ISO/IEC 10116:2017
Current
The latest, up-to-date edition.
Information technology — Security techniques — Modes of operation for an n-bit block cipher
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
English
11-07-2017
ISO/IEC 10116:2017 data during transmission or in storage). The defined modes only provide protection of data confidentiality. Protection of data integrity is not within the scope of this document. Also, most modes do not protect the confidentiality of message length information.
NOTE 1 Methods for protecting the integrity of data using a block cipher are provided in ISO/IEC 9797-1.
NOTE 2 Methods for simultaneously protecting the confidentiality and integrity of data are provided in ISO/IEC 19772.
ISO/IEC 10116:2017 specifies the modes of operation and gives recommendations for choosing values of parameters (as appropriate).
NOTE 3 The modes of operation specified in this document have been assigned object identifiers in accordance with ISO/IEC 9834. The list of assigned object identifiers is given in Annex A. In applications in which object identifiers are used, the object identifiers specified in Annex A are to be used in preference to any other object identifiers that can exist for the mode concerned.
NOTE 4 Annex B contains comments on the properties of each mode and important security guidance.
Committee |
ISO/IEC JTC 1/SC 27
|
DevelopmentNote |
NEW CHILD AMD 1 2021 IS NOW ADDED.
|
DocumentType |
Standard
|
Pages |
39
|
ProductNote |
THIS STANDARD ALSO REFERS TO NIST/SP 800-38A NEW CHILD AMD 1 2021 IS NOW ADDED.
|
PublisherName |
International Organization for Standardization
|
Status |
Current
|
Supersedes |
Standards | Relationship |
NEN ISO IEC 10116 : 2017 | Identical |
IS 15116:2018 | Identical |
AS ISO/IEC 10116:2019 | Identical |
BS ISO/IEC 10116:2017 | Identical |
INCITS/ISO/IEC 10116:2017(R2023) | Identical |
CAN/CSA-ISO/IEC 10116:18 | Identical |
BIS IS 15116 : 2012 | Identical |
SAC GB/T 17964 : 2000 | Identical |
INCITS/ISO/IEC 10116 : 2008 | Identical |
GOST R ISO/IEC TR 10116 : 1993 | Identical |
CSA ISO/IEC 18033-2 :2006 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
BS ISO/IEC 11770-5:2011 | Information technology Security techniques. Key management Group key management |
03/648634 DC : 0 | ISO/IEC 7816-4.2:2002 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS - PART 4: ORGANIZATION, SECURITY AND COMMANDS FOR INTERCHANGE |
10/30135070 DC : DRAFT NOV 2010 | BS ISO/IEC 9797-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 3: MECHANISMS USING A UNIVERSAL HASH FUNCTION |
11/30231373 DC : 0 | BS ISO 11568-2 - FINANCIAL SERVICES - KEY MANAGEMENT (RETAIL) - PART 2: SYMMETRIC CIPHERS, THEIR KEY MANAGEMENT AND LIFE CYCLE |
ISO/IEC 13157-2:2016 | Information technology — Telecommunications and information exchange between systems — NFC Security — Part 2: NFC-SEC cryptography standard using ECDH and AES |
CAN/CSA-ISO/IEC 10181-2-00 (R2013) | Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework (Adopted ISO/IEC 10181-2:1996, first edition, 1996-05-15) |
INCITS/ISO/IEC 24727-2 : 2009(R2014) | IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 2: GENERIC CARD INTERFACE |
ETR 232 : 20001 | SECURITY TECHNIQUES ADVISORY GROUP (STAG); GLOSSARY OF SECURITY TERMINOLOGY |
CSA ISO/IEC 9797 : 0 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DATA INTEGRITY MECHANISM USING A CRYPTOGRAPHIC CHECK FUNCTION EMPLOYING A BLOCK CIPHER ALGORITHM |
16/30304626 DC : 0 | BS ISO 20038 - BANKING AND RELATED FINANCIAL SERVICES - KEY WRAP |
12/30266972 DC : 0 | BS ISO/IEC 24727-1 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 1: ARCHITECTURE |
CSA ISO/IEC 18033-1 : 2006 : INC : AMD 1 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL |
CSA ISO/IEC 9798-2:2010 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
14/30250091 DC : 0 | BS ISO/IEC 18033-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL |
