• CEI EN 50159 : 2012

    Withdrawn A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

    RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS

    Available format(s):  Hardcopy, PDF

    Withdrawn date:  18-06-2020

    Language(s):  English

    Published date:  01-01-2012

    Publisher:  Comitato Elettrotecnico Italiano

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Introduction
    1 Scope
    2 Normative references
    3 Terms, definitions and abbreviations
    4 Reference architecture
    5 Threats to the transmission system
    6 Classification of transmission systems
    7 Requirements for defences
    Annex A (informative) - Threats on open transmission systems
    Annex B (informative) - Categories of transmission systems
    Annex C (informative) - Guideline for defences
    Annex D (informative) - Guidelines for use of the standard
    Annex E (informative) - Mapping from previous standards
    Annex ZZ (informative) - Coverage of Essential Requirements
             of EC Directives

    Abstract - (Show below) - (Hide below)

    Pertains to safety-related electronic systems using for digital communication purposes a transmission system which was not necessarily designed for safety-related applications and which is: - under the control of the designer and fixed during the lifetime, or - partly unknown or not fixed, however unauthorised access can be excluded, or - not under the control of the designer, and also unauthorised access has to be considered.

    General Product Information - (Show below) - (Hide below)

    Committee CT 9
    Development Note Classificazione CEI 9-127. Supersedes CEI EN 50159-1 & CEI EN 50159-2. (02/2012)
    Document Type Standard
    Publisher Comitato Elettrotecnico Italiano
    Status Withdrawn
    Superseded By
    Supersedes

    Standards Referencing This Book - (Show below) - (Hide below)

    IEC 61025:2006 Fault tree analysis (FTA)
    ISO/IEC 11770-2:2008 Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques
    ISO/IEC 10118-4:1998 Information technology Security techniques Hash-functions Part 4: Hash-functions using modular arithmetic
    ISO/IEC 9796-3:2006 Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms
    2008/57/EC : 2008 AMD 5 2014 DIRECTIVE 2008/1957/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL OF 17 JUNE 2008 ON THE INTEROPERABILITY OF THE RAIL SYSTEM WITHIN THE COMMUNITY (RECAST) (TEXT WITH EEA RELEVANCE)
    ISO/IEC 9979:1999 Information technology Security techniques Procedures for the registration of cryptographic algorithms
    FIPS PUB 197 : 2001 ADVANCED ENCRYPTION STANDARD (AES)
    UIC 738 : 2ED 1990 PROCESSING AND TRANSMISSION OF SAFETY INFORMATION
    ISO/IEC 10118-1:2016 Information technology Security techniques Hash-functions Part 1: General
    EN 50129 : 2003 COR 2010 RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY RELATED ELECTRONIC SYSTEMS FOR SIGNALLING
    EN 61025:2007 Fault tree analysis (FTA)
    ISO/IEC 9796-2:2010 Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms
    ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
    ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
    ISO/IEC 10118-2:2010 Information technology Security techniques Hash-functions Part 2: Hash-functions using an n-bit block cipher
    UIC A155 RP 4 : 1984 A SURVEY OF THE AVAILABLE MEASURES FOR THE PROTECTION OF SAFETY INFORMATION DURING TRANSMISSION
    ISO/IEC 9797-2:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function
    ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
    ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
    ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective