EG 200 234 : 1.2.2
Current
The latest, up-to-date edition.
TELECOMMUNICATIONS SECURITY; A GUIDE TO SPECIFYING REQUIREMENTS FOR CRYPTOGRAPHIC ALGORITHMS
Hardcopy , PDF
English
Intellectual property rights
Foreword
1. Scope
2. References
3. Definitions
4. Abbreviations
5. Procedures for the provision of cryptographic algorithms
for ETSI deliverables
5.1 Identification of needs
5.2 Formal requirements specification
5.3 Decision on source of the algorithm
5.4 Design and specification of management procedures
5.5 Algorithm distribution and maintenance
6. Algorithm requirements specification
Annex A (informative): Example algorithm requirements
specification
History
Defines the procedure which should be followed when a cryptographic algorithm is needed for ETSI Standards (ES), European Standards (EN) or ETSI Guides (EG). Also provides guidelines for the formal specification of requirements when an algorithm has to be specially developed for use within an ETSI standard.
Committee |
SEC
|
DocumentType |
Standard
|
Pages |
18
|
PublisherName |
European Telecommunications Standards Institute
|
Status |
Current
|
Standards | Relationship |
UNE-EG 200234 V1.2.2:2001 | Identical |
TR 102 780 : 1.1.1 | METHODS FOR TESTING AND SPECIFICATION (MTS); SECURITY; GUIDE TO THE USE OF METHODS IN DEVELOPMENT OF ETSI SECURITY STANDARDS |
ETR 232 : 20001 | SECURITY TECHNIQUES ADVISORY GROUP (STAG); GLOSSARY OF SECURITY TERMINOLOGY |
ANSI INCITS 92 : 1981 | DATA ENCRYPTION ALGORITHM |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.