELATED COMMUNICATION IN TRANSMISSION SYSTEMS
    08/30192697 DC : 0 BS ISO/IEC 9797-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 1: MECHANISMS USING A BLOCK CIPHER
    ISO/IEC 7816-4:2013 Identification cards Integrated circuit cards Part 4: Organization, security and commands for interchange
    10/30228327 DC : 0 BS ISO/IEC 18031 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION
    BS ISO/IEC 10181-2:1996 Information technology. Open systems interconnection. Security frameworks for open systems Authentication framework
    BS EN ISO 11568-2:1996 Banking. Key management (retail) Key management techniques for symmetric ciphers
    BS ISO 9564-2:2014 Financial services. Personal Identification Number (PIN) management and security Approved algorithms for PIN encipherment
    ISO/TS 21719-2:2018 Electronic fee collection — Personalization of on-board equipment (OBE) — Part 2: Using dedicated short-range communication
    ISO/IEC 9798-2:2008 Information technology Security techniques Entity authentication Part 2: Mechanisms using symmetric encipherment algorithms
    11/30228418 DC : DRAFT JUNE 2011 BS ISO/IEC 29192-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 3: STREAM CIPHERS
    DD CEN/TS 14821-2:2003 Traffic and Travel Information (TTI). TTI messages via cellular networks Numbering and ADP message header
    PD ISO/TR 14742:2010 Financial services. Recommendations on cryptographic algorithms and their use
    BS ISO/IEC 18367:2016 Information technology. Security techniques. Cryptographic algorithms and security mechanisms conformance testing
    02/652661 DC : DRAFT NOV 2002 ISO/IEC FCD 18033-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL
    INCITS/ISO/IEC 9798-2 : 2010 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS
    CSA ISO/IEC 9798-2 : 2010 : INC : COR 2 : 2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS
    INCITS/ISO/IEC 18033-2 : 2008 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS
    IEC TS 62351-2:2008 Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms
    ISO/IEC 24767-1:2008 Information technology Home network security Part 1: Security requirements
    BS ISO/IEC 18031 : 2011 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION
    INCITS/ISO/IEC 9797 : 1994 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DATA INTEGRITY MECHANISM USING A CRYPTOGRAPHIC CHECK FUNCTION EMPLOYING A BLOCK CIPHER ALGORITHM
    ETR 237 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG) - BASELINE SECURITY STANDARDS - FEATURES AND MECHANISMS
    CAN/CSA-ISO/IEC 18367:18 Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing (Adopted ISO/IEC 18367:2016, first edition, 2016-12-15)
    BS ISO/IEC 24727-2 : 2008 IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 2: GENERIC CARD INTERFACE
    PREN 50159 : DRAFT 2009 RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS
    DIN EN ISO/IEC 27040:2016-04 (Draft) INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015)
    ISO/IEC 11889-1:2015 Information technology Trusted platform module library Part 1: Architecture
    ISO/IEC 18367:2016 Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing
    ISO/IEC 11889-2:2015 Information technology Trusted Platform Module Library Part 2: Structures
    ISO 11568-2:2012 Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle
    I.S. EN ISO/IEC 7816-4:1998 INFORMATION TECHNOLOGY - IDENTIFICATION CARDS - INTEGRATED CIRCUIT(S) CARDS WITH CONTACTS - PART 4: INTERINDUSTRY COMMANDS FOR INTERCHANGE
    04/30040717 DC : DRAFT JUL 2004 ISO/IEC 18033-2 - INFORMATION TECHNOLOGY - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS
    BS EN 50159-2:2001 Railway applications. Communication, signalling and processing systems Safety related communication in open transmission systems
    TS 123 048 : 5.9.0 DIGITAL CELLULAR TELECOMMUNICATIONS SYSTEM (PHASE 2+); UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); SECURITY MECHANISMS FOR THE (U)SIM APPLICATION TOOLKIT; STAGE 2
    BS ISO/IEC 29192-2:2012 Information technology. Security techniques. Lightweight cryptography Block ciphers
    DD CEN/TS 14821-7:2003 Traffic and Travel Information (TTI). TTI messages via cellular networks Performance requirements for onboard positioning
