• ISO/IEC 11770-3:2015

    Withdrawn A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

    Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques

    Available format(s):  Hardcopy, PDF, PDF 3 Users, PDF 5 Users, PDF 9 Users

    Withdrawn date:  22-10-2021

    Language(s): 

    Published date:  04-08-2015

    Publisher:  International Organization for Standardization

    Add To Cart

    Abstract - (Show below) - (Hide below)

    ISO/IEC 11770-3:2015 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals: a) establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key agreement mechanism, the secret key is computed as the result of a data exchange between the two entities A and B. Neither of them should be able to predetermine the value of the shared secret key; b) establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B via key transport. In a secret key transport mechanism, the secret key is chosen by one entity A and is transferred to another entity B, suitably protected by asymmetric techniques; and c) make an entity's public key available to other entities via key transport. In a public key transport mechanism, the public key of entity A shall be transferred to other entities in an authenticated way, but not requiring secrecy.

    Some of the mechanisms of ISO/IEC 11770-3:2015 are based on the corresponding authentication mechanisms in ISO/IEC 97983.

    ISO/IEC 11770-3:2015 does not cover certain aspects of key management, such as key lifecycle management, mechanisms to generate or validate asymmetric key pairs, and mechanisms to store, archive, delete, destroy, etc. keys.

    While ISO/IEC 11770-3:2015 does not explicitly cover the distribution of an entity's private key (of an asymmetric key pair) from a trusted third party to a requesting entity, the key transport mechanisms described can be used to achieve this. A private key can in all cases be distributed with these mechanisms where an existing, non-compromised key already exists. However, in practice the distribution of private keys is usually a manual process that relies on technological means such as smart cards, etc.

    ISO/IEC 11770-3:2015 does not specify the transformations used in the key management mechanisms.

    General Product Information - (Show below) - (Hide below)

    Development Note Supersedes ISO/IEC 15946-3. (07/2008)
    Document Type Standard
    Publisher International Organization for Standardization
    Status Withdrawn
    Superseded By
    Supersedes

    Standards Referenced By This Book - (Show below) - (Hide below)

    BS EN 50159-2:2001 Railway applications. Communication, signalling and processing systems Safety related communication in open transmission systems
    08/30192697 DC : 0 BS ISO/IEC 9797-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 1: MECHANISMS USING A BLOCK CIPHER
    08/30169502 DC : 0 BS ISO/IEC 9798-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO KNOWLEDGE TECHNIQUES
    UNI CEN ISO/TS 24534-4 : 2008 AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES
    BS EN 419212-1:2017 Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services Introduction and common definitions
    12/30236961 DC : 0 BS ISO/IEC 20008-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ANONYMOUS DIGITAL SIGNATURES - PART 1: GENERAL
    15/30327554 DC : 0 BS ISO/IEC 13157-2 - INFORMATION TECHNOLOGY - TELECOMMUNICATIONS AND INFORMATION EXCHANGE BETWEEN SYSTEMS - NFC SECURITY - PART 2: NFC-SEC CRYPTOGRAPHY STANDARD USING ECDH AND AES
    07/30154069 DC : 0 BS ISO/IEC 24727-3 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 3: APPLICATION INTERFACE
    ISO/IEC 13157-2:2016 Information technology Telecommunications and information exchange between systems NFC Security Part 2: NFC-SEC cryptography standard using ECDH and AES
    ISO/IEC 13888-2:2010 Information technology Security techniques Non-repudiation Part 2: Mechanisms using symmetric techniques
    CSA ISO/IEC 9798-5 : 2010 : R2015 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO-KNOWLEDGE TECHNIQUES
    09/30204721 DC : 0 BS ISO/IEC 9798-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 1: GENERAL
    BS EN 14890-1:2008 Application interface for smart cards used as secure signature creation devices Basic services
    PD CEN/TS 15480-2:2012 Identification card systems. European Citizen Card Logical data structures and security services
    BS ISO/IEC 18014-1:2008 Information technology. Security techniques. Time- stamping services Framework
    INCITS/ISO/IEC 18014-3 : 2010 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TIME-STAMPING SERVICES - PART 3: MECHANISMS PRODUCING LINKED TOKENS
    CSA ISO/IEC 11770-4 : 2007 : R2017 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS
    BS ISO/IEC 15946-3:2002 Information technology. Security techniques. Cryptographic techniques based on elliptic curves Key establishment
    BS ISO/IEC 9798-1:2010 Information technology. Security techniques. Entity authentication General
    INCITS/ISO/IEC 15946-3 : 2002 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 3: KEY ESTABLISHMENT
    CSA ISO/IEC TR 14516 : 2004 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES
    INCITS/ISO/IEC 9796-3 : 2000 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURE SCHEMES GIVING MESSAGE RECOVERY - PART 3: DISCRETE LOGARITHM BASED MECHANISMS
    CSA TELECOM ORGANIZATIONS PACKAGE : 2018 CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR
    CSA ISO/IEC TR 14516 : 2004 : R2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES
    CSA ISO/IEC 11770-1 : 2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 1: FRAMEWORK
    INCITS/ISO/IEC 15945 : 2002 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES
    INCITS/ISO/IEC 11770-5 : 2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 5: GROUP KEY MANAGEMENT
    CSA ISO/IEC 9798-5 : 2010 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO-KNOWLEDGE TECHNIQUES
    BS ISO/IEC 18033-4 : 2005 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 4: STREAM CIPHERS
    I.S. EN 419212-1:2017 APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 1: INTRODUCTION AND COMMON DEFINITIONS
    S.R. CEN/TS 15480-2:2012 IDENTIFICATION CARD SYSTEMS - EUROPEAN CITIZEN CARD - PART 2: LOGICAL DATA STRUCTURES AND SECURITY SERVICES
    I.S. EN 62734:2015 INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A
    UNI CEN/TS 15480-2 : 2012 IDENTIFICATION CARD SYSTEMS - EUROPEAN CITIZEN CARD - PART 2: LOGICAL DATA STRUCTURES AND SECURITY SERVICES
    ECMA 386 : 3ED 2015 NFC-SEC-01: NFC-SEC CRYPTOGRAPHY STANDARD USING ECDH AND AES
    IEC 62351-9:2017 Power systems management and associated information exchange - Data and communications security - Part 9: Cyber security key management for power system equipment
    BIS IS 15256-4 : 2013 BANKING - KEY MANAGEMENT (RETAIL) - PART 4: ASYMMETRIC CRYPTOSYSTEMS - KEY MANAGEMENT AND LIFE CYCLE
    ISO/IEC TR 29149:2012 Information technology Security techniques Best practices for the provision and use of time-stamping services
    ISO/IEC 15945:2002 Information technology — Security techniques — Specification of TTP services to support the application of digital signatures
    ISO/IEC 27002:2013 Information technology Security techniques Code of practice for information security controls
    CEN ISO/TS 19299 : 2015 ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015)
    EN 62734:2015 Industrial networks - Wireless communication network and communication profiles - ISA 100.11a
    CEN/TS 15480-2:2012 Identification card systems - European Citizen Card - Part 2: Logical data structures and security services
    ISO/IEC 11770-5:2011 Information technology Security techniques Key management Part 5: Group key management
    08/30169505 DC : DRAFT JULY 2008 BS ISO/IEC 13888-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 1: GENERAL
    09/30202174 DC : 0 BS EN 50159 - RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY RELATED COMMUNICATION IN TRANSMISSION SYSTEMS
    ISO/IEC 13888-1:2009 Information technology Security techniques Non-repudiation Part 1: General
    15/30293352 DC : 0 BS ISO/IEC 11770-6 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 6: KEY DERIVATION
    BS ISO/IEC 11770-6:2016 Information technology. Security techniques. Key management Key derivation
    EG 202 009-1 : 1.3.1 USER GROUP; QUALITY OF TELECOM SERVICES; PART 1: METHODOLOGY FOR IDENTIFICATION OF INDICATORS RELEVANT TO THE USERS
    12/30236952 DC : 0 BS ISO/IEC 20009-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ANONYMOUS ENTITY AUTHENTICATION - PART 2: MECHANISMS BASED ON SIGNATURES USING A GROUP PUBLIC KEY
    INCITS/ISO/IEC 9796-3 : 2000 : R2005 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURE SCHEMES GIVING MESSAGE RECOVERY - PART 3: DISCRETE LOGARITHM BASED MECHANISMS
    09/30204756 DC : 0 BS ISO/IEC 11770-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 1: FRAMEWORK
    16/30335567 DC : 0 BS ISO/IEC 15946-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 5: ELLIPTIC CURVE GENERATION
    12/30259506 DC : DRAFT JAN 2012 BS EN 62734 - INDUSTRIAL COMMUNICATION NETWORKS - FIELDBUS SPECIFICATIONS - WIRELESS SYSTEMS FOR INDUSTRIAL AUTOMATION: PROCESS CONTROL AND RELATED APPLICATIONS (BASED ON ISA 100.11A)
    BS ISO/IEC 20008-1:2013 Information technology. Security techniques. Anonymous digital signatures General
    ISO/IEC 11770-4:2017 Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets
    CSA ISO/IEC 27002 : 2015 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS
    BS ISO/IEC 20009-2:2013 Information technology. Security techniques. Anonymous entity authentication Mechanisms based on signatures using a group public key
    BS ISO 11568-4:2007 Banking. Key management (retail) Asymmetric cryptosystems. Key management and life cycle
    11/30228418 DC : DRAFT JUNE 2011 BS ISO/IEC 29192-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 3: STREAM CIPHERS
    BS EN 62351-9:2017 Power systems management and associated information exchange. Data and communications security Cyber security key management for power system equipment
    BS ISO/IEC 19790:2012 Information technology. Security techniques. Security requirements for cryptographic modules
    PD ISO/TR 14742:2010 Financial services. Recommendations on cryptographic algorithms and their use
    BS ISO/IEC 15945:2002 Information technology. Security techniques. Specification of TTP services to support the application of digital signatures
    UNE-ISO/IEC 27002:2015 Information technology -- Security techniques -- Code of practice for information security controls
    BS ISO/IEC 18367:2016 Information technology. Security techniques. Cryptographic algorithms and security mechanisms conformance testing
    CSA ISO/IEC 9798-6 : 2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 6: MECHANISMS USING MANUAL DATA TRANSFER
    04/30105372 DC : DRAFT DEC 2004 ISO/IEC 11770-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS
    ECMA 410 : 3ED 2017 NFC-SEC-03: NFC-SEC ENTITY AUTHENTICATION AND KEY AGREEMENT USING ASYMMETRIC CRYPTOGRAPHY
    CSA ISO/IEC 18014-1 : 2009 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TIME-STAMPING SERVICES - PART 1: FRAMEWORK
    CAN/CSA-ISO/IEC 15945-04 (R2017) Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures (Adopted ISO/IEC 15945:2002, first edition, 2002-02-01)
    BS ISO/IEC 18031 : 2011 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION
    ISO/IEC 19286:2018 Identification cards — Integrated circuit cards — Privacy-enhancing protocols and services
    BS ISO/IEC 27002 : 2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS
    ETR 237 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG) - BASELINE SECURITY STANDARDS - FEATURES AND MECHANISMS
    CAN/CSA-ISO/IEC 18367:18 Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing (Adopted ISO/IEC 18367:2016, first edition, 2016-12-15)
    I.S. EN 14890-1:2008 APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
    UNE-EN ISO/IEC 27002:2017 Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015)
    BS EN ISO 24534-4:2010+A1:2019 Automatic vehicle and equipment identification. Electronic registration identification (ERI) for vehicles Secure communications using asymmetrical techniques
    ISO/IEC 18370-2:2016 Information technology Security techniques Blind digital signatures Part 2: Discrete logarithm based mechanisms
    PREN 50159 : DRAFT 2009 RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS
    ISO/IEC 11889-1:2015 Information technology Trusted platform module library Part 1: Architecture
    ISO/IEC 18367:2016 Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing
    ISO/IEC 18014-1:2008 Information technology Security techniques Time-stamping services Part 1: Framework
    CEN/TS 16702-1:2014 Electronic fee collection - Secure monitoring for autonomous toll systems - Part 1: Compliance checking
    04/30040717 DC : DRAFT JUL 2004 ISO/IEC 18033-2 - INFORMATION TECHNOLOGY - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS
    CSA ISO/IEC 15946-3 : 2004 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 3: KEY ESTABLISHMENT
    DIN EN ISO/IEC 27002 E : 2017 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS (ISO/IEC 27002:2013 INCLUDING COR 1:2014 AND COR 2:2015)
    15/30286868 DC : 0 BS ISO/IEC 14888-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 3: DISCRETE LOGARITHM BASED MECHANISMS
    PD IEC/TS 62351-5:2013 Power systems management and associated information exchange. Data and communications security Security for IEC 60870-5 and derivatives
    03/652695 DC : 0 ISO/IEC 9798-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO KNOWLEDGE TECHNIQUES
    BS EN ISO/IEC 27002:2017 Information technology. Security techniques. Code of practice for information security controls
    BS EN 50159:2010 Railway applications. Communication, signalling and processing systems. Safety-related communication in transmission systems
    07/30163724 DC : 0 BS ISO/IEC 24727-4 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS PROGRAMMING INTERFACE - PART 4: API ADMINISTRATION
    BS ISO/IEC 15946-5:2017 Information technology. Security techniques. Cryptographic techniques based on elliptic curves Elliptic curve generation
    PD CEN/TS 16702-1:2014 Electronic fee collection. Secure monitoring for autonomous toll system Compliance checking
    DIN EN 14890-1:2009-03 APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
    EN ISO 24534-4:2010 Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques (ISO 24534-4:2010)
    07/30135157 DC : 0 BS ISO/IEC 18014-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TIME-STAMPING SERVICES - PART 1: FRAMEWORK
    INCITS/ISO/IEC 18031 : 2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION
    BS ISO/IEC 14888-3 : 2006 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 3: DISCRETE LOGARITHM BASED MECHANISMS
    07/30161079 DC : 0 BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
    12/30255293 DC : 0 BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
    16/30345808 DC : 0 BS EN 419212-1 - APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 1: INTRODUCTION AND COMMON DEFINITIONS
    BS ISO/IEC 29150:2011 Information technology. Security techniques. Signcryption
    BS ISO/IEC 19286:2018 Identification cards. Integrated circuit cards. Privacy-enhancing protocols and services
    CAN/CSA-ISO/IEC 11770-1:12 (R2016) Information technology - Security techniques - Key management - Part 1: Framework (Adopted ISO/IEC 11770-1:2010, second edition, 2010-12-01)
    BS EN ISO 12855:2015 Electronic fee collection. Information exchange between service provision and toll charging
    DIN EN ISO/IEC 27002:2017-06 Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015)
    CSA ISO/IEC 18033-4 : 2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 4: STREAM CIPHERS
    CAN/CSA-ISO/IEC 18031:13 (R2017) Information technology - Security techniques - Random bit generation (Adopted ISO/IEC 18031:2011, second edition, 2011-11-15)
    BS EN 62734:2015 Industrial networks. Wireless communication network and communication profiles. ISA 100.11a
    CSA ISO/IEC 9798-1 :2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 1: GENERAL
    DIN CEN ISO/TS 19299;DIN SPEC 74125:2016-02 ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015)
    CSA ISO/IEC 18031 : 2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION
    CSA ISO/IEC 14888-3 : 2018 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 3: DISCRETE LOGARITHM BASED MECHANISMS
    BS ISO/IEC 13888-1:2009 Information technology. Security techniques. Non-repudiation General
    INCITS/ISO/IEC 9798-6 : 2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 6: MECHANISMS USING MANUAL DATA TRANSFER
    ISO 15764:2004 Road vehicles Extended data link security
    INCITS/ISO/IEC 15946-1 : 2002 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 1: GENERAL
    S.R. CEN/TS 16702-1:2014 ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 1: COMPLIANCE CHECKING
    ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
    ECMA 409 : 2ED 2015 NFC-SEC-02: NFC-SEC CRYPTOGRAPHY STANDARD USING ECDH-256 AND AES-GCM
    S.R. CEN ISO/TS 19299:2015 ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015)
    ISO/IEC 15946-5:2017 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 5: Elliptic curve generation
    BS ISO/IEC 11770-4:2017 Information technology. Security techniques. Key management Mechanisms based on weak secrets
    NF ISO 11568-4 : 1999 BANKING - KEY MANAGEMENT (RETAIL) - PART 4: KEY MANAGEMENT TECHNIQUES FOR PUBLIC KEY CRYPTOSYSTEMS
    ISO 24534-4:2010 Automatic vehicle and equipment identification — Electronic registration identification (ERI) for vehicles — Part 4: Secure communications using asymmetrical techniques
    ISO/IEC 18033-4:2011 Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers
    ISO/IEC 9798-5:2009 Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques
    ISO/TR 14742:2010 Financial services Recommendations on cryptographic algorithms and their use
    IEC TS 62351-5:2013 Power systems management and associated information exchange - Data and communications security - Part 5: Security for IEC 60870-5 and derivatives
    S.R. CEN ISO/TS 24534-4:2008 AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES
    ISO/TS 19299:2015 Electronic fee collection Security framework
    UNE-EN 50159:2011 Railway applications - Communication, signalling and processing systems - Safety-related communication in transmission systems
    IEC 62734:2014 Industrial networks - Wireless communication network and communication profiles - ISA 100.11a
    CEI EN 50159 : 2012 RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS
    UNI EN 419212-1 : 2015 APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
    UNI CEI ISO/IEC 18013-3 : 2011 INFORMATION TECHNOLOGY - PERSONAL IDENTIFICATION - ISO-COMPLIANT DRIVING LICENCE - PART 3: ACCESS CONTROL, AUTHENTICATION AND INTEGRITY VALIDATION
    BS ISO/IEC 11770-1:2010 Information technology. Security techniques. Key management Framework
    16/30343872 DC : DRAFT JUNE 2016 BS EN 62351-9 ED1 - POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA ANDCOMMUNICATIONS SECURITY - PART 9: CYBER SECURITY KEY MANAGEMENT FOR POWER SYSTEM EQUIPMENT
    BS ISO/IEC 18370-2:2016 Information technology. Security techniques. Blind digital signatures Discrete logarithm based mechanisms
    PREN 419212-1 : DRAFT 2016 APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 1: INTRODUCTION AND COMMON DEFINITIONS
    07/30153606 DC : 0 BS ISO 22895 - FINANCIAL SERVICES - SECURITY - CRYPTOGRAPHIC SYNTAX SCHEME
    BS ISO/IEC 11770-5:2011 Information technology Security techniques. Key management Group key management
    CSA INFORMATION SECURITY PACKAGE : 2018 CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION
    INCITS/ISO/IEC 27002 : 2014 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS
    BS ISO/IEC TR 14516:2002 Information technology. Security techniques. Guidelines for the use and management of trusted third party services
    CSA ISO/IEC 18014-1 : 2009 : R2014 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TIME-STAMPING SERVICES - PART 1: FRAMEWORK
    UNI CEN/TS 16702-1 : 2014 ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 1: COMPLIANCE CHECKING
    BS ISO/IEC 13888-2:2010 Information technology. Security techniques. Non-repudiation Mechanisms using symmetric techniques
    DIN EN 14890-1 E : 2009 APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
    UNE-EN ISO 24534-4:2012 Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques (ISO 24534-4:2010)
    DIN CEN ISO/TS 19299;DIN SPEC 74125:2016-02 ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015)
    DD CEN ISO/TS 24534-4:2008 Automatic vehicle and equipment identification. Electronic registration identification (ERI) for vehicles Secure communications using asymmetrical techniques
    02/652659 DC : DRAFT NOV 2002 ISO/IEC FCD 13888-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 1: GENERAL
    PD CEN ISO/TS 19299:2015 Electronic fee collection. Security framework
    08/30195403 DC : 0 BS EN ISO 24534-4 - AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES
    BS EN ISO 27799:2008 Health informatics. Information security management in health using ISO/IEC 27002
    04/30093313 DC : DRAFT JUN 2004 ISO/IEC 9798-6 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 6: MECHANISMS USING MANUAL DATA TRANSFER
    CSA ISO/IEC 13888-1:2010 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 1: GENERAL
    UNI CEN/TS 16439 : 2013 ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK
    I.S. EN ISO 12855:2015 ELECTRONIC FEE COLLECTION - INFORMATION EXCHANGE BETWEEN SERVICE PROVISION AND TOLL CHARGING (ISO 12855:2015)
    07/30161082 DC : 0 BS EN 14890-2 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 2: ADDITIONAL SERVICES
    CAN/CSA-ISO/IEC 9798-1:12 (R2016) Information technology - Security techniques - Entity authentication - Part 1: General (Adopted ISO/IEC 9798-1:2010, third edition, 2010-07-01)
    CAN/CSA-ISO/IEC 9798-6:12 (R2016) Information technology - Security techniques - Entity authentication - Part 6: Mechanisms using manual data transfer (Adopted ISO/IEC 9798-6:2010, second edition, 2010-12-01)
    CSA ISO/IEC 11770-4 : 2007 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS
    CSA ISO/IEC 15945 : 2004 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES
    CAN/CSA-ISO/IEC 18033-4:13 (R2017) Information technology - Security techniques - Encryption algorithms - Part 4: Stream ciphers (Adopted ISO/IEC 18033-4:2011, second edition, 2011-12-15)
    16/30335688 DC : 0 BS ISO/IEC 11770-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS
    CSA ISO/IEC 11770-4 : 2007 : R2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS
    CSA ISO/IEC 11770-4 : 2007 : INC : COR 1 : 2010 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS
    ISO/IEC 11770-6:2016 Information technology Security techniques Key management Part 6: Key derivation
    INCITS/ISO/IEC 18033-4 : 2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 4: STREAM CIPHERS
    ISO/IEC 19790:2012 Information technology — Security techniques — Security requirements for cryptographic modules
    I.S. EN ISO/IEC 27002:2017 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS (ISO/IEC 27002:2013 INCLUDING COR 1:2014 AND COR 2:2015)
    I.S. ISO/IEC 27002:2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS
    UNI EN ISO 24534-4 : 2011 AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES
    CEI UNI ISO/IEC 27002 : 2014 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS
    ISO/IEC 9798-6:2010 Information technology Security techniques Entity authentication Part 6: Mechanisms using manual data transfer
    ISO/IEC 14888-3:2016 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
    I.S. CWA 14890-2:2004 APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 2: ADDITIONAL SERVICES
    ISO/IEC 29167-16:2015 Information technology — Automatic identification and data capture techniques — Part 16: Crypto suite ECDSA-ECDH security services for air interface communications
    I.S. EN ISO 24534-4:2010&A1:2019 AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES
    ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
    ISO/IEC 9798-1:2010 Information technology Security techniques Entity authentication Part 1: General
    ISO/IEC 15444-8:2007 Information technology — JPEG 2000 image coding system: Secure JPEG 2000 — Part 8:
    IEC 62280:2014 Railway applications - Communication, signalling and processing systems - Safety related communication in transmission systems
    EN 50159:2010 Railway applications - Communication, signalling and processing systems - Safety-related communication in transmission systems
    ISO 12855:2015 Electronic fee collection Information exchange between service provision and toll charging
    ISO/TS 24534-4:2008 Automatic vehicle and equipment identification Electronic Registration Identification (ERI) for vehicles Part 4: Secure communications using asymmetrical techniques
    EN ISO/IEC 27002:2017 Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015)
    EN ISO 27799:2016 Health informatics - Information security management in health using ISO/IEC 27002 (ISO 27799:2016)
    EN 419212-1:2017 Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 1: Introduction and common definitions
    EN ISO 12855:2015 (edition 2) Electronic fee collection - Information exchange between service provision and toll charging (ISO 12855:2015)
    EN 14890-1:2008 Application Interface for smart cards used as Secure Signature Creation Devices - Part 1: Basic services
    15/30268544 DC : 0 BS ISO/IEC 18370-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BLIND DIGITAL SIGNATURES - PART 1: GENERAL
    INCITS/ISO/IEC 9798-5 : 2010 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO-KNOWLEDGE TECHNIQUES
    ISO/IEC TR 14516:2002 Information technology Security techniques Guidelines for the use and management of Trusted Third Party services
    ISO/IEC 14888-1:2008 Information technology Security techniques Digital signatures with appendix Part 1: General
    BS ISO/IEC 11889-1:2009 Information technology. Trusted platform module Overview
    I.S. EN 62351-9:2017 POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 9: CYBER SECURITY KEY MANAGEMENT FOR POWER SYSTEM EQUIPMENT
