ISO/IEC 9797-1:2011
Current
The latest, up-to-date edition.
Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
English
01-03-2011
ISO/IEC 9797-1:2011 specifies six MAC algorithms that use a secret key and an n-bit block cipher to calculate an m-bit MAC.
ISO/IEC 9797-1:2011 can be applied to the security services of any security architecture, process, or application.
Key management mechanisms are outside the scope of ISO/IEC 9797-1:2011.
ISO/IEC 9797-1:2011 specifies object identifiers that can be used to identify each mechanism in accordance with ISO/IEC 8825-1. Numerical examples and a security analysis of each of the six specified algorithms are provided, and the relationship of ISO/IEC 9797-1:2011 to previous standards is explained.
DevelopmentNote |
Together with ISO/IEC 9797-2 supersedes ISO/IEC 9797 (04/2004)
|
DocumentType |
Standard
|
Pages |
40
|
PublisherName |
International Organization for Standardization
|
Status |
Current
|
Supersedes |
Standards | Relationship |
DS ISO/IEC 9797-1 : 2011 | Identical |
DS/ISO/IEC 9797-1:2011/Amd 1:2023 | Identical |
NEN-ISO/IEC 9797-1:2011/A1:2023 | Identical |
INCITS/ISO/IEC 9797-1 : 2011(R2019) | Identical |
NEN ISO/IEC 9797-1 : 2011 | Identical |
AS ISO/IEC 9797.1:2019 | Identical |
BS ISO/IEC 9797-1:2011 | Identical |
INCITS/ISO/IEC 9797-1 : 2014 | Identical |
CAN/CSA-ISO/IEC 9797-1:12 (R2016) | Identical |
CSA ISO/IEC 9797-1:2012 | Identical |
CSA ISO/IEC 18033-2 :2006 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
15/30288056 DC : 0 | BS ISO/IEC 10116 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER |
ANSI X9.24-3 : 2017 | RETAIL FINANCIAL SERVICES - SYMMETRIC KEY MANAGEMENT - PART 3: DERIVED UNIQUE KEY PER TRANSACTION |
BS ISO/IEC 11770-5:2011 | Information technology Security techniques. Key management Group key management |
10/30135070 DC : DRAFT NOV 2010 | BS ISO/IEC 9797-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 3: MECHANISMS USING A UNIVERSAL HASH FUNCTION |
BS ISO 11568-4:2007 | Banking. Key management (retail) Asymmetric cryptosystems. Key management and life cycle |
BS EN 419212-1:2017 | Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services Introduction and common definitions |
INCITS/ISO/IEC 9798-4 : 1999 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 4: MECHANISMS USING A CRYPTOGRAPHIC CHECK FUNCTION |
TS 135 204 : 13.0.0 | UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); LTE; 3G SECURITY; SPECIFICATION OF THE 3GPP CONFIDENTIALITY AND INTEGRITY ALGORITHMS; DOCUMENT 4: DESIGN CONFORMANCE TEST DATA (3GPP TS 35.204 VERSION 14.0.0 RELEASE 14) |
12/30268705 DC : 0 | BS EN 15509 - ELECTRONIC FEE COLLECTION - INTEROPERABILITY APPLICATION PROFILE FOR DSRC |
16/30304626 DC : 0 | BS ISO 20038 - BANKING AND RELATED FINANCIAL SERVICES - KEY WRAP |
CSA ISO/IEC 9798-2:2010 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
13/30293476 DC : 0 | BS EN 62601 - INDUSTRIAL COMMUNICATION NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - WIA-PA |
BS EN 14890-1:2008 | Application interface for smart cards used as secure signature creation devices Basic services |
PD CEN/TR 16968:2016 | Electronic Fee Collection. Assessment of security measures for applications using Dedicated Short-Range Communication |
INCITS/ISO/IEC 9797-2 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 2: MECHANISMS USING A DEDICATED HASH-FUNCTION |
INCITS/ISO/IEC 15946-3 : 2002 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 3: KEY ESTABLISHMENT |
DD IEC PAS 62601 : DRAFT MAR 2009 | INDUSTRIAL COMMUNICATION NETWORKS - FIELDBUS SPECIFICATIONS - WIA-PA COMMUNICATION NETWORK AND COMMUNICATION PROFILE |
CSA ISO/IEC 9798-2 : 2010 : R2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
CAN/CSA-ISO/IEC 18033-2:06 (R2016) | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
BS ISO/IEC 18033-4 : 2005 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 4: STREAM CIPHERS |
ISO/IEC 29167-10:2017 | Information technology — Automatic identification and data capture techniques — Part 10: Crypto suite AES-128 security services for air interface communications |
I.S. EN 419212-2:2017 | APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 2: SIGNATURE AND SEAL SERVICES |
I.S. EN 419212-1:2017 | APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 1: INTRODUCTION AND COMMON DEFINITIONS |
CSA ISO/IEC 29167-10 : 2016 | INFORMATION TECHNOLOGY - AUTOMATIC IDENTIFICATION AND DATA CAPTURE TECHNIQUES - PART 10: CRYPTO SUITE AES-128 SECURITY SERVICES FOR AIR INTERFACE COMMUNICATIONS |
I.S. EN 62734:2015 | INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A |
PREN 419212-5 : DRAFT 2016 | APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 5: TRUSTED ESERVICE |
ISO 11568-4:2007 | Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle |
ISO/IEC TR 29149:2012 | Information technology Security techniques Best practices for the provision and use of time-stamping services |
CEN/TS 16702-2:2015 | Electronic fee collection - Secure monitoring for autonomous toll systems - Part 2: Trusted recorder |
I.S. EN 15509:2014 | ELECTRONIC FEE COLLECTION - INTEROPERABILITY APPLICATION PROFILE FOR DSRC |
CEN ISO/TS 19299:2015 | Electronic fee collection - Security framework (ISO/TS 19299:2015) |
CEN ISO/TS 17574:2017 | Electronic fee collection - Guidelines for security protection profiles (ISO/TS 17574:2017) |
CEN/TS 14821-5:2003 | Traffic and Travel Information (TTI) - TTI messages via cellular networks - Part 5: Internal services |
EN 62734:2015 | Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
EN 62601:2016 | Industrial networks - Wireless communication network and communication profiles - WIA-PA |
ISO/IEC 11770-5:2011 | Information technology Security techniques Key management Part 5: Group key management |
TS 103 484-2 : 9.0.0 | SMART CARDS; TEST SPECIFICATION FOR THE SECURE CHANNEL INTERFACE; PART 2: UICC FEATURES (RELEASE 9) |
BS ISO/IEC 9798-2:2008 | Information technology. Security techniques. Entity authentication Mechanisms using symmetric encipherment algorithms |
09/30202174 DC : 0 | BS EN 50159 - RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
INCITS/ISO/IEC 9798-4 : 1999 : R2005 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 4: MECHANISMS USING A CRYPTOGRAPHIC CHECK FUNCTION |
ISO/IEC 24771:2014 | Information technology Telecommunications and information exchange between systems MAC/PHY standard for ad hoc wireless network to support QoS in an industrial work environment |
ISO/IEC 18013-3:2017 | Information technology — Personal identification — ISO-compliant driving licence — Part 3: Access control, authentication and integrity validation |
I.S. EN 419212-5:2018 | APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 5: TRUSTED ESERVICE |
S.R. CEN/TS 16702-2:2015 | ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 2: TRUSTED RECORDER |
EG 202 009-1 : 1.3.1 | USER GROUP; QUALITY OF TELECOM SERVICES; PART 1: METHODOLOGY FOR IDENTIFICATION OF INDICATORS RELEVANT TO THE USERS |
12/30236952 DC : 0 | BS ISO/IEC 20009-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ANONYMOUS ENTITY AUTHENTICATION - PART 2: MECHANISMS BASED ON SIGNATURES USING A GROUP PUBLIC KEY |
ISO/IEC 9797-3:2011 | Information technology — Security techniques — Message Authentication Codes (MACs) — Part 3: Mechanisms using a universal hash-function |
BS EN ISO 13141 : 2015 | ELECTRONIC FEE COLLECTION - LOCALISATION AUGMENTATION COMMUNICATION FOR AUTONOMOUS SYSTEMS |
BS ISO/IEC 20009-2:2013 | Information technology. Security techniques. Anonymous entity authentication Mechanisms based on signatures using a group public key |
ISO/TS 21719-2:2018 | Electronic fee collection — Personalization of on-board equipment (OBE) — Part 2: Using dedicated short-range communication |
11/30228418 DC : DRAFT JUNE 2011 | BS ISO/IEC 29192-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 3: STREAM CIPHERS |
TS 103 484-1 : 9.0.0 | SMART CARDS; TEST SPECIFICATION FOR THE SECURE CHANNEL INTERFACE; PART 1: TERMINAL FEATURES (RELEASE 9) |
PD ISO/TR 14742:2010 | Financial services. Recommendations on cryptographic algorithms and their use |
BS ISO/IEC 18367:2016 | Information technology. Security techniques. Cryptographic algorithms and security mechanisms conformance testing |
CSA ISO/IEC 9797-2:2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 2: MECHANISMS USING A DEDICATED HASH-FUNCTION |
ISO/TR 11633-2:2009 | Health informatics Information security management for remote maintenance of medical devices and medical information systems Part 2: Implementation of an information security management system (ISMS) |
CAN/CSA-ISO/IEC 9797-2:13 (R2017) | Information technology - Security techniques - Message authentication codes (MACs) - Part 2: Mechanisms using a dedicated hash-function (Adopted ISO/IEC 9797-2:2011, second edition, 2011-05-01) |
CSA ISO/IEC 9798-2 : 2010 : INC : COR 2 : 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
INCITS/ISO/IEC 18033-2 : 2008 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
I.S. EN ISO 13141:2015 | ELECTRONIC FEE COLLECTION - LOCALISATION AUGMENTATION COMMUNICATION FOR AUTONOMOUS SYSTEMS (ISO 13141:2015) |
ISO/TR 11633-1:2009 | Health informatics Information security management for remote maintenance of medical devices and medical information systems Part 1: Requirements and risk analysis |
BS ISO/IEC 18013-3:2017 | Information technology. Personal identification. ISO-compliant driving licence Access control, authentication and integrity validation |
I.S. EN 14890-1:2008 | APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
I.S. EN 62601:2016 | INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - WIA-PA |
PREN 50159 : DRAFT 2009 | RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
ISO/IEC 18367:2016 | Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing |
CEN/TS 16702-1:2014 | Electronic fee collection - Secure monitoring for autonomous toll systems - Part 1: Compliance checking |
04/30040717 DC : DRAFT JUL 2004 | ISO/IEC 18033-2 - INFORMATION TECHNOLOGY - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
08/30135059 DC : 0 | ISO/IEC 9797-2 (REV) - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) |
TS 135 201 : 13.0.0 | UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); LTE; 3G SECURITY; SPECIFICATION OF THE 3GPP CONFIDENTIALITY AND INTEGRITY ALGORITHMS; DOCUMENT 1: F8 AND F9 SPECIFICATION (3GPP TS 35.201 VERSION 14.0.0 RELEASE 14) |
BS ISO/IEC 29192-2:2012 | Information technology. Security techniques. Lightweight cryptography Block ciphers |
PD CEN/TS 16702-2:2015 | Electronic fee collection. Secure monitoring for autonomous toll systems Trusted recorder |
DIN EN 62601:2016-10 | Industrial networks - Wireless communication network and communication profiles - WIA-PA (IEC 62601:2015); English version EN 62601:2016 |
BS EN 50159:2010 | Railway applications. Communication, signalling and processing systems. Safety-related communication in transmission systems |
07/30163724 DC : 0 | BS ISO/IEC 24727-4 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS PROGRAMMING INTERFACE - PART 4: API ADMINISTRATION |
16/30332188 DC : 0 | BS ISO/IEC 29167-10 - INFORMATION TECHNOLOGY - AUTOMATIC IDENTIFICATION AND DATA CAPTURE TECHNIQUES - PART 10: CRYPTO SUITE AES-128 SECURITY SERVICES FOR AIR INTERFACE COMMUNICATIONS |
TS 131 113 : 8.0.0 | UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); LTE; UNIVERSAL SUBSCRIBER IDENTITY MODULE APPLICATION TOOLKIT (USAT) INTERPRETER BYTE CODES |
PD CEN/TS 16702-1:2014 | Electronic fee collection. Secure monitoring for autonomous toll system Compliance checking |
DIN EN 14890-1:2009-03 | APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
07/30162384 DC : 0 | BS ISO/IEC 7501-1 - IDENTIFICATION CARDS - MACHINE READABLE TRAVEL DOCUMENTS - PART 1: MACHINE READABLE PASSPORT |
18/30354751 DC : DRAFT FEB 2018 | BS ISO/IEC 18033-6 - INFORMATION TECHNOLOGY SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 6: HOMOMORPHIC ENCRYPTION |
BS ISO/IEC 25185-1:2016 | Identification cards. Integrated circuit card authentication protocols Protocol for Lightweight Authentication of Identity |
07/30161079 DC : 0 | BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
PD ISO/TR 11633-2:2009 | Health informatics. Information security management for remote maintenance of medical devices and medical information systems Implementation of an information security management system (ISMS) |
12/30255293 DC : 0 | BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
16/30345808 DC : 0 | BS EN 419212-1 - APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 1: INTRODUCTION AND COMMON DEFINITIONS |
BS ISO/IEC 29150:2011 | Information technology. Security techniques. Signcryption |
IEC PAS 62601:2009 | Industrial communication networks - Fieldbus specifications - WIA-PA communication network and communication profile |
CSA ISO/IEC 18033-4 : 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 4: STREAM CIPHERS |
BS EN 62734:2015 | Industrial networks. Wireless communication network and communication profiles. ISA 100.11a |
INCITS/ISO/IEC 9798-2 : 2010 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
INCITS/ISO/IEC 11770-5 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 5: GROUP KEY MANAGEMENT |
BS ISO/IEC 29167-10:2017 | Information technology. Automatic identification and data capture techniques Crypto suite AES-128 security services for air interface communications |
ANSI X9.58 : 2013 | FINANCIAL TRANSACTION MESSAGES - ELECTRONIC BENEFITS TRANSFER (EBT) - SUPPLEMENTAL NUTRITION ASSISTANCE PROGRAM (SNAP) AND CASH BENEFIT PROGRAMS |
ISO 15764:2004 | Road vehicles Extended data link security |
S.R. CEN/TS 16702-1:2014 | ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 1: COMPLIANCE CHECKING |
BS ISO/IEC 24727-4 : 2008 | IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 4: APPLICATION PROGRAMMING INTERFACE (API) ADMINISTRATION |
ISO/IEC 25185-1:2016 | Identification cards Integrated circuit card authentication protocols Part 1: Protocol for Lightweight Authentication of Identity |
I.S. EN 50159:2010 | RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
CEN/TR 16968:2016 | Electronic Fee Collection - Assessment of security measures for applications using Dedicated Short-Range Communication |
S.R. CWA 16926-65:2015 | EXTENSIONS FOR FINANCIAL SERVICES (XFS) INTERFACE SPECIFICATION RELEASE 3.30 - PART 65: PIN KEYPAD DEVICE CLASS INTERFACE - MIGRATION FROM VERSION 3.20 (CWA 16374) TO VERSION 3.30 (THIS CWA) - PROGRAMMER'S REFERENCE |
ISO/IEC 29192-2:2012 | Information technology Security techniques Lightweight cryptography Part 2: Block ciphers |
ECMA 409 : 2ED 2015 | NFC-SEC-02: NFC-SEC CRYPTOGRAPHY STANDARD USING ECDH-256 AND AES-GCM |
S.R. CWA 16374-65:2011 | EXTENSIONS FOR FINANCIAL SERVICES (XFS) INTERFACE SPECIFICATION RELEASE 3.20 - PART 65: PIN KEYPAD DEVICE CLASS INTERFACE MIGRATION FROM VERSION 3.10 (CWA 15748) TO VERSION 3.20 (THIS CWA) PROGRAMMER'S REFERENCE |
ISO 16609:2012 | Financial services — Requirements for message authentication using symmetric techniques |
ANSI X9.24-1 : 2017 | RETAIL FINANCIAL SERVICES - SYMMETRIC KEY MANAGEMENT - PART 1: USING SYMMETRIC TECHNIQUES |
ISO 20038:2017 | Banking and related financial services — Key wrap using AES |
S.R. CEN ISO/TS 19299:2015 | ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
BS ISO 16609:2012 | Financial services. Requirements for message authentication using symmetric techniques |
S.R. CWA 15748-65:2008 | EXTENSIONS FOR FINANCIAL SERVICES (XFS) INTERFACE SPECIFICATION - RELEASE 3.10 - PART 65: PIN KEYPAD DEVICE CLASS INTERFACE - MIGRATION FROM VERSION 3.03 (CWA 14050) TO VERSION 3.10 (THIS CWA) - PROGRAMMER'S REFERENCE |
BS ISO/IEC 10116:2017 | Information technology. Security techniques. Modes of operation for an <i>n</i>-bit block cipher |
ISO/IEC 18033-4:2011 | Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers |
ISO/TR 14742:2010 | Financial services Recommendations on cryptographic algorithms and their use |
ISO/IEC 24727-4:2008 | Identification cards Integrated circuit card programming interfaces Part 4: Application programming interface (API) administration |
ISO/IEC 9797-2:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function |
ISO/TR 19038:2005 | Banking and related financial services Triple DEA Modes of operation Implementation guidelines |
ISO/TS 19299:2015 | Electronic fee collection Security framework |
UNE-EN 50159:2011 | Railway applications - Communication, signalling and processing systems - Safety-related communication in transmission systems |
IEC 62734:2014 | Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
CEI EN 50159 : 2012 | RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
UNI EN 419212-1 : 2015 | APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
UNI EN 15509 : 2014 | ELECTRONIC FEE COLLECTION - INTEROPERABILITY APPLICATION PROFILE FOR DSRC |
UNI CEI ISO/IEC 18013-3 : 2011 | INFORMATION TECHNOLOGY - PERSONAL IDENTIFICATION - ISO-COMPLIANT DRIVING LICENCE - PART 3: ACCESS CONTROL, AUTHENTICATION AND INTEGRITY VALIDATION |
PREN 419212-1 : DRAFT 2016 | APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 1: INTRODUCTION AND COMMON DEFINITIONS |
BS IEC 62601:2011 | Industrial communication networks. Fieldbus specifications. WIA-PA communication network and communication profile |
BS EN 419212-2:2017 | Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services Signature and Seal Services |
BS ISO/IEC 29192-1:2012 | Information technology. Security techniques. Lightweight cryptography General |
PD ISO/TR 11633-1:2009 | Health informatics. Information security management for remote maintenance of medical devices and medical information systems Requirements and risk analysis |
UNI CEN/TS 16702-1 : 2014 | ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 1: COMPLIANCE CHECKING |
ISO/IEC 9798-2:2008 | Information technology Security techniques Entity authentication Part 2: Mechanisms using symmetric encipherment algorithms |
DIN EN 14890-1 E : 2009 | APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
DD CEN ISO/TS 17574:2009 | Electronic fee collection. Guidelines for security protection profiles |
DIN CEN ISO/TS 19299;DIN SPEC 74125:2016-02 | ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
16/30345811 DC : 0 | BS EN 419212-2 - APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 2: SIGNATURE AND SEAL SERVICES |
BS ISO 20038:2017 | Banking and related financial services. Key wrap using AES |
PD CEN ISO/TS 19299:2015 | Electronic fee collection. Security framework |
07/30173155 DC : 0 | BS ISO/IEC 9798-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
TS 135 202 : 13.0.0 | UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); LTE; 3G SECURITY; SPECIFICATION OF THE 3GPP CONFIDENTIALITY AND INTEGRITY ALGORITHMS; DOCUMENT 2: KASUMI SPECIFICATION (3GPP TS 35.202 VERSION 14.0.0 RELEASE 14) |
09/30207165 DC : 0 | BS EN 62601 - INDUSTRIAL COMMUNICATION NETWORKS - FIELDBUS SPECIFICATIONS - WIA-PA COMMUNICATION NETWORK AND COMMUNICATION PROFILE |
BS ISO/IEC 9797-3:2011 | Information technology. Security techniques. Message Authentication Codes (MACs) Mechanisms using a universal hash-function |
11/30204850 DC : 0 | BS ISO/IEC 29192-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 1: GENERAL |
UNI CEN/TS 16439 : 2013 | ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK |
EN 300 674-3-1 : 3.0.0 DRAFT | INTELLIGENT TRANSPORT SYSTEMS (ITS); ROAD TRANSPORT AND TRAFFIC TELEMATICS (RTTT); DEDICATED SHORT RANGE COMMUNICATIONS (DSRC); PART 3-1: TECHNICAL CHARACTERISTICS AND TEST METHODS FOR HIGH DATA RATE (HDR) DATA TRANSMISSION EQUIPMENT OPERATING IN THE 5,8 GHZ INDUSTRIAL, SCIENTIFIC AND MEDICAL (ISM) BAND |
07/30161082 DC : 0 | BS EN 14890-2 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 2: ADDITIONAL SERVICES |
PREN 15509 : DRAFT 2012 | ELECTRONIC FEE COLLECTION - INTEROPERABILITY APPLICATION PROFILE FOR DSRC |
INCITS/ISO/IEC 10116 : 2008 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER |
CAN/CSA-ISO/IEC 18033-4:13 (R2017) | Information technology - Security techniques - Encryption algorithms - Part 4: Stream ciphers (Adopted ISO/IEC 18033-4:2011, second edition, 2011-12-15) |
S.R. CEN/TS 16439:2013 | ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK |
S.R. CEN ISO/TS 17574:2017 | ELECTRONIC FEE COLLECTION - GUIDELINES FOR SECURITY PROTECTION PROFILES (ISO/TS 17574:2017) |
ISO/IEC 10116:2017 | Information technology — Security techniques — Modes of operation for an n-bit block cipher |
INCITS/ISO/IEC 18033-4 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 4: STREAM CIPHERS |
S.R. CWA 16926-6:2015 | EXTENSIONS FOR FINANCIAL SERVICES (XFS) INTERFACE SPECIFICATION RELEASE 3.30 - PART 6: PIN KEYPAD DEVICE CLASS INTERFACE - PROGRAMMER'S REFERENCE |
ISO/IEC 19772:2009 | Information technology Security techniques Authenticated encryption |
S.R. CWA 15748-6:2008 | EXTENSIONS FOR FINANCIAL SERVICES (XFS) INTERFACE SPECIFICATION - RELEASE 3.10 - PART 6: PIN KEYPAD DEVICE CLASS INTERFACE - PROGRAMMER'S REFERENCE |
I.S. CWA 14890-2:2004 | APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 2: ADDITIONAL SERVICES |
ISO/IEC 7501-1:2008 | Identification cards — Machine readable travel documents — Part 1: Machine readable passport |
ISO/IEC 29150:2011 | Information technology — Security techniques — Signcryption |
CEN ISO/TS 21719-2:2018 | Electronic fee collection - Personalization of on-board equipment (OBE) - Part 2: Using dedicated short-range communication (ISO/TS 21719-2:2018) |
ISO/IEC 29192-1:2012 | Information technology — Security techniques — Lightweight cryptography — Part 1: General |
ISO/IEC 15444-8:2007 | Information technology — JPEG 2000 image coding system: Secure JPEG 2000 — Part 8: |
IEC 62280:2014 | Railway applications - Communication, signalling and processing systems - Safety related communication in transmission systems |
EN 50159:2010 | Railway applications - Communication, signalling and processing systems - Safety-related communication in transmission systems |
IEC 62601:2015 | Industrial networks - Wireless communication network and communication profiles - WIA-PA |
ISO/TS 17574:2017 | Electronic fee collection — Guidelines for security protection profiles |
EN 15509:2014 | Electronic fee collection - Interoperability application profile for DSRC |
EN 419212-1:2017 | Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 1: Introduction and common definitions |
EN 419212-2:2017 | Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 2: Signature and Seal Services |
EN 14890-1:2008 | Application Interface for smart cards used as Secure Signature Creation Devices - Part 1: Basic services |
08/30175546 DC : DRAFT SEP 2008 | BS ISO/IEC 19785-4 - INFORMATION TECHNOLOGY - COMMON BIOMETRIC EXCHANGE FORMATS FRAMEWORK - PART 4: SECURITY BLOCK FORMAT SPECIFICATIONS |
BS ISO/IEC 19772:2009 | Information technology. Security techniques. Authenticated encryption |
11/30231411 DC : 0 | BS ISO 16609 - FINANCIAL SERVICES - REQUIREMENTS FOR MESSAGE AUTHENTICATION USING SYMMETRIC TECHNIQUES |
10/30228415 DC : DRAFT NOV 2010 | BS ISO/IEC 29192-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 2: BLOCK CIPHERS |
PD ISO/IEC TR 29149:2012 | Information technology. Security techniques. Best practices for the provision and use of time-stamping services |
BS ISO/IEC 18033-2 : 2006 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
S.R. CWA 16374-6:2011 | EXTENSIONS FOR FINANCIAL SERVICES (XFS) INTERFACE SPECIFICATION RELEASE 3.20 - PART 6: PIN KEYPAD DEVICE CLASS INTERFACE PROGRAMMER'S REFERENCE |
ISO/IEC 20009-2:2013 | Information technology — Security techniques — Anonymous entity authentication — Part 2: Mechanisms based on signatures using a group public key |
ISO/IEC 18033-2:2006 | Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers |
PD CEN/TS 16439:2013 | Electronic fee collection. Security framework |
DD CEN/TS 14821-5:2003 | Traffic and Travel Information (TTI). TTI messages via cellular networks Internal services |
BS ISO/IEC 9797-2:2011 | Information technology. Security techniques. Message Authentication Codes (MACs) Mechanisms using a dedicated hash-function |
PD CEN ISO/TS 17574:2017 | Electronic fee collection. Guidelines for security protection profiles |
07/30105115 DC : 0 | BS ISO/IEC 19772 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - AUTHENTICATED ENCRYPTION |
INCITS/ISO/IEC 24727-4 : 2009(R2014) | IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 4: APPLICATION PROGRAMMING INTERFACE (API) ADMINISTRATION |
UNI 11310 : 2013 | ROAD TRAFFIC AND TRANSPORT TELEMATICS - AUTOMATIC DYNAMIC DEBITING SYSTEMS AND AUTOMATIC ACCESS CONTROL SYSTEMS USING DEDICATED SHORT-RANGE COMMUNICATION AT 5,8 GHZ - INTEROPERABILITY APPLICATION PROFILE FOR EETS |
ES 200 674-1 : 2.4.1 | INTELLIGENT TRANSPORT SYSTEMS (ITS); ROAD TRANSPORT AND TRAFFIC TELEMATICS (RTTT); DEDICATED SHORT RANGE COMMUNICATIONS (DSRC); PART 1: TECHNICAL CHARACTERISTICS AND TEST METHODS FOR HIGH DATA RATE (HDR) DATA TRANSMISSION EQUIPMENT OPERATING IN THE 5,8 GHZ INDUSTRIAL, SCIENTIFIC AND MEDICAL (ISM) BAND |
TS 135 203 : 13.0.0 | UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); LTE; 3G SECURITY; SPECIFICATION OF THE 3GPP CONFIDENTIALITY AND INTEGRITY ALGORITHMS; DOCUMENT 3: IMPLEMENTORS' TEST DATA (3GPP TS 35.203 VERSION 14.0.0 RELEASE 14) |
ANSI X9 TR 31 : 2010 | INTEROPERABLE SECURE KEY EXCHANGE KEY BLOCK SPECIFICATION FOR SYMMETRIC ALGORITHMS |
EN 419212-5:2018 | Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 5: Trusted eService |
ISO/IEC 24767-2:2009 | Information technology Home network security Part 2: Internal security services: Secure Communication Protocol for Middleware (SCPM) |
S.R. CEN/TR 16968:2016 | ELECTRONIC FEE COLLECTION - ASSESSMENT OF SECURITY MEASURES FOR APPLICATIONS USING DEDICATED SHORT-RANGE COMMUNICATION |
S.R. CEN ISO/TS 21719-2:2018 | ELECTRONIC FEE COLLECTION - PERSONALIZATION OF ON-BOARD EQUIPMENT (OBE) - PART 2: USING DEDICATED SHORT-RANGE COMMUNICATION (ISO/TS 21719-2:2018) |
ISO/IEC 13157-3:2016 | Information technology — Telecommunications and information exchange between systems — NFC Security — Part 3: NFC-SEC cryptography standard using ECDH-256 and AES-GCM |
16/30345819 DC : 0 | BS EN 419212-5 - APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 5: TRUSTED ESERVICE |
BS EN 15509:2014 | Electronic fee collection. Interoperability application profile for DSRC |
ISO 13141:2015 | Electronic fee collection — Localisation augmentation communication for autonomous systems |
CEN/TS 16439:2013 | Electronic fee collection - Security framework |
CSA ISO/IEC 10116 : 2007 : R2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER |
CSA ISO/IEC 10116 : 2007 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER |
CSA ISO/IEC 10116 : 2007 : R2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER |
CAN/CSA-ISO/IEC 25185-1:18 | Identification cards — Integrated circuit card authentication protocols — Part 1: Protocol for Lightweight Authentication of Identity (Adopted ISO/IEC 25185-1:2016, first edition, 2016-01-15) |
CAN/CSA-ISO/IEC 18367:18 | Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing (Adopted ISO/IEC 18367:2016, first edition, 2016-12-15) |
CSA ISO/IEC 10116 : 2007 : INC : COR 1 : 2009 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER |
ISO/IEC 8825-1:2015 | Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1: |
ANSI X9.19 : 1996 | FINANCIAL INSTITUTION RETAIL MESSAGE AUTHENTICATION |
AS ISO/IEC 9797.2:2019 | Information technology - Security techniques - Message Authentication Codes (MACs) Mechanisms using a dedicated hash-function |
ISO/IEC 18033-3:2010 | Information technology Security techniques Encryption algorithms Part 3: Block ciphers |
ISO 8731-1:1987 | Banking Approved algorithms for message authentication Part 1: DEA |
ANSI X9.9 : 86(R1994) | FINANCIAL INSTITUTION MESSAGE AUTHENTICATION (WHOLESALE) |
ANSI X9.24-1 : 2017 | RETAIL FINANCIAL SERVICES - SYMMETRIC KEY MANAGEMENT - PART 1: USING SYMMETRIC TECHNIQUES |
ISO 9807:1991 | Banking and related financial services Requirements for message authentication (retail) |
ISO 7498-2:1989 | Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture |
ISO/IEC 10116:2017 | Information technology — Security techniques — Modes of operation for an n-bit block cipher |
ISO/IEC 9798-1:2010 | Information technology Security techniques Entity authentication Part 1: General |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.