ISO/IEC 8825-1:2002
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
View Superseded by
Information technology — ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) — Part 1:
Hardcopy , PDF
15-12-2002
23-09-2021
ISO/IEC 8825-1:2002 defines a set of Basic Encoding Rules (BER) that may be applied to values of types defined using the ASN.1 notation. Application of these encoding rules produces a transfer syntax for such values. It is implicit in the specification of these encoding rules that they are also used for decoding. ISO/IEC 8825-1:2002 defines also a set of Distinguished Encoding Rules (DER) and a set of Canonical Encoding Rules (CER) both of which provide constraints on the Basic Encoding Rules (BER). The key difference between them is that DER uses the definite length form of encoding while CER uses the indefinite length form. DER is more suitable for the small encoded values, while CER is more suitable for the large ones. It is implicit in the specification of these encoding rules that they are also used for decoding.
| Committee |
ISO/IEC JTC 1/SC 6
|
| DocumentType |
Standard
|
| Pages |
26
|
| PublisherName |
International Organization for Standardization
|
| Status |
Withdrawn
|
| SupersededBy | |
| Supersedes |
| CSA ISO/IEC 19794-2:19 | Information technology — Biometric data interchange formats — Part 2: Finger minutiae data (Adopted ISO/IEC 19794-2:2005, first edition, 2005-09-15, including adopted amendment 1:2010 and technical corrigendum 2:2014 to amendment 1:2010) |
| INCITS/ISO/IEC 9798-5 : 2009(R2020) | Information Technology - Security Techniques - Entity Authentication - Part 5: Mechanisms Using Zero-Knowledge Techniques |
| INCITS/ISO/IEC 9797-1 : 2011(R2019) | Information technology - Security techniques - Message Authentication Codes (MACs) - Part 1: Mechanisms using a block cipher |
| INCITS/ISO/IEC 19794-8:2006(R2019) | Information technology - Biometric data interchange formats - Part 8: Finger pattern skeletal data |
| INCITS/ISO/IEC 24727-4:2008(R2019) | Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration |
| INCITS/ISO/IEC 29192-4:2013(R2019) | Information technology - Security techniques - Lightweight cryptography - Part 4: Mechanisms using asymmetric techniques |
| INCITS/ISO/IEC 14888-2:2008(R2019) | Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms<br> |
| INCITS/ISO/IEC 20008-2:2013(R2019) | Information technology - Security techniques - Anonymous digital signatures - Part 2: Mechanisms using a group public key<br> |
| AS ISO/IEC 9797.1:2019 | Information technology - Security techniques - Message Authentication Codes (MACs) Mechanisms using a block cipher |
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.