ISO/IEC 9797-3:2011 | Information technology — Security techniques — Message Authentication Codes (MACs) — Part 3: Mechanisms using a universal hash-function |
BS EN ISO/IEC 7816/4 : 1996 | INFORMATION TECHNOLOGY - IDENTIFICATION CARDS - INTEGRATED CIRCUIT(S) CARDS WITH CONTACTS - INTERINDUSTRY COMMANDS FOR INTERCHANGE |
BS ISO 9735-10:2014 | Electronic data interchange for administration, commerce and transport (EDIFACT). Application level syntax rules (Syntax version number: 4, Syntax release number: 2) Syntax service directories |
CSA ISO/IEC 9798-2 : 2010 : R2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
DIN ISO 9735-10:2015-05 | ELECTRONIC DATA INTERCHANGE FOR ADMINISTRATION, COMMERCE AND TRANSPORT (EDIFACT) - APPLICATION LEVEL SYNTAX RULES (SYNTAX VERSION NUMBER: 4, SYNTAX RELEASE NUMBER: 2) - PART 10: SYNTAX SERVICE DIRECTORIES (ISO 9735-10:2014) |
CAN/CSA-ISO/IEC 18033-2:06 (R2016) | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
BS ISO/IEC 18033-4 : 2005 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 4: STREAM CIPHERS |
CSA ISO/IEC 11770-2 : 2009 : INC : COR 1 : 2010 : R2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 2: MECHANISMS USING SYMMETRIC TECHNIQUES |
I.S. EN 62734:2015 | INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A |
BS ISO/IEC 24727-3 : 2008 | IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 3: APPLICATION INTERFACE |
ISO/IEC 18033-2:2006 | Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers |
ECMA 386 : 3ED 2015 | NFC-SEC-01: NFC-SEC CRYPTOGRAPHY STANDARD USING ECDH AND AES |
ISO/IEC 25185-1:2016 | Identification cards Integrated circuit card authentication protocols Part 1: Protocol for Lightweight Authentication of Identity |
BIS IS 15256-4 : 2013 | BANKING - KEY MANAGEMENT (RETAIL) - PART 4: ASYMMETRIC CRYPTOSYSTEMS - KEY MANAGEMENT AND LIFE CYCLE |
14/30249803 DC : 0 | BS ISO/IEC 27040 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
CEN/TS 14821-1:2003 | Traffic and Travel Information (TTI) - TTI messages via cellular networks - Part 1: General specifications |
CEN/TS 14821-5:2003 | Traffic and Travel Information (TTI) - TTI messages via cellular networks - Part 5: Internal services |
CEN/TS 14821-8:2003 | Traffic and Travel Information (TTI) - TTI messages via cellular networks - Part 8: GSM-specific parameters |
CEN/TS 14821-4:2003 | Traffic and Travel information (TTI) - TTI messages via cellular networks - Part 4: Service-independent protocols |
EN 62734:2015 | Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
CEN/TS 14821-6:2003 | Traffic and Travel Information (TTI) - TTI messages via cellular networks - Part 6: External services |
ISO/IEC 11770-5:2011 | Information technology Security techniques Key management Part 5: Group key management |
09/30202174 DC : 0 | BS EN 50159 - RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
08/30192697 DC : 0 | BS ISO/IEC 9797-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 1: MECHANISMS USING A BLOCK CIPHER |
ISO/IEC 7816-4:2013 | Identification cards Integrated circuit cards Part 4: Organization, security and commands for interchange |
10/30228327 DC : 0 | BS ISO/IEC 18031 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
BS ISO/IEC 10181-2:1996 | Information technology. Open systems interconnection. Security frameworks for open systems Authentication framework |
BS EN ISO 11568-2:1996 | Banking. Key management (retail) Key management techniques for symmetric ciphers |
BS ISO 9564-2:2014 | Financial services. Personal Identification Number (PIN) management and security Approved algorithms for PIN encipherment |
ISO/TS 21719-2:2018 | Electronic fee collection — Personalization of on-board equipment (OBE) — Part 2: Using dedicated short-range communication |
ISO/IEC 9798-2:2008 | Information technology Security techniques Entity authentication Part 2: Mechanisms using symmetric encipherment algorithms |
11/30228418 DC : DRAFT JUNE 2011 | BS ISO/IEC 29192-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 3: STREAM CIPHERS |
DD CEN/TS 14821-2:2003 | Traffic and Travel Information (TTI). TTI messages via cellular networks Numbering and ADP message header |
PD ISO/TR 14742:2010 | Financial services. Recommendations on cryptographic algorithms and their use |
BS ISO/IEC 18367:2016 | Information technology. Security techniques. Cryptographic algorithms and security mechanisms conformance testing |
02/652661 DC : DRAFT NOV 2002 | ISO/IEC FCD 18033-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL |
INCITS/ISO/IEC 9798-2 : 2010 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
CSA ISO/IEC 9798-2 : 2010 : INC : COR 2 : 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
INCITS/ISO/IEC 18033-2 : 2008 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
IEC TS 62351-2:2008 | Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms |
ISO/IEC 24767-1:2008 | Information technology Home network security Part 1: Security requirements |
BS ISO/IEC 18031 : 2011 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
INCITS/ISO/IEC 9797 : 1994 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DATA INTEGRITY MECHANISM USING A CRYPTOGRAPHIC CHECK FUNCTION EMPLOYING A BLOCK CIPHER ALGORITHM |
ETR 237 : 20001 | SECURITY TECHNIQUES ADVISORY GROUP (STAG) - BASELINE SECURITY STANDARDS - FEATURES AND MECHANISMS |
BS ISO/IEC 24727-2 : 2008 | IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 2: GENERIC CARD INTERFACE |
PREN 50159 : DRAFT 2009 | RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
DIN EN ISO/IEC 27040:2016-04 (Draft) | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015) |
ISO/IEC 11889-1:2015 | Information technology — Trusted platform module library — Part 1: Architecture |
ISO/IEC 18367:2016 | Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing |
ISO/IEC 11889-2:2015 | Information technology — Trusted Platform Module Library — Part 2: Structures |
ISO 11568-2:2012 | Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle |
I.S. EN ISO/IEC 7816-4:1998 | INFORMATION TECHNOLOGY - IDENTIFICATION CARDS - INTEGRATED CIRCUIT(S) CARDS WITH CONTACTS - PART 4: INTERINDUSTRY COMMANDS FOR INTERCHANGE |
04/30040717 DC : DRAFT JUL 2004 | ISO/IEC 18033-2 - INFORMATION TECHNOLOGY - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
BS EN 50159-2:2001 | Railway applications. Communication, signalling and processing systems Safety related communication in open transmission systems |
TS 123 048 : 5.9.0 | DIGITAL CELLULAR TELECOMMUNICATIONS SYSTEM (PHASE 2+); UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); SECURITY MECHANISMS FOR THE (U)SIM APPLICATION TOOLKIT; STAGE 2 |
BS ISO/IEC 29192-2:2012 | Information technology. Security techniques. Lightweight cryptography Block ciphers |
DD CEN/TS 14821-7:2003 | Traffic and Travel Information (TTI). TTI messages via cellular networks Performance requirements for onboard positioning |
BS ISO/IEC 9798-2:2008 | Information technology. Security techniques. Entity authentication Mechanisms using symmetric encipherment algorithms |
BS ISO/IEC 24745:2011 | Information technology. Security techniques. Biometric information protection |
BS EN 50159:2010 | Railway applications. Communication, signalling and processing systems. Safety-related communication in transmission systems |
07/30163724 DC : 0 | BS ISO/IEC 24727-4 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS PROGRAMMING INTERFACE - PART 4: API ADMINISTRATION |
BS ISO 11568-4:2007 | Banking. Key management (retail) Asymmetric cryptosystems. Key management and life cycle |
BS ISO 15668:1999 | Banking. Secure file transfer (retail) |
BS ISO/IEC 9797-1:2011 | Information technology. Security techniques. Message authentication codes (MACs) Mechanisms using a block cipher |
18/30354751 DC : DRAFT FEB 2018 | BS ISO/IEC 18033-6 - INFORMATION TECHNOLOGY SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 6: HOMOMORPHIC ENCRYPTION |
14/30302807 DC : 0 | BS ISO/IEC 11889-4 - INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 4: SUPPORTING ROUTINES |
04/30040736 DC : DRAFT DEC 2004 | ISO/IEC 18031 - INFORMATION TECHNOLOGY - RANDOM NUMBER GENERATION |
BS ISO/IEC 25185-1:2016 | Identification cards. Integrated circuit card authentication protocols Protocol for Lightweight Authentication of Identity |
07/30161079 DC : 0 | BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
03/648302 DC : DRAFT JAN 2003 | BS ISO/IEC 7816-4 - INFORMATION TECHNOLOGY - IDENTIFICATION CARDS - INTEGRATED CIRCUIT(S) CARDS WITH CONTACTS - PART 4: INTERINDUSTRY COMMANDS FOR INTERCHANGE |
BS ISO/IEC 29150:2011 | Information technology. Security techniques. Signcryption |
DD CEN/TS 14821-3:2003 | Traffic and Travel Information (TTI). TTI messages via cellular networks Basic information elements |
07/30167508 DC : 0 | BS ISO/IEC 11770-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 2 - MECHANISMS USING SYMMETRIC TECHNIQUES |
CAN/CSA-ISO/IEC 9797-1:12 (R2016) | Information technology - Security techniques - Message authentication codes (MACs) - Part 1: Mechanisms using a block cipher (Adopted ISO/IEC 9797-1:2011, second edition, 2011-03-01) |
INCITS/ISO/IEC 24727-1 : 2008 | IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 1: ARCHITECTURE |
CSA ISO/IEC 18033-4 : 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 4: STREAM CIPHERS |
BS EN 62734:2015 | Industrial networks. Wireless communication network and communication profiles. ISA 100.11a |
CAN/CSA-ISO/IEC 18031:13 (R2017) | Information technology - Security techniques - Random bit generation (Adopted ISO/IEC 18031:2011, second edition, 2011-11-15) |
ISO/IEC/IEEE 8802-15-6:2017 | Information technology — Telecommunications and information exchange between systems — Local and metropolitan area networks — Specific requirements — Part 15-6: Wireless body area network |
CSA ISO/IEC 18031 : 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
INCITS/ISO/IEC 11770-5 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 5: GROUP KEY MANAGEMENT |
ISO 15764:2004 | Road vehicles Extended data link security |
BS ISO/IEC 24727-4 : 2008 | IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 4: APPLICATION PROGRAMMING INTERFACE (API) ADMINISTRATION |
I.S. EN 50159:2010 | RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
ISO/IEC 18031:2011 | Information technology Security techniques Random bit generation |
ISO/IEC 29192-2:2012 | Information technology Security techniques Lightweight cryptography Part 2: Block ciphers |
ISO 20038:2017 | Banking and related financial services — Key wrap using AES |
CAN/CSA-ISO/IEC 11889-4:16 | Information technology Trusted Platform Module Library Part 4: Supporting Routines (Adopted ISO/IEC 11889-4:2015, second edition, 2015-12-15) |
ETR 235 : 20001 | SECURITY TECHNIQUES ADVISORY GROUP (STAG); REQUIREMENTS SPECIFICATION FOR AN ENCRYPTION ALGORITHM FOR OPERATORS OF EUROPEAN PUBLIC TELECOMMUNICATIONS NETWORKS |
ISO/IEC 24727-2:2008 | Identification cards Integrated circuit card programming interfaces Part 2: Generic card interface |
ISO/IEC 18033-4:2011 | Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers |
ISO/TR 14742:2010 | Financial services Recommendations on cryptographic algorithms and their use |
ISO/IEC 24727-4:2008 | Identification cards Integrated circuit card programming interfaces Part 4: Application programming interface (API) administration |
ISO/TR 19038:2005 | Banking and related financial services Triple DEA Modes of operation Implementation guidelines |
UNE-EN 50159:2011 | Railway applications - Communication, signalling and processing systems - Safety-related communication in transmission systems |
IEC 62734:2014 | Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
CEI EN 50159 : 2012 | RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
DIN 6789-100:1997-06 (Draft) | SYSTEMATIC ARRANGEMENT OF DOCUMENTS - PART 100: BASIC CONVENTIONS FOR CALS |
07/30154069 DC : 0 | BS ISO/IEC 24727-3 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 3: APPLICATION INTERFACE |
BS ISO 11568-2:2012 | Financial services. Key management (retail) Symmetric ciphers, their key management and life cycle |
14/30302798 DC : 0 | BS ISO/IEC 11889-1 - INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 1: ARCHITECTURE |
BS ISO/IEC 11889-4:2009 | Information technology. Trusted platform module Commands |
10/30136309 DC : 0 | BS ISO/IEC 24745 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BIOMETRIC INFORMATION PROTECTION |
03/304651 DC : 0 | ISO 16844-3 - ROAD VEHICLES - TACHOGRAPH SYSTEMS - PART 3: MOTION SENSOR INTERFACE |
ISO 15668:1999 | Banking Secure file transfer (retail) |
BS ISO/IEC 11889-2:2009 | Information technology. Trusted platform module Design principles |
15/30279582 DC : 0 | BS ISO/IEC 18367 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC ALGORITHMS AND SECURITY MECHANISMS CONFORMANCE TESTING |
18/30362144 DC : 0 | BS ISO/IEC 11770-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 2: MECHANISMS USING SYMMETRIC TECHNIQUES |
INCITS/ISO/IEC 18031 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
14/30302801 DC : 0 | BS ISO/IEC 11889-2 - INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 2: STRUCTURES |
BS ISO 20038:2017 | Banking and related financial services. Key wrap using AES |
DD CEN/TS 14821-1:2003 | Traffic and Travel Information (TTI). TTI messages via cellular networks General specifications |
ANSI INCITS 410 : 2015 | INFORMATION TECHNOLOGY - IDENTIFICATION CARDS - LIMITED USE (LU), PROXIMITY INTEGRATED CIRCUIT CARD (PICC) |
BS ISO/IEC 9797-3:2011 | Information technology. Security techniques. Message Authentication Codes (MACs) Mechanisms using a universal hash-function |
DD CEN/TS 14821-4:2003 | Traffic and Travel Information (TTI). TTI messages via cellular networks Service-independent protocols |
DD IEC/TS 62351-2:2008 | Power systems management and associated information exchange. Data and communications security Glossary of terms |
CSA ISO/IEC 9797-1:2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 1: MECHANISMS USING A BLOCK CIPHER |
BS ISO/IEC 11770-2:2008 | Information technology. Security techniques. Key management Mechanisms using symmetric techniques |
DD CEN/TS 14821-6:2003 | Traffic and Travel Information (TTI). TTI messages via cellular networks External services |
INCITS/ISO/IEC 24727-4 : 2009(R2014) | IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 4: APPLICATION PROGRAMMING INTERFACE (API) ADMINISTRATION |
CAN/CSA-ISO/IEC 18033-4:13 (R2017) | Information technology - Security techniques - Encryption algorithms - Part 4: Stream ciphers (Adopted ISO/IEC 18033-4:2011, second edition, 2011-12-15) |
INCITS/ISO/IEC 18033-4 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 4: STREAM CIPHERS |
ISO/IEC 19772:2009 | Information technology Security techniques Authenticated encryption |
I.S. CWA 14890-2:2004 | APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 2: ADDITIONAL SERVICES |
ISO/IEC 29150:2011 | Information technology — Security techniques — Signcryption |
ISO 9735-5:2002 | Electronic data interchange for administration, commerce and transport (EDIFACT) — Application level syntax rules (Syntax version number: 4, Syntax release number: 1) — Part 5: Security rules for batch EDI (authenticity, integrity and non-repudiation of origin) |
CEN ISO/TS 21719-2:2018 | Electronic fee collection - Personalization of on-board equipment (OBE) - Part 2: Using dedicated short-range communication (ISO/TS 21719-2:2018) |
ISO/IEC 24727-1:2014 | Identification cards Integrated circuit card programming interfaces Part 1: Architecture |
ISO/IEC 18033-1:2015 | Information technology Security techniques Encryption algorithms Part 1: General |
ISO/IEC 24727-3:2008 | Identification cards Integrated circuit card programming interfaces Part 3: Application interface |
I.S. EN ISO 11568-2:1997 | BANKING - KEY MANAGEMENT (RETAIL) - PART 2: KEY MANAGEMENT TECHNIQUES FOR SYMMETRIC CIPHERS |
IEC 62280:2014 | Railway applications - Communication, signalling and processing systems - Safety related communication in transmission systems |
EN 50159:2010 | Railway applications - Communication, signalling and processing systems - Safety-related communication in transmission systems |
BS ISO/IEC 27040 : 2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
BS EN ISO/IEC 27040:2016 | Information technology. Security techniques. Storage security |
ISO/IEC 27040:2015 | Information technology — Security techniques — Storage security |
CEN/TS 14821-3:2003 | Traffic and Travel Information (TTI) - TTI messages via cellular networks - Part 3: Basic information elements |
EN ISO 11568-2 : 1996 | BANKING - KEY MANAGEMENT (RETAIL) - PART 2: KEY MANAGEMENT TECHNIQUES FOR SYMMETRIC CIPHERS |
EN ISO/IEC 7816-4 : 1996 | INFORMATION TECHNOLOGY - IDENTIFICATION CARDS - INTEGRATED CIRCUIT(S) CARDS WITH CONTACTS - PART 4: INTERINDUSTRY COMMANDS FOR INTERCHANGE |
EN ISO/IEC 27040:2016 | Information technology - Security techniques - Storage security (ISO/IEC 27040:2015) |
ISO/IEC 11770-2:2008 | Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques |
BS ISO 9735-5:2002 | Electronic data interchange for administration, commerce and transport (EDIFACT). Application level syntax rules Security rules for batch EDI (authenticity, integrity and non-repudiation of origin) |
CSA ISO/IEC 7816-4 : 2015 | IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS - PART 4: ORGANIZATION, SECURITY AND COMMANDS FOR INTERCHANGE |
BS ISO/IEC 19772:2009 | Information technology. Security techniques. Authenticated encryption |
BS ISO/IEC 9797:1994 | Information technology. Security techniques. Data integrity mechanism using a cryptographic check function employing a block cipher algorithm |
BS ISO/IEC 11889-1:2009 | Information technology. Trusted platform module Overview |
INCITS/ISO/IEC 18033-1 : 2005 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL |
INCITS/ISO/IEC 24745 : 2012(R2017) | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BIOMETRIC INFORMATION PROTECTION |
BS ISO/IEC 24727-1:2014 | Identification cards. Integrated circuit card programming interfaces Architecture |
10/30228415 DC : DRAFT NOV 2010 | BS ISO/IEC 29192-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 2: BLOCK CIPHERS |
INCITS/ISO/IEC 24727-3 : 2009(R2014) | IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 3: APPLICATION INTERFACE |
BS ISO/IEC 18033-1:2015 | Information technology. Security techniques. Encryption algorithms General |
11/30237119 DC : 0 | BS ISO/IEC 7816-4 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS - PART 4: ORGANIZATION, SECURITY AND COMMANDS FOR INTERCHANGE |
04/30082429 DC : DRAFT JUL 2004 | ISO/IEC 18033-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 4: STREAM CIPHERS |
BS ISO/IEC 18033-2 : 2006 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
INCITS/ISO/IEC 27040 : 2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
DD CEN/TS 14821-5:2003 | Traffic and Travel Information (TTI). TTI messages via cellular networks Internal services |
05/30112566 DC : DRAFT JAN 2005 | ISO 11568-4 - BANKING - KEY MANAGEMENT (RETAIL) - PART 4: ASYMMETRIC CRYPTOSYSTEMS - KEY MANAGEMENT AND LIFE CYCLE |
07/30105115 DC : 0 | BS ISO/IEC 19772 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - AUTHENTICATED ENCRYPTION |
DD CEN/TS 14821-8:2003 | Traffic and Travel Information (TTI). TTI messages via cellular networks GSM-specific parameters |
CSA ISO/IEC 11770-2 : 2009 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 2: MECHANISMS USING SYMMETRIC TECHNIQUES |
CAN/CSA-ISO/IEC 11889-2:16 | Information technology Trusted Platform Module Library Part 2: Structures (Adopted ISO/IEC 11889-2:2015, second edition, 2015-12-15) |
TS 101 181 : 8.9.0 | DIGITAL CELLULAR TELECOMMUNICATIONS SYSTEM (PHASE 2+); SECURITY MECHANISMS FOR SIM APPLICATION TOOLKIT; STAGE 2 |
CSA ISO/IEC 18033-1 : 2006 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL |
CSA ISO/IEC 18033-1 : 2006 : INC : AMD 1 : 2012 : R2016 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL |
BS ISO/IEC 7816-4 : 2013 | IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS - PART 4: ORGANIZATION, SECURITY AND COMMANDS FOR INTERCHANGE |
TS 143 048 : 4.0.0 | DIGITAL CELLULAR TELECOMMUNICATIONS SYSTEM (PHASE 2+); SECURITY MECHANISMS FOR THE SIM APPLICATION TOOLKIT; STAGE 2 |
ISO/IEC 10181-2:1996 | Information technology Open Systems Interconnection Security frameworks for open systems: Authentication framework |
I.S. EN 50159-2:2001 | RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - PART 2: SAFETY RELATED COMMUNICATION IN OPEN TRANSMISSION SYSTEMS |
ISO 16844-3:2004 | Road vehicles Tachograph systems Part 3: Motion sensor interface |
CAN/CSA-ISO/IEC 11889-1:16 | Information technology Trusted Platform Module Library Part 1: Architecture (Adopted ISO/IEC 11889-1:2015, second edition, 2015-12-15) |
ISO/IEC 24767-2:2009 | Information technology Home network security Part 2: Internal security services: Secure Communication Protocol for Middleware (SCPM) |
I.S. EN ISO/IEC 27040:2016 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015) |
S.R. CEN ISO/TS 21719-2:2018 | ELECTRONIC FEE COLLECTION - PERSONALIZATION OF ON-BOARD EQUIPMENT (OBE) - PART 2: USING DEDICATED SHORT-RANGE COMMUNICATION (ISO/TS 21719-2:2018) |
ISO 9735-10:2014 | Electronic data interchange for administration, commerce and transport (EDIFACT) — Application level syntax rules (Syntax version number: 4, Syntax release number: 2) — Part 10: Syntax service directories |
ISO 9564-2:2014 | Financial services — Personal Identification Number (PIN) management and security — Part 2: Approved algorithms for PIN encipherment |
ISO 11568-4:2007 | Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle |
ISO/IEC 24745:2011 | Information technology Security techniques Biometric information protection |
ISO/IEC 9797-1:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher |
ISO/IEC 11889-4:2015 | Information technology Trusted Platform Module Library Part 4: Supporting Routines |
DIN ISO 9735-5:2004-01 | Electronic data interchange for administration, commerce and transport (EDIFACT) - Application level syntax rules (Syntax version number: 4, Syntax release number: 1) - Part 5: Security rules for batch EDI (authenticity, integrity and non-repudiation of origin) (ISO 9735-5:2002) |
CEN/TS 14821-2:2003 | Traffic and Travel Information (TTI) - TTI messages via cellular networks - Part 2: Numbering and ADP messsage header |
CEN/TS 14821-7:2003 | Traffic and Travel Information (TTI) - TTI messages via cellular networks - Part 7: Performance requirements for onboard positioning |
EN 50159-2 : 2001 COR 2010 | RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - PART 2: SAFETY RELATED COMMUNICATION IN OPEN TRANSMISSION SYSTEMS |
CAN/CSA-ISO/IEC 25185-1:18 | Identification cards — Integrated circuit card authentication protocols — Part 1: Protocol for Lightweight Authentication of Identity (Adopted ISO/IEC 25185-1:2016, first edition, 2016-01-15) |
CAN/CSA-ISO/IEC 18367:18 | Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing (Adopted ISO/IEC 18367:2016, first edition, 2016-12-15) |
ISO/IEC 18031:2011 | Information technology Security techniques Random bit generation |
ISO/IEC 19772:2009 | Information technology Security techniques Authenticated encryption |
ISO/IEC 18033-1:2015 | Information technology Security techniques Encryption algorithms Part 1: General |
ISO/IEC 29192-2:2012 | Information technology Security techniques Lightweight cryptography Part 2: Block ciphers |
ISO/IEC 18033-3:2010 | Information technology Security techniques Encryption algorithms Part 3: Block ciphers |
ISO/IEC 10118-1:2016 | Information technology Security techniques Hash-functions Part 1: General |
ISO/IEC 9797-1:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.