    BS ISO/IEC 9798-2:2008 Information technology. Security techniques. Entity authentication Mechanisms using symmetric encipherment algorithms
    BS ISO/IEC 24745:2011 Information technology. Security techniques. Biometric information protection
    BS EN 50159:2010 Railway applications. Communication, signalling and processing systems. Safety-related communication in transmission systems
    07/30163724 DC : 0 BS ISO/IEC 24727-4 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS PROGRAMMING INTERFACE - PART 4: API ADMINISTRATION
    BS ISO 11568-4:2007 Banking. Key management (retail) Asymmetric cryptosystems. Key management and life cycle
    BS ISO 15668:1999 Banking. Secure file transfer (retail)
    BS ISO/IEC 9797-1:2011 Information technology. Security techniques. Message authentication codes (MACs) Mechanisms using a block cipher
    18/30354751 DC : DRAFT FEB 2018 BS ISO/IEC 18033-6 - INFORMATION TECHNOLOGY SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 6: HOMOMORPHIC ENCRYPTION
    14/30302807 DC : 0 BS ISO/IEC 11889-4 - INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 4: SUPPORTING ROUTINES
    04/30040736 DC : DRAFT DEC 2004 ISO/IEC 18031 - INFORMATION TECHNOLOGY - RANDOM NUMBER GENERATION
    BS ISO/IEC 25185-1:2016 Identification cards. Integrated circuit card authentication protocols Protocol for Lightweight Authentication of Identity
    07/30161079 DC : 0 BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
    03/648302 DC : DRAFT JAN 2003 BS ISO/IEC 7816-4 - INFORMATION TECHNOLOGY - IDENTIFICATION CARDS - INTEGRATED CIRCUIT(S) CARDS WITH CONTACTS - PART 4: INTERINDUSTRY COMMANDS FOR INTERCHANGE
    BS ISO/IEC 29150:2011 Information technology. Security techniques. Signcryption
    DD CEN/TS 14821-3:2003 Traffic and Travel Information (TTI). TTI messages via cellular networks Basic information elements
    07/30167508 DC : 0 BS ISO/IEC 11770-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 2 - MECHANISMS USING SYMMETRIC TECHNIQUES
    CAN/CSA-ISO/IEC 9797-1:12 (R2016) Information technology - Security techniques - Message authentication codes (MACs) - Part 1: Mechanisms using a block cipher (Adopted ISO/IEC 9797-1:2011, second edition, 2011-03-01)
    CAN/CSA-ISO/IEC 25185-1:18 Identification cards — Integrated circuit card authentication protocols — Part 1: Protocol for Lightweight Authentication of Identity (Adopted ISO/IEC 25185-1:2016, first edition, 2016-01-15)
    INCITS/ISO/IEC 24727-1 : 2008 IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 1: ARCHITECTURE
    CSA ISO/IEC 18033-4 : 2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 4: STREAM CIPHERS
    BS EN 62734:2015 Industrial networks. Wireless communication network and communication profiles. ISA 100.11a
    CAN/CSA-ISO/IEC 18031:13 (R2017) Information technology - Security techniques - Random bit generation (Adopted ISO/IEC 18031:2011, second edition, 2011-11-15)
    ISO/IEC/IEEE 8802-15-6:2017 Information technology — Telecommunications and information exchange between systems — Local and metropolitan area networks — Specific requirements — Part 15-6: Wireless body area network
    CSA ISO/IEC 18031 : 2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION
    INCITS/ISO/IEC 11770-5 : 2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 5: GROUP KEY MANAGEMENT
    ISO 15764:2004 Road vehicles Extended data link security
    BS ISO/IEC 24727-4 : 2008 IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 4: APPLICATION PROGRAMMING INTERFACE (API) ADMINISTRATION
    I.S. EN 50159:2010 RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS
    ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
    ISO/IEC 29192-2:2012 Information technology Security techniques Lightweight cryptography Part 2: Block ciphers
    ISO 20038:2017 Banking and related financial services — Key wrap using AES
    CAN/CSA-ISO/IEC 11889-4:16 Information technology Trusted Platform Module Library Part 4: Supporting Routines (Adopted ISO/IEC 11889-4:2015, second edition, 2015-12-15)
    ETR 235 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG); REQUIREMENTS SPECIFICATION FOR AN ENCRYPTION ALGORITHM FOR OPERATORS OF EUROPEAN PUBLIC TELECOMMUNICATIONS NETWORKS