    ISO/IEC 13157-4:2016 Information technology Telecommunications and information exchange between systems NFC Security Part 4: NFC-SEC entity authentication and key agreement using asymmetric cryptography
    BS ISO/IEC 9798-5:2009 Information technology. Security techniques. Entity authentication Mechanisms using zero knowledge techniques
    BS ISO/IEC 14888-1:1998 Information technology. Security techniques. Digital signatures with appendix General
    ANSI X9.42 : 2003(R2013) PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES: AGREEMENT OF SYMMETRIC KEYS USING DISCRETE LOGARITHM CRYPTOGRAPHY
    PD ISO/IEC TR 29149:2012 Information technology. Security techniques. Best practices for the provision and use of time-stamping services
    09/30169508 DC : 0 BS ISO/IEC 13888-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 2: MECHANISMS USING SYMMETRIC TECHNIQUES
    ECMA 411 : 3ED 2017 NFC-SEC-04: NFC-SEC ENTITY AUTHENTICATION AND KEY AGREEMENT USING SYMMETRIC CRYPTOGRAPHY
    CSA ISO/IEC 15945 : 2004 : R2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES
    PD CEN/TS 16439:2013 Electronic fee collection. Security framework
    05/30112566 DC : DRAFT JAN 2005 ISO 11568-4 - BANKING - KEY MANAGEMENT (RETAIL) - PART 4: ASYMMETRIC CRYPTOSYSTEMS - KEY MANAGEMENT AND LIFE CYCLE
    BS ISO/IEC 9798-6:2010 Information technology. Security techniques. Entity authentication Mechanisms using manual data transfer
    05/30116896 DC : DRAFT SEP 2005 ISO 19092-1 - FINANCIAL SERVICES - BIOMETRICS - PART 1: SECURITY FRAMEWORK
    07/30105115 DC : 0 BS ISO/IEC 19772 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - AUTHENTICATED ENCRYPTION
    CAN/CSA-ISO/IEC TR 14516-04 (R2017) Information Technology - Security Techniques - Guidelines for the use and Management of Trusted Third Party Services (Adopted ISO/IEC TR 14516:2002, first edition, 2002-06-15)
    CSA ISO/IEC 13888-1 : 2010 : R2015 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 1: GENERAL
    INCITS/ISO/IEC 11770-4 : 2008 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS
    INCITS/ISO/IEC 15945 : 2002 : R2007 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES
    ISO/IEC 20009-2:2013 Information technology — Security techniques — Anonymous entity authentication — Part 2: Mechanisms based on signatures using a group public key
    ISO/IEC 13157-5:2016 Information technology Telecommunications and information exchange between systems NFC Security Part 5: NFC-SEC entity authentication and key agreement using symmetric cryptography
    I.S. EN 50159-2:2001 RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - PART 2: SAFETY RELATED COMMUNICATION IN OPEN TRANSMISSION SYSTEMS
    CAN/CSA-ISO/IEC 11889-1:16 Information technology Trusted Platform Module Library Part 1: Architecture (Adopted ISO/IEC 11889-1:2015, second edition, 2015-12-15)
    ISO/IEC 24767-2:2009 Information technology Home network security Part 2: Internal security services: Secure Communication Protocol for Middleware (SCPM)
    IEEE 1815-2012 REDLINE IEEE Standard for Electric Power Systems Communications-Distributed Network Protocol (DNP3)
    ISO/IEC 20008-1:2013 Information technology — Security techniques — Anonymous digital signatures — Part 1: General
    S.R. CEN/TS 16439:2013 ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK
    ISO/IEC 13157-3:2016 Information technology Telecommunications and information exchange between systems NFC Security Part 3: NFC-SEC cryptography standard using ECDH-256 and AES-GCM
    ISO/IEC 15946-3:2002 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 3: Key establishment
    CAN/CSA-ISO/IEC 29167-16:16 Information technology Automatic identification and data capture techniques Part 16: Crypto suite ECDSA-ECDH security services for air interface communications (Adopted ISO/IEC 29167-16:2015, first edition, 2015-11-15)
    UNI CEI ISO/IEC 27002 : 2014 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS
    I.S. EN 50159:2010 RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS
    ISO/IEC 29150:2011 Information technology — Security techniques — Signcryption
    ISO 11568-4:2007 Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle
    CEN/TS 16439:2013 Electronic fee collection - Security framework
    EN 50159-2 : 2001 COR 2010 RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - PART 2: SAFETY RELATED COMMUNICATION IN OPEN TRANSMISSION SYSTEMS
    CEN ISO/TS 24534-4:2008 Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques (ISO/TS 24534-4:2008)
    EN 62351-9:2017 Power systems management and associated information exchange - Data and communications security - Part 9: Cyber security key management for power system equipment

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
    ISO/IEC 19772:2009 Information technology Security techniques Authenticated encryption
    ISO/IEC 9798-3:1998 Information technology Security techniques Entity authentication Part 3: Mechanisms using digital signature techniques
    ISO/IEC 15946-1:2016 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General
    ISO/IEC 14888-3:2016 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
    ISO/IEC 11770-6:2016 Information technology Security techniques Key management Part 6: Key derivation
    ISO/IEC 9796-3:2006 Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms
    ISO/IEC 10181-1:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Overview
    ISO/IEC 9594-8:2017 Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks
    ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
    ISO/IEC 29150:2011 Information technology — Security techniques — Signcryption
    ISO/IEC 9796-2:2010 Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms
    ANSI X9.63 : 2011 FINANCIAL SERVICES - PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY, KEY AGREEMENT AND KEY TRANSPORT USING ELLIPTIC CURVE CRYPTOGRAPHY
    AS ISO/IEC 9797.1:2019 Information technology - Security techniques - Message Authentication Codes (MACs) Mechanisms using a block cipher
    ISO/IEC 14888-2:2008 Information technology Security techniques Digital signatures with appendix Part 2: Integer factorization based mechanisms
    ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
    ANSI X9.42 : 2003(R2013) PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES: AGREEMENT OF SYMMETRIC KEYS USING DISCRETE LOGARITHM CRYPTOGRAPHY
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective