• ISO/IEC 18033-3:2010

    Current The latest, up-to-date edition.

    Information technology Security techniques Encryption algorithms Part 3: Block ciphers

    Available format(s):  Hardcopy, PDF, PDF 3 Users, PDF 5 Users, PDF 9 Users

    Language(s):  English

    Published date:  14-12-2010

    Publisher:  International Organization for Standardization

    Add To Cart

    Abstract - (Show below) - (Hide below)

    ISO/IEC 18033 specifies encryption systems (ciphers) for the purpose of data confidentiality.

    ISO/IEC 18033-3:2010 specifies block ciphers. A block cipher is a symmetric encipherment system with the property that the encryption algorithm operates on a block of plaintext, i.e. a string of bits of a defined length, to yield a block of ciphertext.

    ISO/IEC 18033-3:2010 specifies following algorithms:

    • 64-bit block ciphers: TDEA, MISTY1, CAST-128, HIGHT;
    • 128-bit block ciphers: AES, Camellia, SEED.

    NOTE The primary purpose of encryption (or encipherment) techniques is to protect the confidentiality of stored or transmitted data. An encryption algorithm is applied to data (often called plaintext or cleartext) to yield encrypted data (or ciphertext); this process is known as encryption. The encryption algorithm needs to be designed so that the ciphertext yields no information about the plaintext except, perhaps, its length. Associated with every encryption algorithm is a corresponding decryption algorithm, which transforms ciphertext back into its original plaintext.

    General Product Information - (Show below) - (Hide below)

    Document Type Standard
    Product Note THIS STANDARD ALSO REFERES TO: ISO/IEC 9834 (all parts),ISO/IEC JTC 1/SC 27
    Publisher International Organization for Standardization
    Status Current
    Supersedes

    Standards Referenced By This Book - (Show below) - (Hide below)

    15/30324800 DC : 0 BS ISO/IEC 16512-2 - INFORMATION TECHNOLOGY - RELAYED MULTICAST PROTOCOL: SPECIFICATION FOR SIMPLEX GROUP APPLICATIONS
    CSA ISO/IEC 10116 : 2007 : R2017 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER
    CSA ISO/IEC 18033-2 :2006 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS
    15/30288056 DC : 0 BS ISO/IEC 10116 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER
    08/30192697 DC : 0 BS ISO/IEC 9797-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 1: MECHANISMS USING A BLOCK CIPHER
    BS ISO/IEC 4909:2006 Identification cards. Financial transaction cards. Magnetic stripe data content for track 3
    10/30135070 DC : DRAFT NOV 2010 BS ISO/IEC 9797-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 3: MECHANISMS USING A UNIVERSAL HASH FUNCTION
    BS ISO 11568-4:2007 Banking. Key management (retail) Asymmetric cryptosystems. Key management and life cycle
    11/30231373 DC : 0 BS ISO 11568-2 - FINANCIAL SERVICES - KEY MANAGEMENT (RETAIL) - PART 2: SYMMETRIC CIPHERS, THEIR KEY MANAGEMENT AND LIFE CYCLE
    BS ISO/IEC 29192-5:2016 Information technology. Security techniques. Lightweight cryptography Hash-functions
    BS EN 419212-1:2017 Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services Introduction and common definitions
    15/30327554 DC : 0 BS ISO/IEC 13157-2 - INFORMATION TECHNOLOGY - TELECOMMUNICATIONS AND INFORMATION EXCHANGE BETWEEN SYSTEMS - NFC SECURITY - PART 2: NFC-SEC CRYPTOGRAPHY STANDARD USING ECDH AND AES
    ISO/IEC 13157-2:2016 Information technology Telecommunications and information exchange between systems NFC Security Part 2: NFC-SEC cryptography standard using ECDH and AES
    ISO/IEC 18028-4:2005 Information technology Security techniques IT network security Part 4: Securing remote access
    DIN EN 14890-1 E : 2009 APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
    16/30304626 DC : 0 BS ISO 20038 - BANKING AND RELATED FINANCIAL SERVICES - KEY WRAP
    NASA CCSDS 350.9-G : ISSUE 1 CCSDS CRYPTOGRAPHIC ALGORITHMS
    PD CEN/TR 16968:2016 Electronic Fee Collection. Assessment of security measures for applications using Dedicated Short-Range Communication
    BS ISO 21188:2006 Public key infrastructure for financial services. Practices and policy framework
    CSA ISO/IEC 10116 : 2007 : INC : COR 1 : 2009 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER
    INCITS/ISO/IEC 24745 : 2012(R2017) INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BIOMETRIC INFORMATION PROTECTION
    ISO/IEC 9797-3:2011 Information technology — Security techniques — Message Authentication Codes (MACs) — Part 3: Mechanisms using a universal hash-function
    CSA ISO/IEC 10118-2 : 2012 : INC : COR 1 : 2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - HASH-FUNCTIONS - PART 2: HASH-FUNCTIONS USING AN N-BIT BLOCK CIPHER
    05/30144066 DC : DRAFT DEC 2005 ISO 13492 - FINANCIAL SERVICES - KEY MANAGEMENT RELATED DATA ELEMENT - APPLICATION AND USAGE OF ISO 8353 DATA ELEMENTS 53 AND 96
    INCITS/ISO/IEC 11770-5 : 2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 5: GROUP KEY MANAGEMENT
    CAN/CSA-ISO/IEC 18033-2:06 (R2016) INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS
    EN ISO 24534-4:2010 Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques (ISO 24534-4:2010)
    ISO/IEC 29167-10:2017 Information technology — Automatic identification and data capture techniques — Part 10: Crypto suite AES-128 security services for air interface communications
    I.S. EN 419212-2:2017 APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 2: SIGNATURE AND SEAL SERVICES
    I.S. EN 419212-1:2017 APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 1: INTRODUCTION AND COMMON DEFINITIONS
    CSA ISO/IEC 29167-10 : 2016 INFORMATION TECHNOLOGY - AUTOMATIC IDENTIFICATION AND DATA CAPTURE TECHNIQUES - PART 10: CRYPTO SUITE AES-128 SECURITY SERVICES FOR AIR INTERFACE COMMUNICATIONS
    I.S. EN 62734:2015 INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A
    ISO/IEC 18033-2:2006 Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
    ECMA 386 : 3ED 2015 NFC-SEC-01: NFC-SEC CRYPTOGRAPHY STANDARD USING ECDH AND AES
    BS ISO 16609:2012 Financial services. Requirements for message authentication using symmetric techniques
    ISO/IEC 25185-1:2016 Identification cards Integrated circuit card authentication protocols Part 1: Protocol for Lightweight Authentication of Identity
    CEN/TR 17167:2018 Communication system for meters - Accompanying TR to EN 13757-2,-3 and -7, Examples and supplementary information
    ISO 11568-4:2007 Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle
    CEN/TS 16702-2:2015 Electronic fee collection - Secure monitoring for autonomous toll systems - Part 2: Trusted recorder
    I.S. EN 15509:2014 ELECTRONIC FEE COLLECTION - INTEROPERABILITY APPLICATION PROFILE FOR DSRC
    CEN ISO/TS 19299 : 2015 ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015)
    IEC 62320-2:2016 RLV Maritime navigation and radiocommunication equipment and systems - Automatic identification system (AIS) - Part 2: AIS AtoN Stations - Operational and performance requirements, methods of testing and required test results
    EN 61162-460:2015 Maritime navigation and radiocommunication equipment and systems - Digital interfaces - Part 460: Multiple talkers and multiple listeners - Ethernet interconnection - Safety and security
    EN 62734:2015 Industrial networks - Wireless communication network and communication profiles - ISA 100.11a
    ISO 11568-2:2012 Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle
    ISO/IEC 11770-5:2011 Information technology Security techniques Key management Part 5: Group key management
    04/30062952 DC : DRAFT MAR 2004 ISO/IEC FCD 10116 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER ALGORITHM
    ISO/IEC 16512-2:2016 Information technology Relayed multicast protocol: Specification for simplex group applications Part 2:
    S.R. CEN/TS 16702-2:2015 ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 2: TRUSTED RECORDER
    ISO/IEC 16504:2011 Information technology Telecommunications and information exchange between systems MAC and PHY for operation in TV white space
    10/30228327 DC : 0 BS ISO/IEC 18031 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION
    07/30154069 DC : 0 BS ISO/IEC 24727-3 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 3: APPLICATION INTERFACE
    INCITS/ISO/IEC 10118-2 : 2011 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - HASH-FUNCTIONS - PART 2: HASH-FUNCTIONS USING AN N-BIT BLOCK CIPHER
    12/30259506 DC : DRAFT JAN 2012 BS EN 62734 - INDUSTRIAL COMMUNICATION NETWORKS - FIELDBUS SPECIFICATIONS - WIRELESS SYSTEMS FOR INDUSTRIAL AUTOMATION: PROCESS CONTROL AND RELATED APPLICATIONS (BASED ON ISA 100.11A)
    BS EN ISO 13141 : 2015 ELECTRONIC FEE COLLECTION - LOCALISATION AUGMENTATION COMMUNICATION FOR AUTONOMOUS SYSTEMS
    14/30314819 DC : 0 BS EN 62320-2 - MARITIME NAVIGATION AND RADIOCOMMUNICATION EQUIPMENT AND SYSTEMS - AUTOMATIC IDENTIFICATION SYSTEM (AIS) - PART 2: AIS ATON STATIONS - OPERATIONAL AND PERFORMANCE REQUIREMENTS, METHODS OF TESTING AND REQUIRED TEST RESULTS
    BS ISO 9564-2:2014 Financial services. Personal Identification Number (PIN) management and security Approved algorithms for PIN encipherment
    14/30275432 DC : 0 BS ISO/IEC 29167-10 - INFORMATION TECHNOLOGY - AUTOMATIC IDENTIFICATION AND DATA CAPTURE TECHNIQUES - PART 10: CRYPTO SUITE AES-128 SECURITY SERVICES FOR AIR INTERFACE COMMUNICATIONS
    ISO/TS 21719-2:2018 Electronic fee collection — Personalization of on-board equipment (OBE) — Part 2: Using dedicated short-range communication
    16/30338581 DC : 0 BS EN 13757-7 - COMMUNICATION SYSTEMS FOR METERS - PART 7: TRANSPORT AND SECURITY SERVICES
    16/30288045 DC : 0 BS ISO/IEC 20009-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ANONYMOUS ENTITY AUTHENTICATION - PART 4: MECHANISMS BASED ON WEAK SECRETS
    ISO/IEC 29167-14:2015 Information technology Automatic identification and data capture techniques Part 14: Crypto suite AES OFB security services for air interface communications
    CSA ISO/IEC 18028-4 : 2006 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 4: SECURING REMOTE ACCESS
    BS ISO/IEC 19790:2012 Information technology. Security techniques. Security requirements for cryptographic modules
    PD ISO/TR 14742:2010 Financial services. Recommendations on cryptographic algorithms and their use
    S.R. CEN/TS 16439:2013 ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK
    CSA ISO/IEC 9798-6 : 2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 6: MECHANISMS USING MANUAL DATA TRANSFER
    CSA ISO/IEC 10116 : 2007 : R2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER
    ECMA 387 : 2ED 2010 HIGH RATE 60 GHZ PHY, MAC AND PALS
    CSA ISO/IEC 10116 : 2007 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER
    INCITS/ISO/IEC 18033-2 : 2008 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS
    ISO 20215:2015 Space data and information transfer systems — CCSDS cryptographic algorithms
    BS ISO/IEC 18031 : 2011 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION
    ISO/IEC 24767-1:2008 Information technology Home network security Part 1: Security requirements
    ISO/IEC 19790:2012 Information technology Security techniques Security requirements for cryptographic modules
    BS ISO/IEC/IEEE 8802-1X : 2013 INFORMATION TECHNOLOGY - TELECOMMUNICATIONS AND INFORMATION EXCHANGE BETWEEN SYSTEMS - LOCAL AND METROPOLITAN AREA NETWORKS - PART 1X: PORT-BASED NETWORK ACCESS CONTROL
    BS ISO/IEC 18013-3:2017 Information technology. Personal identification. ISO-compliant driving licence Access control, authentication and integrity validation
    I.S. EN 14890-1:2008 APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
    ISO/IEC 13157-5:2016 Information technology Telecommunications and information exchange between systems NFC Security Part 5: NFC-SEC entity authentication and key agreement using symmetric cryptography
    BS EN ISO 24534-4:2010+A1:2019 Automatic vehicle and equipment identification. Electronic registration identification (ERI) for vehicles Secure communications using asymmetrical techniques
    ISO 20038:2017 Banking and related financial services — Key wrap using AES
    ISO 21188:2018 Public key infrastructure for financial services — Practices and policy framework
    EN 13757-7:2018 Communication systems for meters - Part 7: Transport and security services
    ISO/IEC 11889-1:2015 Information technology Trusted platform module library Part 1: Architecture
    BS ISO/IEC 10118-2:2010 Information technology. Security techniques. Hash-functions Hash-functions using an n-bit block cipher
    ANSI X9.119-1 : 2016 RETAIL FINANCIAL SERVICES - REQUIREMENTS FOR PROTECTION OF SENSITIVE PAYMENT CARD DATA - PART 1: USING ENCRYPTION METHODS
    ISO/IEC 11889-2:2015 Information technology Trusted Platform Module Library Part 2: Structures
    IEC 62055-41:2014 RLV Electricity metering – Payment systems – Part 41: Standard transfer specification (STS) – Application layer protocol for one-way token carrier systems
    CEN/TS 16702-1:2014 Electronic fee collection - Secure monitoring for autonomous toll systems - Part 1: Compliance checking
    OVE/ONORM EN 62734 : 2015 INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A (IEC 62734:2014)
    04/30040717 DC : DRAFT JUL 2004 ISO/IEC 18033-2 - INFORMATION TECHNOLOGY - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS
    BS ISO/IEC 18028-4:2005 Information technology. Security techniques. IT network security Securing remote access
    15/30311322 DC : 0 BS ISO/IEC 29192-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 5: HASH-FUNCTIONS
    BS ISO/IEC 16512-2:2016 Information technology. Relayed multicast protocol: Specification for simplex group applications
    17/30281253 DC : 0 BS ISO 21188 - PUBLIC KEY INFRASTRUCTURE FOR FINANCIAL SERVICES - PRACTICES AND POLICY FRAMEWORK
    16/30346333 DC : 0 BS EN 61162-460 - MARITIME NAVIGATION AND RADIOCOMMUNICATION EQUIPMENT AND SYSTEMS -DIGITAL INTERFACES - PART 460: MULTIPLE TALKERS AND MULTIPLE LISTENERS - ETHERNET INTERCONNECTION - SAFETY AND SECURITY
    PD CEN/TS 16702-2:2015 Electronic fee collection. Secure monitoring for autonomous toll systems Trusted recorder
    BS ISO/IEC 24745:2011 Information technology. Security techniques. Biometric information protection
    07/30163724 DC : 0 BS ISO/IEC 24727-4 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS PROGRAMMING INTERFACE - PART 4: API ADMINISTRATION
    16/30332188 DC : 0 BS ISO/IEC 29167-10 - INFORMATION TECHNOLOGY - AUTOMATIC IDENTIFICATION AND DATA CAPTURE TECHNIQUES - PART 10: CRYPTO SUITE AES-128 SECURITY SERVICES FOR AIR INTERFACE COMMUNICATIONS
    12/30228421 DC : 0 BS ISO/IEC 29192-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES
    08/30180103 DC : DRAFT MAR 2008 BS EN 50136-1 - ALARM SYSTEMS - ALARM TRANSMISSION SYSTEMS - PART 1: GENERAL REQUIREMENTS FOR ALARM TRANSMISSION SYSTEMS
    BS ISO 20215:2015 Space data and information transfer systems. CCSDS cryptographic algorithms
    PD CEN/TS 16702-1:2014 Electronic fee collection. Secure monitoring for autonomous toll system Compliance checking
    DIN EN 14890-1:2009-03 APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
    BS ISO/IEC 9797-1:2011 Information technology. Security techniques. Message authentication codes (MACs) Mechanisms using a block cipher
    14/30302807 DC : 0 BS ISO/IEC 11889-4 - INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 4: SUPPORTING ROUTINES
    04/30040736 DC : DRAFT DEC 2004 ISO/IEC 18031 - INFORMATION TECHNOLOGY - RANDOM NUMBER GENERATION
    INCITS/ISO/IEC 18031 : 2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION
    BS ISO/IEC 25185-1:2016 Identification cards. Integrated circuit card authentication protocols Protocol for Lightweight Authentication of Identity
    IEEE 1901-2010 IEEE Standard for Broadband over Power Line Networks: Medium Access Control and Physical Layer Specifications
    12/30255293 DC : 0 BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
    16/30345808 DC : 0 BS EN 419212-1 - APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 1: INTRODUCTION AND COMMON DEFINITIONS
    BS ISO/IEC 18033-5:2015 Information technology. Security techniques. Encryption algorithms Identity-based ciphers
    ISO/IEC 29192-5:2016 Information technology Security techniques Lightweight cryptography Part 5: Hash-functions
    CSA ISO/IEC 26907 : 2010 INFORMATION TECHNOLOGY - TELECOMMUNICATIONS AND INFORMATION EXCHANGE BETWEEN SYSTEMS - HIGH-RATE ULTRA-WIDEBAND PHY AND MAC STANDARD
    CAN/CSA-ISO/IEC 9797-1:12 (R2016) Information technology - Security techniques - Message authentication codes (MACs) - Part 1: Mechanisms using a block cipher (Adopted ISO/IEC 9797-1:2011, second edition, 2011-03-01)
    CAN/CSA-ISO/IEC 10118-2:12 (R2016) Information technology - Security techniques - Hash-functions - Part 2: Hash-functions using an n-bit block cipher (Adopted ISO/IEC 10118-2:2010, third edition, 2010-10-15)
    ANSI INCITS 410 : 2015 INFORMATION TECHNOLOGY - IDENTIFICATION CARDS - LIMITED USE (LU), PROXIMITY INTEGRATED CIRCUIT CARD (PICC)
    CAN/CSA-ISO/IEC 25185-1:18 Identification cards — Integrated circuit card authentication protocols — Part 1: Protocol for Lightweight Authentication of Identity (Adopted ISO/IEC 25185-1:2016, first edition, 2016-01-15)
    ISO/IEC 18013-3:2017 Information technology — Personal identification — ISO-compliant driving licence — Part 3: Access control, authentication and integrity validation
    14/30312433 DC : 0 BS ISO 20215 - SPACE DATA AND INFORMATION TRANSFER SYSTEMS - CCSDS CRYPTOGRAPHIC ALGORITHMS
    CAN/CSA-ISO/IEC 18031:13 (R2017) Information technology - Security techniques - Random bit generation (Adopted ISO/IEC 18031:2011, second edition, 2011-11-15)
    BS EN 62734:2015 Industrial networks. Wireless communication network and communication profiles. ISA 100.11a
    DIN CEN ISO/TS 19299;DIN SPEC 74125:2016-02 ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015)
    CSA ISO/IEC 18031 : 2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION
    ISO/IEC 13156:2011 Information technology Telecommunications and information exchange between systems High rate 60 GHz PHY, MAC and PALs
    BS ISO/IEC 29167-10:2017 Information technology. Automatic identification and data capture techniques Crypto suite AES-128 security services for air interface communications
    ECMA 368 : 3ED 2008 HIGH RATE ULTRA WIDEBAND PHY AND MAC STANDARD
    INCITS/ISO/IEC 9798-6 : 2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 6: MECHANISMS USING MANUAL DATA TRANSFER
    ISO 15764:2004 Road vehicles Extended data link security
    ISO/IEC/IEEE 8802-15-6:2017 Information technology — Telecommunications and information exchange between systems — Local and metropolitan area networks — Specific requirements — Part 15-6: Wireless body area network
    I.S. EN ISO 13141:2015 ELECTRONIC FEE COLLECTION - LOCALISATION AUGMENTATION COMMUNICATION FOR AUTONOMOUS SYSTEMS (ISO 13141:2015)
    I.S. EN 61162-460:2015 MARITIME NAVIGATION AND RADIOCOMMUNICATION EQUIPMENT AND SYSTEMS - DIGITAL INTERFACES - PART 460: MULTIPLE TALKERS AND MULTIPLE LISTENERS - ETHERNET INTERCONNECTION - SAFETY AND SECURITY
    S.R. CEN/TS 16702-1:2014 ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 1: COMPLIANCE CHECKING
    BS ISO/IEC 29192-4 : 2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES
    CAN/CSA-ISO/IEC 23001-7:18 Information technology — MPEG systems technologies — Part 7: Common encryption in ISO base media file format files (Adopted ISO/IEC 23001-7:2016, third edition, 2016-02-15)
    CEN/TR 16968:2016 Electronic Fee Collection - Assessment of security measures for applications using Dedicated Short-Range Communication
    ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
    ECMA 409 : 2ED 2015 NFC-SEC-02: NFC-SEC CRYPTOGRAPHY STANDARD USING ECDH-256 AND AES-GCM
    BIS IS 15116 : 2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER
    S.R. CEN ISO/TS 19299:2015 ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015)
    BS ISO/IEC 10116:2017 Information technology. Security techniques. Modes of operation for an n-bit block cipher
    CAN/CSA-ISO/IEC 11889-4:16 Information technology Trusted Platform Module Library Part 4: Supporting Routines (Adopted ISO/IEC 11889-4:2015, second edition, 2015-12-15)
    S.R. CEN ISO/TS 21719-2:2018 ELECTRONIC FEE COLLECTION - PERSONALIZATION OF ON-BOARD EQUIPMENT (OBE) - PART 2: USING DEDICATED SHORT-RANGE COMMUNICATION (ISO/TS 21719-2:2018)
    ISO 24534-4:2010 Automatic vehicle and equipment identification — Electronic registration identification (ERI) for vehicles — Part 4: Secure communications using asymmetrical techniques
    ISO/IEC 23001-7:2016 Information technology — MPEG systems technologies — Part 7: Common encryption in ISO base media file format files
    ISO/TR 14742:2010 Financial services Recommendations on cryptographic algorithms and their use
    ISO/TR 19038:2005 Banking and related financial services Triple DEA Modes of operation Implementation guidelines
    I.S. EN 62320-2:2017 MARITIME NAVIGATION AND RADIOCOMMUNICATION EQUIPMENT AND SYSTEMS - AUTOMATIC IDENTIFICATION SYSTEM (AIS) - PART 2: AIS ATON STATIONS - OPERATIONAL AND PERFORMANCE REQUIREMENTS, METHODS OF TESTING AND REQUIRED TEST RESULTS
    ISO/TS 19299:2015 Electronic fee collection Security framework
    IEC 62734:2014 Industrial networks - Wireless communication network and communication profiles - ISA 100.11a
    NASA CCSDS 352.0-B : ISSUE 1 CCSDS CRYPTOGRAPHIC ALGORITHMS
    EN 62320-2:2017 MARITIME NAVIGATION AND RADIOCOMMUNICATION EQUIPMENT AND SYSTEMS - AUTOMATIC IDENTIFICATION SYSTEM (AIS) - PART 2: AIS ATON STATIONS - OPERATIONAL AND PERFORMANCE REQUIREMENTS, METHODS OF TESTING AND REQUIRED TEST RESULTS (IEC 62320-2:2016)
    UNI EN 419212-1 : 2015 APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
    UNI EN 15509 : 2014 ELECTRONIC FEE COLLECTION - INTEROPERABILITY APPLICATION PROFILE FOR DSRC
    UNI CEI ISO/IEC 18013-3 : 2011 INFORMATION TECHNOLOGY - PERSONAL IDENTIFICATION - ISO-COMPLIANT DRIVING LICENCE - PART 3: ACCESS CONTROL, AUTHENTICATION AND INTEGRITY VALIDATION
    INCITS/ISO/IEC 11889-4 : 2009(R2014) INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 4: COMMANDS
    09/30169518 DC : 0 BS ISO/IEC 10118-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - HASH-FUNCTIONS - PART 2: HASH-FUNCTIONS USING AN N-BIT BLOCK CIPHER
    BS 8593:2017 Code of practice for the deployment and use of Body Worn Video (BWV)
    BS ISO 11568-2:2012 Financial services. Key management (retail) Symmetric ciphers, their key management and life cycle
    PREN 419212-1 : DRAFT 2016 APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 1: INTRODUCTION AND COMMON DEFINITIONS
    14/30302798 DC : 0 BS ISO/IEC 11889-1 - INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 1: ARCHITECTURE
    BS ISO/IEC 11770-5:2011 Information technology Security techniques. Key management Group key management
    ISO/IEC 24771:2014 Information technology Telecommunications and information exchange between systems MAC/PHY standard for ad hoc wireless network to support QoS in an industrial work environment
    BS ISO/IEC 11889-4:2009 Information technology. Trusted platform module Commands
    BIS IS/ISO 21188 : 2006 PUBLIC KEY INFRASTRUCTURE FOR FINANCIAL SERVICES - PRACTICES AND POLICY FRAMEWORK
    10/30136309 DC : 0 BS ISO/IEC 24745 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BIOMETRIC INFORMATION PROTECTION
    ISO/IEC 29192-4:2013 Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques
    BS EN 419212-2:2017 Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services Signature and Seal Services
    UNI CEN/TS 16702-1 : 2014 ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 1: COMPLIANCE CHECKING
    BS ISO/IEC 11889-2:2009 Information technology. Trusted platform module Design principles
    BS ISO/IEC 23001-7:2016 Information technology. MPEG systems technologies Common encryption in ISO base media file format files
    UNE-EN ISO 24534-4:2012 Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques (ISO 24534-4:2010)
    DIN CEN ISO/TS 19299;DIN SPEC 74125:2016-02 ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015)
    BS EN 61162-460:2015 Maritime navigation and radiocommunication equipment and systems. Digital interfaces Multiple talkers and multiple listeners. Ethernet interconnection. Safety and security
    16/30345811 DC : 0 BS EN 419212-2 - APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 2: SIGNATURE AND SEAL SERVICES
    14/30302801 DC : 0 BS ISO/IEC 11889-2 - INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 2: STRUCTURES
    BS ISO 20038:2017 Banking and related financial services. Key wrap using AES
    PD CEN ISO/TS 19299:2015 Electronic fee collection. Security framework
    07/30173155 DC : 0 BS ISO/IEC 9798-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS
    BS ISO/IEC 9797-3:2011 Information technology. Security techniques. Message Authentication Codes (MACs) Mechanisms using a universal hash-function
    ECMA 392 : 2ED 2012 MAC AND PHY FOR OPERATION IN TV WHITE SPACE
    NF EN 14890-1 : 2009 APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
    04/30093313 DC : DRAFT JUN 2004 ISO/IEC 9798-6 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 6: MECHANISMS USING MANUAL DATA TRANSFER
    CSA ISO/IEC 9797-1:2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 1: MECHANISMS USING A BLOCK CIPHER
    UNI CEN/TS 16439 : 2013 ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK
    CSA ISO/IEC 26907 : 2010 : R2015 INFORMATION TECHNOLOGY - TELECOMMUNICATIONS AND INFORMATION EXCHANGE BETWEEN SYSTEMS - HIGH-RATE ULTRA-WIDEBAND PHY AND MAC STANDARD
    I.S. EN 13757-7:2018 COMMUNICATION SYSTEMS FOR METERS - PART 7: TRANSPORT AND SECURITY SERVICES
    CAN/CSA-ISO/IEC 29167-14:16 Information technology Automatic identification and data capture techniques Part 14: Crypto suite AES OFB security services for air interface communications (Adopted ISO/IEC 29167-14:2015, first edition, 2015-10-15)
    ANSI INCITS 422 : 2007 APPLICATION PROFILE FOR COMMERCIAL BIOMETRIC PHYSICAL ACCESS CONTROL
    CAN/CSA-ISO/IEC 9798-6:12 (R2016) Information technology - Security techniques - Entity authentication - Part 6: Mechanisms using manual data transfer (Adopted ISO/IEC 9798-6:2010, second edition, 2010-12-01)
    INCITS/ISO/IEC 10116 : 2008 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER
    ISO/IEC 24767-2:2009 Information technology Home network security Part 2: Internal security services: Secure Communication Protocol for Middleware (SCPM)
    ISO/IEC/IEEE 8802-1X:2013 Telecommunications and exchange between information technology systems Requirements for local and metropolitan area networks Part 1X: Port-based network access control
    ISO/IEC 18033-5:2015 Information technology Security techniques Encryption algorithms Part 5: Identity-based ciphers
    S.R. CEN/TR 17167:2018 COMMUNICATION SYSTEM FOR METERS - ACCOMPANYING TR TO EN 13757-2,-3 AND -7, EXAMPLES AND SUPPLEMENTARY INFORMATION
    ISO/IEC 19772:2009 Information technology Security techniques Authenticated encryption
    UNI EN ISO 24534-4 : 2011 AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES
    ISO/IEC 9798-6:2010 Information technology Security techniques Entity authentication Part 6: Mechanisms using manual data transfer
    ISO/IEC 26907:2009 Information technology Telecommunications and information exchange between systems High-rate ultra-wideband PHY and MAC standard
    ISO/IEC 14543-5-1:2010 Information technology Home electronic system (HES) architecture Part 5-1: Intelligent grouping and resource sharing for Class 2 and Class 3 Core protocol
    CEN ISO/TS 21719-2:2018 Electronic fee collection - Personalization of on-board equipment (OBE) - Part 2: Using dedicated short-range communication (ISO/TS 21719-2:2018)
    I.S. EN ISO 24534-4:2010&A1:2019 AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES
    ISO/IEC 11889-4:2015 Information technology Trusted Platform Module Library Part 4: Supporting Routines
    IEC 62320-2 REDLINE : 2ED 2016 MARITIME NAVIGATION AND RADIOCOMMUNICATION EQUIPMENT AND SYSTEMS - AUTOMATIC IDENTIFICATION SYSTEM (AIS) - PART 2: AIS ATON STATIONS - OPERATIONAL AND PERFORMANCE REQUIREMENTS, METHODS OF TESTING AND REQUIRED TEST RESULTS
    ISO/IEC 15444-8:2007 Information technology — JPEG 2000 image coding system: Secure JPEG 2000 — Part 8:
    IEC 62320-2:2016 Maritime navigation and radiocommunication equipment and systems - Automatic identification system (AIS) - Part 2: AIS AtoN Stations - Operational and performance requirements, methods of testing and required test results
    EN 15509:2014 Electronic fee collection - Interoperability application profile for DSRC
    EN 419212-1:2017 Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 1: Introduction and common definitions
    EN 419212-2:2017 Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 2: Signature and Seal Services
    EN 14890-1:2008 Application Interface for smart cards used as Secure Signature Creation Devices - Part 1: Basic services
    BS EN 14890-1:2008 Application interface for smart cards used as secure signature creation devices Basic services
    BS ISO/IEC 19772:2009 Information technology. Security techniques. Authenticated encryption
    BS ISO/IEC 11889-1:2009 Information technology. Trusted platform module Overview
    11/30231411 DC : 0 BS ISO 16609 - FINANCIAL SERVICES - REQUIREMENTS FOR MESSAGE AUTHENTICATION USING SYMMETRIC TECHNIQUES
    BS EN 62320-2:2017 Maritime navigation and radiocommunication equipment and systems. Automatic identification system (AIS) AIS AtoN Stations. Operational and performance requirements, methods of testing and required test results
    13/30266949 DC : 0 BS EN 61162-460 ED1.0 - MARITIME NAVIGATION AND RADIOCOMMUNICATION EQUIPMENT AND SYSTEMS - DIGITAL INTERFACE - PART 460: MULTIPLE TAKER AND MULTIPLE LISTENERS - ETHERNET INTERCONNECTION - SAFETY AND SECURITY
    14/30249464 DC : 0 BS ISO/IEC 18033-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 5: IDENTITY-BASED CIPHERS
    15/30317654 DC : 0 BS ISO/IEC 23001-7 - INFORMATION TECHNOLOGY - MPEG SYSTEMS TECHNOLOGIES - PART 7: COMMON ENCRYPTION IN ISO BASE MEDIA FILE FORMAT FILES
    04/30082429 DC : DRAFT JUL 2004 ISO/IEC 18033-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 4: STREAM CIPHERS
    14/30285138 DC : 0 BS ISO/IEC 29167-14 - INFORMATION TECHNOLOGY - AUTOMATIC IDENTIFICATION AND DATA CAPTURE TECHNIQUES - PART 14: CRYPTO SUITE AES OFB SECURITY SERVICES FOR AIR INTERFACE COMMUNICATIONS
    BS ISO/IEC 18033-2 : 2006 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS
    IEEE 802.1X-2010 IEEE Standard for Local and metropolitan area networks--Port-Based Network Access Control
    ECMA 411 : 3ED 2017 NFC-SEC-04: NFC-SEC ENTITY AUTHENTICATION AND KEY AGREEMENT USING SYMMETRIC CRYPTOGRAPHY
    INCITS/ISO/IEC 29192-4 : 2014 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES
    PD CEN/TS 16439:2013 Electronic fee collection. Security framework
    CAN/CSA-ISO/IEC 16512-2:18 Information technology — Relayed multicast protocol: Specification for simplex group applications (Adopted ISO/IEC 16512-2:2016, third edition, 2016-04-01)
    BS ISO/IEC 9798-6:2010 Information technology. Security techniques. Entity authentication Mechanisms using manual data transfer
    17/30345717 DC : 0 BS 8593 - CODE OF PRACTICE FOR THE DEPLOYMENT AND USE OF BODY WORN VIDEO (BWV)
    07/30105115 DC : 0 BS ISO/IEC 19772 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - AUTHENTICATED ENCRYPTION
    INCITS/ISO/IEC 18028-4 : 2005 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 4: SECURING REMOTE ACCESS
    CAN/CSA-ISO/IEC 11889-2:16 Information technology Trusted Platform Module Library Part 2: Structures (Adopted ISO/IEC 11889-2:2015, second edition, 2015-12-15)
    CSA ISO/IEC 10118-2 : 2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - HASH-FUNCTIONS - PART 2: HASH-FUNCTIONS USING AN N-BIT BLOCK CIPHER
    IEC 62055-41:2018 RLV Electricity metering - Payment systems - Part 41: Standard transfer specification (STS) - Application layer protocol for one-way token carrier systems
    CAN/CSA-ISO/IEC 11889-1:16 Information technology Trusted Platform Module Library Part 1: Architecture (Adopted ISO/IEC 11889-1:2015, second edition, 2015-12-15)
    S.R. CEN/TR 16968:2016 ELECTRONIC FEE COLLECTION - ASSESSMENT OF SECURITY MEASURES FOR APPLICATIONS USING DEDICATED SHORT-RANGE COMMUNICATION
    ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
    ISO/IEC 4909:2006 Identification cards Financial transaction cards Magnetic stripe data content for track 3
    ISO 16609:2012 Financial services — Requirements for message authentication using symmetric techniques
    ISO/IEC 13157-3:2016 Information technology Telecommunications and information exchange between systems NFC Security Part 3: NFC-SEC cryptography standard using ECDH-256 and AES-GCM
    ISO 9564-2:2014 Financial services — Personal Identification Number (PIN) management and security — Part 2: Approved algorithms for PIN encipherment
    ISO/IEC 24745:2011 Information technology Security techniques Biometric information protection
    IEC 62055-41 REDLINE : 3ED 2018 ELECTRICITY METERING - PAYMENT SYSTEMS - PART 41: STANDARD TRANSFER SPECIFICATION (STS) - APPLICATION LAYER PROTOCOL FOR ONE-WAY TOKEN CARRIER SYSTEMS
    ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
    EN 62320-2:2017 MARITIME NAVIGATION AND RADIOCOMMUNICATION EQUIPMENT AND SYSTEMS - AUTOMATIC IDENTIFICATION SYSTEM (AIS) - PART 2: AIS ATON STATIONS - OPERATIONAL AND PERFORMANCE REQUIREMENTS, METHODS OF TESTING AND REQUIRED TEST RESULTS (IEC 62320-2:2016)
    BS EN 15509:2014 Electronic fee collection. Interoperability application profile for DSRC
    ISO 13141:2015 Electronic fee collection — Localisation augmentation communication for autonomous systems
    CEN/TS 16439:2013 Electronic fee collection - Security framework
    EN ISO 13141:2015/A1:2017 ELECTRONIC FEE COLLECTION - LOCALISATION AUGMENTATION COMMUNICATION FOR AUTONOMOUS SYSTEMS (ISO 13141:2015/AMD 1:2017)

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 18033-1:2015 Information technology Security techniques Encryption algorithms Part 1: General
    ANSI X9.52 : 1998 TRIPLE DATA ENCRYPTION ALGORITHM MODES OF OPERATION
    ISO/IEC 9594-8:2017 Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks
    FIPS PUB 197 : 2001 ADVANCED ENCRYPTION STANDARD (AES)
    AS ISO/IEC 9797.1:2019 Information technology - Security techniques - Message Authentication Codes (MACs) Mechanisms using a block cipher
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective