• BS ISO/IEC 11889-4:2009

    Current The latest, up-to-date edition.

    Information technology. Trusted platform module Commands

    Available format(s):  Hardcopy, PDF

    Language(s):  English

    Published date:  31-08-2009

    Publisher:  British Standards Institution

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Introduction
    1 Scope
    2 Normative references
    3 Terms and definitions
    4 Symbols and abbreviated terms
    5 Automation
    6 Header Files
    7 Main
    8 Command Support Functions
    9 Subsystem
    10 Support
    11 Cryptographic Functions
    Annex A (informative) - Implementation Dependent
    Annex B (informative) - Cryptographic Library Interface
    Annex C (informative) - Simulation Environment
    Annex D (informative) - Remote Procedure Interface
    Bibliography

    Abstract - (Show below) - (Hide below)

    Includes C code that describes the algorithms and methods used by the command code in ISO/IEC 11889-3.

    General Product Information - (Show below) - (Hide below)

    Committee IST/33
    Development Note 2009 Edition remains current and will be withdrawn on 01/01/2026. Supersedes 14/30302807 DC. (02/2016)
    Document Type Standard
    Publisher British Standards Institution
    Status Current
    Superseded By
    Supersedes

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 11889-1:2015 Information technology Trusted platform module library Part 1: Architecture
    ISO/IEC 15946-1:2016 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General
    ISO/IEC 14888-3:2016 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
    ISO/IEC 11889-2:2015 Information technology Trusted Platform Module Library Part 2: Structures
    ISO/IEC 11889-3:2015 Information technology Trusted Platform Module Library Part 3: Commands
    ISO/IEC 18033-3:2010 Information technology Security techniques Encryption algorithms Part 3: Block ciphers
    ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
    ISO/IEC 9797-2:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function
    ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective