• Shopping Cart
    There are no items in your cart

ISO/IEC 18031:2011

Current

Current

The latest, up-to-date edition.

Information technology Security techniques Random bit generation

Available format(s)

Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users

Published date

08-11-2011

€206.00
Excluding VAT

ISO/IEC 18031:2011 specifies a conceptual model for a random bit generator for cryptographic purposes, together with the elements of this model.

ISO/IEC 18031:2011

  • specifies the characteristics of the main elements required for a non-deterministic random bit generator,
  • specifies the characteristics of the main elements required for a deterministic random bit generator,
  • establishes the security requirements for both the non-deterministic and the deterministic random bit generator.

Where there is a requirement to produce sequences of random numbers from random bit strings, ISO/IEC 18031:2011 gives guidelines on how this can be performed.

Techniques for statistical testing of random bit generators for the purposes of independent verification or validation, and detailed designs for such generators, are outside the scope of ISO/IEC 18031:2011.

DocumentType
Standard
Pages
142
PublisherName
International Organization for Standardization
Status
Current
Supersedes

10/30135070 DC : DRAFT NOV 2010 BS ISO/IEC 9797-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 3: MECHANISMS USING A UNIVERSAL HASH FUNCTION
13/30257954 DC : 0 BS ISO/IEC 11770-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES
11/30231373 DC : 0 BS ISO 11568-2 - FINANCIAL SERVICES - KEY MANAGEMENT (RETAIL) - PART 2: SYMMETRIC CIPHERS, THEIR KEY MANAGEMENT AND LIFE CYCLE
BS ISO/IEC 14888-2:2008 Information technology. Security techniques. Digital signatures with appendix Integer factorization based mechanisms
ISO/IEC 13157-2:2016 Information technology — Telecommunications and information exchange between systems — NFC Security — Part 2: NFC-SEC cryptography standard using ECDH and AES
14/30249464 DC : 0 BS ISO/IEC 18033-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 5: IDENTITY-BASED CIPHERS
ISO/IEC 9798-2:2008 Information technology Security techniques Entity authentication Part 2: Mechanisms using symmetric encipherment algorithms
TS 103 532 : 1.1.1 CYBER; ATTRIBUTE BASED ENCRYPTION FOR ATTRIBUTE BASED ACCESS CONTROL
CSA ISO/IEC 9798-2:2010 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS
09/30204721 DC : 0 BS ISO/IEC 9798-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 1: GENERAL
BS ISO/IEC 9798-1:2010 Information technology. Security techniques. Entity authentication General
INCITS/ISO/IEC 11770-4 : 2008 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS
CSA ISO/IEC 9798-2 : 2010 : R2015 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS
CSA ISO/IEC 11770-1 : 2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 1: FRAMEWORK
CAN/CSA-ISO/IEC 18033-2:06 (R2016) INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS
CSA ISO/IEC 11770-2 : 2009 : INC : COR 1 : 2010 : R2014 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 2: MECHANISMS USING SYMMETRIC TECHNIQUES
BS ISO/IEC 18033-2 : 2006 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS
I.S. EN 62734:2015 INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A
ISO/IEC 18033-2:2006 Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
ECMA 386 : 3ED 2015 NFC-SEC-01: NFC-SEC CRYPTOGRAPHY STANDARD USING ECDH AND AES
CEN/TS 16702-2:2015 Electronic fee collection - Secure monitoring for autonomous toll systems - Part 2: Trusted recorder
CEN ISO/TS 19299:2015 Electronic fee collection - Security framework (ISO/TS 19299:2015)
EN 62734:2015 Industrial networks - Wireless communication network and communication profiles - ISA 100.11a
ISO 11568-2:2012 Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle
ISO/IEC 11770-5:2011 Information technology Security techniques Key management Part 5: Group key management
ISO 13491-2:2017 Financial services — Secure cryptographic devices (retail) — Part 2: Security compliance checklists for devices used in financial transactions
CSA ISO/IEC 18033-2 :2006 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS
BS ISO/IEC 9798-2:2008 Information technology. Security techniques. Entity authentication Mechanisms using symmetric encipherment algorithms
BS ISO/IEC 24713-2:2008 Information technology. Biometric profiles for interoperability and data interchange Physical access control for employees at airports
15/30293352 DC : 0 BS ISO/IEC 11770-6 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 6: KEY DERIVATION
S.R. CEN/TS 16702-2:2015 ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 2: TRUSTED RECORDER
BS ISO/IEC 11770-6:2016 Information technology. Security techniques. Key management Key derivation
ISO/IEC 9797-3:2011 Information technology — Security techniques — Message Authentication Codes (MACs) — Part 3: Mechanisms using a universal hash-function
09/30204756 DC : 0 BS ISO/IEC 11770-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 1: FRAMEWORK
ISO/IEC 11770-4:2017 Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets
PD ISO/TS 12812-2:2017 Core banking. Mobile financial services Security and data protection for mobile financial services
BS ISO/IEC 19790:2012 Information technology. Security techniques. Security requirements for cryptographic modules
PD ISO/TR 14742:2010 Financial services. Recommendations on cryptographic algorithms and their use
S.R. CEN/TS 16439:2013 ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK
BS ISO/IEC 18367:2016 Information technology. Security techniques. Cryptographic algorithms and security mechanisms conformance testing
GS NFV-SEC 012 : 3.1.1 NETWORK FUNCTIONS VIRTUALISATION (NFV) RELEASE 3; SECURITY; SYSTEM ARCHITECTURE SPECIFICATION FOR EXECUTION OF SENSITIVE NFV COMPONENTS
ECMA 410 : 3ED 2017 NFC-SEC-03: NFC-SEC ENTITY AUTHENTICATION AND KEY AGREEMENT USING ASYMMETRIC CRYPTOGRAPHY
BS ISO 13491-2:2017 Financial services. Secure cryptographic devices (retail) Security compliance checklists for devices used in financial transactions
INCITS/ISO/IEC 9798-2 : 2010 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS
CSA ISO/IEC 9798-2 : 2010 : INC : COR 2 : 2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS
INCITS/ISO/IEC 18033-2 : 2008 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS
CSA ISO/IEC 14888-2 : 2009 : R2014 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 2: INTEGER FACTORIZATION BASED MECHANISMS
ISO/IEC 19790:2012 Information technology — Security techniques — Security requirements for cryptographic modules
BS ISO 9564-1:2017 Financial services. Personal Identification Number (PIN) management and security Basic principles and requirements for PINs in card-based systems
ISO/TS 12812-2:2017 Core banking — Mobile financial services — Part 2: Security and data protection for mobile financial services
ISO/IEC 18370-2:2016 Information technology Security techniques Blind digital signatures Part 2: Discrete logarithm based mechanisms
ISO/IEC 18367:2016 Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing
ISO 19092:2008 Financial services — Biometrics — Security framework
04/30040717 DC : DRAFT JUL 2004 ISO/IEC 18033-2 - INFORMATION TECHNOLOGY - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS
PD CEN/TS 16702-2:2015 Electronic fee collection. Secure monitoring for autonomous toll systems Trusted recorder
16/30266969 DC : 0 BS ISO/IEC 17922 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TELEBIOMETRIC AUTHENTICATION FRAMEWORK USING BIOMETRIC HARDWARE SECURITY MODULE
12/30228421 DC : 0 BS ISO/IEC 29192-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES
15/30281583 DC : 0 BS ISO 12812-2 - CORE BANKING - MOBILE FINANCIAL SERVICES - PART 2: SECURITY AND DATA PROTECTION FOR MOBILE FINANCIAL SERVICES
15/30323818 DC : 0 BS ISO 9564-1 - FINANCIAL SERVICES - PERSONAL IDENTIFICATION NUMBER (PIN) MANAGEMENT AND SECURITY - PART 1: BASIC PRINCIPLES AND REQUIREMENTS FOR PINS IN CARD-BASED SYSTEMS
09/30201974 DC : 0 BS ISO 9564-1 - FINANCIAL SERVICES - PERSONAL IDENTIFICATION NUMBER (PIN) MANAGEMENT AND SECURITY - PART 1: BASIC PRINCIPLES AND REQUIREMENTS FOR PINS IN CARD BASE SYSTEMS
18/30354751 DC : DRAFT FEB 2018 BS ISO/IEC 18033-6 - INFORMATION TECHNOLOGY SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 6: HOMOMORPHIC ENCRYPTION
ISO/IEC 29167-17:2015 Information technology Automatic identification and data capture techniques Part 17: Crypto suite cryptoGPS security services for air interface communications
07/30143790 DC : 0 BS ISO/IEC 24759 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TEST REQUIREMENTS FOR CRYPTOGRAPHIC MODULES
BS ISO/IEC 18033-5:2015 Information technology. Security techniques. Encryption algorithms Identity-based ciphers
07/30107763 DC : 0 BS ISO/IEC 24713-2 - INFORMATION TECHNOLOGY - BIOMETRIC PROFILES FOR INTEROPERABILITY AND DATA INTERCHANGE - PART 2: PHYSICAL ACCESS CONTROL FOR EMPLOYEES AT AIRPORTS
07/30167508 DC : 0 BS ISO/IEC 11770-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 2 - MECHANISMS USING SYMMETRIC TECHNIQUES
CAN/CSA-ISO/IEC 11770-1:12 (R2016) Information technology - Security techniques - Key management - Part 1: Framework (Adopted ISO/IEC 11770-1:2010, second edition, 2010-12-01)
BS EN 62734:2015 Industrial networks. Wireless communication network and communication profiles. ISA 100.11a
CSA ISO/IEC 9798-1 :2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 1: GENERAL
INCITS/ISO/IEC 11770-5 : 2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 5: GROUP KEY MANAGEMENT
CSA ISO/IEC 14888-2 : 2009 : INC : COR 1 : 2016 : R201400 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 2: INTEGER FACTORIZATION BASED MECHANISMS
CSA ISO/IEC 14888-2 :2009 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 2: INTEGER FACTORIZATION BASED MECHANISMS
BS ISO/IEC 20008-2:2013 Information technology. Security techniques. Anonymous digital signatures Mechanisms using a group public key
INCITS/ISO/IEC 24713-2 : 2009 INFORMATION TECHNOLOGY - BIOMETRIC PROFILES FOR INTEROPERABILITY AND DATA INTERCHANGE - PART 2: PHYSICAL ACCESS CONTROL FOR EMPLOYEES AT AIRPORTS
BS ISO/IEC 29192-4 : 2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES
BS ISO/IEC 11770-3 : 2015 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES
ECMA 409 : 2ED 2015 NFC-SEC-02: NFC-SEC CRYPTOGRAPHY STANDARD USING ECDH-256 AND AES-GCM
S.R. CEN ISO/TS 19299:2015 ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015)
BS ISO/IEC 10116:2017 Information technology. Security techniques. Modes of operation for an <i>n</i>-bit block cipher
BS ISO/IEC 11770-4:2017 Information technology. Security techniques. Key management Mechanisms based on weak secrets
ISO/IEC 11770-2:2008 Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques
ISO/TR 14742:2010 Financial services Recommendations on cryptographic algorithms and their use
ISO/TS 19299:2015 Electronic fee collection Security framework
IEC 62734:2014 Industrial networks - Wireless communication network and communication profiles - ISA 100.11a
ONORM ONR CEN/TS 16702-2 : 2015 ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 2: TRUSTED RECORDER (CEN/TS 16702-2:2015)
BS ISO/IEC 11770-1:2010 Information technology. Security techniques. Key management Framework
BS ISO/IEC 18370-2:2016 Information technology. Security techniques. Blind digital signatures Discrete logarithm based mechanisms
BS ISO 11568-2:2012 Financial services. Key management (retail) Symmetric ciphers, their key management and life cycle
BS ISO/IEC 11770-5:2011 Information technology Security techniques. Key management Group key management
ISO/IEC 19592-2:2017 Information technology — Security techniques — Secret sharing — Part 2: Fundamental mechanisms
12/30236955 DC : 0 BS ISO/IEC 20008-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ANONYMOUS DIGITAL SIGNATURE - PART 2: MECHANISMS USING A GROUP PUBLIC KEY
ISO 9564-1:2017 Financial services — Personal Identification Number (PIN) management and security — Part 1: Basic principles and requirements for PINs in card-based systems
15/30279582 DC : 0 BS ISO/IEC 18367 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC ALGORITHMS AND SECURITY MECHANISMS CONFORMANCE TESTING
18/30362144 DC : 0 BS ISO/IEC 11770-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 2: MECHANISMS USING SYMMETRIC TECHNIQUES
DIN CEN ISO/TS 19299;DIN SPEC 74125:2016-02 ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015)
PD CEN ISO/TS 19299:2015 Electronic fee collection. Security framework
07/30173155 DC : 0 BS ISO/IEC 9798-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS
BS ISO/IEC 9797-3:2011 Information technology. Security techniques. Message Authentication Codes (MACs) Mechanisms using a universal hash-function
UNI CEN/TS 16439 : 2013 ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK
03/652682 DC : DRAFT NOV 2003 BS ISO/IEC TR 15446 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDE FOR THE PRODUCTION OF PROTECTION PROFILES AND SECURITY TARGETS
BS ISO/IEC 11770-2:2008 Information technology. Security techniques. Key management Mechanisms using symmetric techniques
BS ISO/IEC 19592-2:2017 Information technology. Security techniques. Secret sharing Fundamental mechanisms
CAN/CSA-ISO/IEC 9798-1:12 (R2016) Information technology - Security techniques - Entity authentication - Part 1: General (Adopted ISO/IEC 9798-1:2010, third edition, 2010-07-01)
16/30335688 DC : 0 BS ISO/IEC 11770-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS
ISO/IEC 20008-2:2013 Information technology — Security techniques — Anonymous digital signatures — Part 2: Mechanisms using a group public key
CAN/CSA-ISO/IEC 29167-17:16 Information technology Automatic identification and data capture techniques Part 17: Crypto suite cryptoGPS security services for air interface communications (Adopted ISO/IEC 29167-17:2015, first edition, 2015-06-01)
ISO/IEC 18033-5:2015 Information technology Security techniques Encryption algorithms Part 5: Identity-based ciphers
ISO 19092-1:2006 Financial services Biometrics Part 1: Security framework
ANSI X9.8-1 : 2015 FINANCIAL SERVICES - PERSONAL IDENTIFICATION NUMBER (PIN) MANAGEMENT AND SECURITY - PART 1: BASIC PRINCIPLES AND REQUIREMENTS FOR PINS IN CARD-BASED SYSTEMS
ANSI X9.97-2 : 2009(R2017) BANKING - SECURE CRYPTOGRAPHIC DEVICES (RETAIL) - PART 2: SECURITY COMPLIANCE CHECKLISTS FOR DEVICES USED IN FINANCIAL TRANSACTIONS
ISO/IEC 14543-5-1:2010 Information technology Home electronic system (HES) architecture Part 5-1: Intelligent grouping and resource sharing for Class 2 and Class 3 Core protocol
ISO/IEC 14888-2:2008 Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms
ISO/IEC 29167-16:2015 Information technology — Automatic identification and data capture techniques — Part 16: Crypto suite ECDSA-ECDH security services for air interface communications
ISO/IEC 9798-1:2010 Information technology Security techniques Entity authentication Part 1: General
18/30356051 DC : DRAFT APR 2018 BS ISO/IEC 20543 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TEST AND ANALYSIS METHODS FOR RANDOM BIT GENERATORS WITHIN ISO/IEC 19790 AND ISO/IEC 15408
ISO/IEC 11770-6:2016 Information technology Security techniques Key management Part 6: Key derivation
ISO/IEC 29192-4:2013 Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques
INCITS/ISO/IEC 29192-4 : 2014 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES
ISO/IEC 13157-4:2016 Information technology — Telecommunications and information exchange between systems — NFC Security — Part 4: NFC-SEC entity authentication and key agreement using asymmetric cryptography
16/30327837 DC : 0 BS ISO/IEC 19592-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECRET SHARING - PART 2: FUNDAMENTAL MECHANISMS
CAN/CSA-ISO/IEC 11770-3:16 Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques (Adopted ISO/IEC 11770-3:2015, third edition, 2015-08-01)
ECMA 411 : 3ED 2017 NFC-SEC-04: NFC-SEC ENTITY AUTHENTICATION AND KEY AGREEMENT USING SYMMETRIC CRYPTOGRAPHY
ISO/IEC 24713-2:2008 Information technology Biometric profiles for interoperability and data interchange Part 2: Physical access control for employees at airports
15/30268565 DC : 0 BS ISO/IEC 18370-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BLIND DIGITAL SIGNATURES - PART 2: DISCRETE LOGARITHM BASED MECHANISMS
PD CEN/TS 16439:2013 Electronic fee collection. Security framework
05/30116896 DC : DRAFT SEP 2005 ISO 19092-1 - FINANCIAL SERVICES - BIOMETRICS - PART 1: SECURITY FRAMEWORK
CSA ISO/IEC 11770-2 : 2009 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 2: MECHANISMS USING SYMMETRIC TECHNIQUES
ISO/IEC 13157-5:2016 Information technology — Telecommunications and information exchange between systems — NFC Security — Part 5: NFC-SEC entity authentication and key agreement using symmetric cryptography
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
ISO/IEC 13157-3:2016 Information technology — Telecommunications and information exchange between systems — NFC Security — Part 3: NFC-SEC cryptography standard using ECDH-256 and AES-GCM
TS 119 312 : 1.2.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); CRYPTOGRAPHIC SUITES
ISO/IEC 29167-1:2014 Information technology Automatic identification and data capture techniques Part 1: Security services for RFID air interfaces
CAN/CSA-ISO/IEC 29167-16:16 Information technology Automatic identification and data capture techniques Part 16: Crypto suite ECDSA-ECDH security services for air interface communications (Adopted ISO/IEC 29167-16:2015, first edition, 2015-11-15)
CEN/TS 16439:2013 Electronic fee collection - Security framework
CSA ISO/IEC 11770-4 : 2007 : R2017 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS
CAN/CSA-ISO/IEC 18367:18 Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing (Adopted ISO/IEC 18367:2016, first edition, 2016-12-15)
CSA ISO/IEC 11770-4 : 2007 : INC : COR 1 : 2010 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS
CSA ISO/IEC 11770-4 : 2007 : R2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS
CSA ISO/IEC 11770-4 : 2007 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS

ISO/IEC 18033-1:2015 Information technology Security techniques Encryption algorithms Part 1: General
ISO/IEC 18032:2005 Information technology Security techniques Prime number generation
FIPS PUB 140 : 0001 SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES
ANSI X9.82-2 : 2015 RANDOM NUMBER GENERATION - PART 2: ENTROPY SOURCES
ISO/IEC 18033-3:2010 Information technology Security techniques Encryption algorithms Part 3: Block ciphers
ISO/IEC 19790:2012 Information technology — Security techniques — Security requirements for cryptographic modules
AS ISO 13491.2:2019 Financial services - Secure cryptographic devices (retail) Security compliance checklists for devices used in financial transactions
ISO/IEC 10118-1:2016 Information technology Security techniques Hash-functions Part 1: General
FIPS PUB 186 : 0 DIGITAL SIGNATURE STANDARD (DSS)
ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
AS 2805.6.5.3:2020 Electronic funds transfer - Requirements for interfaces Key management - TCU initialization - Asymmetric
ANSI X9.82-3 : 2007(R2017) RANDOM NUMBER GENERATION - PART 3: DETERMINISTIC RANDOM BIT GENERATORS
ISO/IEC 9797-2:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function
ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
ANSI X9.82-1 : 2006(R2013) RANDOM NUMBER GENERATION - PART 1: OVERVIEW AND BASIC PRINCIPLES
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.