    ISO/IEC 24727-2:2008 Identification cards Integrated circuit card programming interfaces Part 2: Generic card interface
    ISO/IEC 18033-4:2011 Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers
    ISO/TR 14742:2010 Financial services Recommendations on cryptographic algorithms and their use
    ISO/IEC 24727-4:2008 Identification cards Integrated circuit card programming interfaces Part 4: Application programming interface (API) administration
    ISO/TR 19038:2005 Banking and related financial services Triple DEA Modes of operation Implementation guidelines
    UNE-EN 50159:2011 Railway applications - Communication, signalling and processing systems - Safety-related communication in transmission systems
    IEC 62734:2014 Industrial networks - Wireless communication network and communication profiles - ISA 100.11a
    DIN EN ISO/IEC 27040 E : 2017 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015)
    CEI EN 50159 : 2012 RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS
    DIN 6789-100:1997-06 (Draft) SYSTEMATIC ARRANGEMENT OF DOCUMENTS - PART 100: BASIC CONVENTIONS FOR CALS
    07/30154069 DC : 0 BS ISO/IEC 24727-3 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 3: APPLICATION INTERFACE
    BS ISO 11568-2:2012 Financial services. Key management (retail) Symmetric ciphers, their key management and life cycle
    14/30302798 DC : 0 BS ISO/IEC 11889-1 - INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 1: ARCHITECTURE
    BS ISO/IEC 11889-4:2009 Information technology. Trusted platform module Commands
    10/30136309 DC : 0 BS ISO/IEC 24745 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BIOMETRIC INFORMATION PROTECTION
    03/304651 DC : 0 ISO 16844-3 - ROAD VEHICLES - TACHOGRAPH SYSTEMS - PART 3: MOTION SENSOR INTERFACE
    ISO 15668:1999 Banking Secure file transfer (retail)
    BS ISO/IEC 11889-2:2009 Information technology. Trusted platform module Design principles
    15/30279582 DC : 0 BS ISO/IEC 18367 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC ALGORITHMS AND SECURITY MECHANISMS CONFORMANCE TESTING
    18/30362144 DC : 0 BS ISO/IEC 11770-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 2: MECHANISMS USING SYMMETRIC TECHNIQUES
    INCITS/ISO/IEC 18031 : 2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION
    14/30302801 DC : 0 BS ISO/IEC 11889-2 - INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 2: STRUCTURES
    BS ISO 20038:2017 Banking and related financial services. Key wrap using AES
    DD CEN/TS 14821-1:2003 Traffic and Travel Information (TTI). TTI messages via cellular networks General specifications
    ANSI INCITS 410 : 2015 INFORMATION TECHNOLOGY - IDENTIFICATION CARDS - LIMITED USE (LU), PROXIMITY INTEGRATED CIRCUIT CARD (PICC)
    BS ISO/IEC 9797-3:2011 Information technology. Security techniques. Message Authentication Codes (MACs) Mechanisms using a universal hash-function
    DD CEN/TS 14821-4:2003 Traffic and Travel Information (TTI). TTI messages via cellular networks Service-independent protocols
    DD IEC/TS 62351-2:2008 Power systems management and associated information exchange. Data and communications security Glossary of terms
    CSA ISO/IEC 9797-1:2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 1: MECHANISMS USING A BLOCK CIPHER
    BS ISO/IEC 11770-2:2008 Information technology. Security techniques. Key management Mechanisms using symmetric techniques
    DD CEN/TS 14821-6:2003 Traffic and Travel Information (TTI). TTI messages via cellular networks External services
    INCITS/ISO/IEC 24727-4 : 2009(R2014) IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 4: APPLICATION PROGRAMMING INTERFACE (API) ADMINISTRATION
    CAN/CSA-ISO/IEC 18033-4:13 (R2017) Information technology - Security techniques - Encryption algorithms - Part 4: Stream ciphers (Adopted ISO/IEC 18033-4:2011, second edition, 2011-12-15)
    INCITS/ISO/IEC 18033-4 : 2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 4: STREAM CIPHERS
    ISO/IEC 19772:2009 Information technology Security techniques Authenticated encryption
    I.S. CWA 14890-2:2004 APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 2: ADDITIONAL SERVICES
    ISO/IEC 29150:2011 Information technology — Security techniques — Signcryption
    ISO 9735-5:2002 Electronic data interchange for administration, commerce and transport (EDIFACT) — Application level syntax rules (Syntax version number: 4, Syntax release number: 1) — Part 5: Security rules for batch EDI (authenticity, integrity and non-repudiation of origin)
    CEN ISO/TS 21719-2:2018 Electronic fee collection - Personalization of on-board equipment (OBE) - Part 2: Using dedicated short-range communication (ISO/TS 21719-2:2018)
    ISO/IEC 24727-1:2014 Identification cards Integrated circuit card programming interfaces Part 1: Architecture
    ISO/IEC 18033-1:2015 Information technology Security techniques Encryption algorithms Part 1: General
    ISO/IEC 24727-3:2008 Identification cards Integrated circuit card programming interfaces Part 3: Application interface
    I.S. EN ISO 11568-2:1997 BANKING - KEY MANAGEMENT (RETAIL) - PART 2: KEY MANAGEMENT TECHNIQUES FOR SYMMETRIC CIPHERS
    IEC 62280:2014 Railway applications - Communication, signalling and processing systems - Safety related communication in transmission systems
    EN 50159:2010 Railway applications - Communication, signalling and processing systems - Safety-related communication in transmission systems
    BS ISO/IEC 27040 : 2015 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY
    BS EN ISO/IEC 27040:2016 Information technology. Security techniques. Storage security
    ISO/IEC 27040:2015 Information technology — Security techniques — Storage security
    CEN/TS 14821-3:2003 TRAFFIC AND TRAVEL INFORMATION (TTI) - TTI MESSAGES VIA CELLULAR NETWORKS - PART 3: BASIC INFORMATION ELEMENTS
    EN ISO 11568-2 : 1996 BANKING - KEY MANAGEMENT (RETAIL) - PART 2: KEY MANAGEMENT TECHNIQUES FOR SYMMETRIC CIPHERS
    EN ISO/IEC 7816-4 : 1996 INFORMATION TECHNOLOGY - IDENTIFICATION CARDS - INTEGRATED CIRCUIT(S) CARDS WITH CONTACTS - PART 4: INTERINDUSTRY COMMANDS FOR INTERCHANGE
    EN ISO/IEC 27040:2016 Information technology - Security techniques - Storage security (ISO/IEC 27040:2015)
    ISO/IEC 11770-2:2008 Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques
    BS ISO 9735-5:2002 Electronic data interchange for administration, commerce and transport (EDIFACT). Application level syntax rules Security rules for batch EDI (authenticity, integrity and non-repudiation of origin)
    CSA ISO/IEC 7816-4 : 2015 IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS - PART 4: ORGANIZATION, SECURITY AND COMMANDS FOR INTERCHANGE
    BS ISO/IEC 19772:2009 Information technology. Security techniques. Authenticated encryption
    BS ISO/IEC 9797:1994 Information technology. Security techniques. Data integrity mechanism using a cryptographic check function employing a block cipher algorithm
    BS ISO/IEC 11889-1:2009 Information technology. Trusted platform module Overview
    INCITS/ISO/IEC 18033-1 : 2005 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL
    INCITS/ISO/IEC 24745 : 2012(R2017) INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BIOMETRIC INFORMATION PROTECTION
    BS ISO/IEC 24727-1:2014 Identification cards. Integrated circuit card programming interfaces Architecture
    10/30228415 DC : DRAFT NOV 2010 BS ISO/IEC 29192-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 2: BLOCK CIPHERS
    INCITS/ISO/IEC 24727-3 : 2009(R2014) IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 3: APPLICATION INTERFACE
    BS ISO/IEC 18033-1:2015 Information technology. Security techniques. Encryption algorithms General
    11/30237119 DC : 0 BS ISO/IEC 7816-4 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS - PART 4: ORGANIZATION, SECURITY AND COMMANDS FOR INTERCHANGE
    04/30082429 DC : DRAFT JUL 2004 ISO/IEC 18033-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 4: STREAM CIPHERS
    BS ISO/IEC 18033-2 : 2006 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS
    INCITS/ISO/IEC 27040 : 2017 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY
    DD CEN/TS 14821-5:2003 Traffic and Travel Information (TTI). TTI messages via cellular networks Internal services
    05/30112566 DC : DRAFT JAN 2005 ISO 11568-4 - BANKING - KEY MANAGEMENT (RETAIL) - PART 4: ASYMMETRIC CRYPTOSYSTEMS - KEY MANAGEMENT AND LIFE CYCLE
    07/30105115 DC : 0 BS ISO/IEC 19772 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - AUTHENTICATED ENCRYPTION
    DD CEN/TS 14821-8:2003 Traffic and Travel Information (TTI). TTI messages via cellular networks GSM-specific parameters
    CSA ISO/IEC 11770-2 : 2009 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 2: MECHANISMS USING SYMMETRIC TECHNIQUES
    CAN/CSA-ISO/IEC 11889-2:16 Information technology Trusted Platform Module Library Part 2: Structures (Adopted ISO/IEC 11889-2:2015, second edition, 2015-12-15)
    TS 101 181 : 8.9.0 DIGITAL CELLULAR TELECOMMUNICATIONS SYSTEM (PHASE 2+); SECURITY MECHANISMS FOR SIM APPLICATION TOOLKIT; STAGE 2
    CSA ISO/IEC 18033-1 : 2006 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL
    CSA ISO/IEC 18033-1 : 2006 : INC : AMD 1 : 2012 : R2016 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL
    BS ISO/IEC 7816-4 : 2013 IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS - PART 4: ORGANIZATION, SECURITY AND COMMANDS FOR INTERCHANGE
    TS 143 048 : 4.0.0 DIGITAL CELLULAR TELECOMMUNICATIONS SYSTEM (PHASE 2+); SECURITY MECHANISMS FOR THE SIM APPLICATION TOOLKIT; STAGE 2
    ISO/IEC 10181-2:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Authentication framework
    I.S. EN 50159-2:2001 RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - PART 2: SAFETY RELATED COMMUNICATION IN OPEN TRANSMISSION SYSTEMS
    ISO 16844-3:2004 Road vehicles Tachograph systems Part 3: Motion sensor interface
    CAN/CSA-ISO/IEC 11889-1:16 Information technology Trusted Platform Module Library Part 1: Architecture (Adopted ISO/IEC 11889-1:2015, second edition, 2015-12-15)
    ISO/IEC 24767-2:2009 Information technology Home network security Part 2: Internal security services: Secure Communication Protocol for Middleware (SCPM)
    I.S. EN ISO/IEC 27040:2016 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015)
    S.R. CEN ISO/TS 21719-2:2018 ELECTRONIC FEE COLLECTION - PERSONALIZATION OF ON-BOARD EQUIPMENT (OBE) - PART 2: USING DEDICATED SHORT-RANGE COMMUNICATION (ISO/TS 21719-2:2018)
    ISO 9735-10:2014 Electronic data interchange for administration, commerce and transport (EDIFACT) — Application level syntax rules (Syntax version number: 4, Syntax release number: 2) — Part 10: Syntax service directories
    ISO 9564-2:2014 Financial services — Personal Identification Number (PIN) management and security — Part 2: Approved algorithms for PIN encipherment
    ISO 11568-4:2007 Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle
    ISO/IEC 24745:2011 Information technology Security techniques Biometric information protection
    ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
    ISO/IEC 11889-4:2015 Information technology Trusted Platform Module Library Part 4: Supporting Routines
    DIN ISO 9735-5:2004-01 Electronic data interchange for administration, commerce and transport (EDIFACT) - Application level syntax rules (Syntax version number: 4, Syntax release number: 1) - Part 5: Security rules for batch EDI (authenticity, integrity and non-repudiation of origin) (ISO 9735-5:2002)
    CEN/TS 14821-2:2003 TRAFFIC AND TRAVEL INFORMATION (TTI) - TTI MESSAGES VIA CELLULAR NETWORKS - PART 2: NUMBERING AND ADP MESSAGE HEADER
    CEN/TS 14821-7:2003 TRAFFIC AND TRAVEL INFORMATION (TTI) - TTI MESSAGES VIA CELLULAR NETWORKS - PART 7: PERFORMANCE REQUIREMENTS FOR ONBOARD POSITIONING
    EN 50159-2 : 2001 COR 2010 RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - PART 2: SAFETY RELATED COMMUNICATION IN OPEN TRANSMISSION SYSTEMS

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
    ISO/IEC 19772:2009 Information technology Security techniques Authenticated encryption
    ISO/IEC 18033-1:2015 Information technology Security techniques Encryption algorithms Part 1: General
    ISO/IEC 29192-2:2012 Information technology Security techniques Lightweight cryptography Part 2: Block ciphers
    ISO/IEC 18033-3:2010 Information technology Security techniques Encryption algorithms Part 3: Block ciphers
    ISO/IEC 10118-1:2016 Information technology Security techniques Hash-functions Part 1: General
    ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective