• Shopping Cart
    There are no items in your cart

BS ISO/IEC 11889-1:2009

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by

Information technology. Trusted platform module Overview

Available format(s)

Hardcopy , PDF

Superseded date

25-07-2018

Superseded by

BS ISO/IEC 11889-1:2015

Language(s)

English

Published date

31-01-2010

€231.38
Excluding VAT

1 Scope
2 Abbreviated Terms
3 The Trusted Platform
4 The TPM

Describes the Trusted Platform Module (TPM), a device that enables trust in computing platforms in general.

Committee
IST/33
DevelopmentNote
2009 Edition remains active. Supersedes 14/30302798 DC. (04/2016)
DocumentType
Standard
Pages
24
PublisherName
British Standards Institution
Status
Superseded
SupersededBy
Supersedes

ISO/IEC11889 defines the Trusted Platform Module (TPM), a device that enables trust in computing platforms in general. ISO/IEC11889 is broken into parts to make the role of each document clear. Any version of the standard requires all parts to be a complete standard.

A TPM designer MUST be aware that for a complete definition of all requirements necessary to build a TPM, the designer MUST use the appropriate platform specific specification for all TPM requirements.

Part1 provides an overview of the concepts behind the TPM and trusted platforms.

Standards Relationship
ISO/IEC 11889-1:2015 Identical
ISO/IEC 11889-1:2009 Identical

ISO/IEC 15946-1:2016 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General
ISO/IEC 14888-3:2016 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
ISO/IEC 11889-2:2015 Information technology — Trusted Platform Module Library — Part 2: Structures
ISO/IEC 11889-3:2015 Information technology — Trusted Platform Module Library — Part 3: Commands
ISO/IEC 18033-3:2010 Information technology Security techniques Encryption algorithms Part 3: Block ciphers
FIPS PUB 140-2 : 0 SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES
ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
ISO/IEC 15946-5:2017 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 5: Elliptic curve generation
ISO/IEC 9797-2:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function
ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
ISO/IEC 11889-4:2015 Information technology — Trusted Platform Module Library — Part 4: Supporting Routines
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.