
ISO/IEC 8825-1:2002
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
View Superseded by

Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1:
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
23-09-2021
15-12-2002
ISO/IEC 8825-1:2002 defines a set of Basic Encoding Rules (BER) that may be applied to values of types defined using the ASN.1 notation. Application of these encoding rules produces a transfer syntax for such values. It is implicit in the specification of these encoding rules that they are also used for decoding. ISO/IEC 8825-1:2002 defines also a set of Distinguished Encoding Rules (DER) and a set of Canonical Encoding Rules (CER) both of which provide constraints on the Basic Encoding Rules (BER). The key difference between them is that DER uses the definite length form of encoding while CER uses the indefinite length form. DER is more suitable for the small encoded values, while CER is more suitable for the large ones. It is implicit in the specification of these encoding rules that they are also used for decoding.
DocumentType |
Standard
|
Pages |
26
|
PublisherName |
International Organization for Standardization
|
Status |
Withdrawn
|
SupersededBy | |
Supersedes |
INCITS/ISO/IEC 9797-1 : 2011(R2019) | Information technology - Security techniques - Message Authentication Codes (MACs) - Part 1: Mechanisms using a block cipher |
INCITS/ISO/IEC 19794-8:2006(R2019) | Information technology - Biometric data interchange formats - Part 8: Finger pattern skeletal data |
INCITS/ISO/IEC 24727-4:2008(R2019) | Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration |
INCITS/ISO/IEC 29192-4:2013(R2019) | Information technology - Security techniques - Lightweight cryptography - Part 4: Mechanisms using asymmetric techniques |
INCITS/ISO/IEC 14888-2:2008(R2019) | Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms<br> |
INCITS/ISO/IEC 20008-2:2013(R2019) | Information technology - Security techniques - Anonymous digital signatures - Part 2: Mechanisms using a group public key<br> |
AS ISO/IEC 9797.1:2019 | Information technology - Security techniques - Message Authentication Codes (MACs) Mechanisms using a block cipher |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.