ISO/TR 14742:2010
Current
The latest, up-to-date edition.
Financial services Recommendations on cryptographic algorithms and their use
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
English
18-06-2010
ISO/TR 14742:2010 provides a list of recommended cryptographic algorithms for use within applicable financial services standards prepared by ISO/TC 68. It also provides strategic guidance on key lengths and associated parameters and usage dates.
The focus is on algorithms rather than protocols, and protocols are in general not included in ISO/TR 14742:2010.
ISO/TR 14742:2010 deals primarily with recommendations regarding algorithms and key lengths.
The categories of algorithms covered in ISO/TR 14742:2010 are:
- block ciphers;
- stream ciphers;
- hash functions;
- message authentication codes (MACs);
- asymmetric algorithms;
- digital signature schemes giving message recovery,
- digital signatures with appendix,
- asymmetric ciphers;
- authentication mechanisms;
- key establishment and agreement mechanisms;
- key transport mechanisms.
ISO/TR 14742:2010 does not define any cryptographic algorithms; however, the standards to which ISO/TR 14742:2010 refers may contain necessary implementation information as well as more detailed guidance regarding choice of security parameters, security analysis, and other implementation considerations.
DocumentType |
Technical Report
|
Pages |
31
|
ProductNote |
This standard is also refers to ANSI X3.92,NIST SP 180-3, NIST SP 800-38B,NIST SP 800-57,NIST SP 800-90,NIST SP 800-107,
|
PublisherName |
International Organization for Standardization
|
Status |
Current
|
Standards | Relationship |
PD ISO/TR 14742:2010 | Identical |
NEN NPR ISO/TR 14742 : 2010 | Identical |
ANSI X9.119-2 : 2017 | RETAIL FINANCIAL SERVICES - REQUIREMENTS FOR PROTECTION OF SENSITIVE PAYMENT CARD DATA - PART 2: IMPLEMENTING POST-AUTHORIZATION TOKENIZATION SYSTEMS |
ANSI X9.24-3 : 2017 | RETAIL FINANCIAL SERVICES - SYMMETRIC KEY MANAGEMENT - PART 3: DERIVED UNIQUE KEY PER TRANSACTION |
18/30361485 DC : 0 | BS ISO/IEC 19896-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY TESTERS AND EVALUATORS - PART 3: KNOWLEDGE, SKILLS AND EFFECTIVENESS REQUIREMENTS FOR ISO/IEC 15408 EVALUATORS |
11/30231373 DC : 0 | BS ISO 11568-2 - FINANCIAL SERVICES - KEY MANAGEMENT (RETAIL) - PART 2: SYMMETRIC CIPHERS, THEIR KEY MANAGEMENT AND LIFE CYCLE |
ANSI X9 TR 34 : 2012 | INTEROPERABLE METHOD FOR DISTRIBUTION OF SYMMETRIC KEYS USING ASYMMETRIC TECHNIQUES: PART 1 - USING FACTORING-BASED PUBLIC KEY CRYPTOGRAPHY UNILATERAL KEY TRANSPORT |
ISO 11568-2:2012 | Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle |
PD ISO/TS 12812-2:2017 | Core banking. Mobile financial services Security and data protection for mobile financial services |
ISO/TS 12812-2:2017 | Core banking — Mobile financial services — Part 2: Security and data protection for mobile financial services |
ANSI X9.119-1 : 2016 | RETAIL FINANCIAL SERVICES - REQUIREMENTS FOR PROTECTION OF SENSITIVE PAYMENT CARD DATA - PART 1: USING ENCRYPTION METHODS |
15/30281583 DC : 0 | BS ISO 12812-2 - CORE BANKING - MOBILE FINANCIAL SERVICES - PART 2: SECURITY AND DATA PROTECTION FOR MOBILE FINANCIAL SERVICES |
ANSI X9.24-1 : 2017 | RETAIL FINANCIAL SERVICES - SYMMETRIC KEY MANAGEMENT - PART 1: USING SYMMETRIC TECHNIQUES |
BS ISO 16609:2012 | Financial services. Requirements for message authentication using symmetric techniques |
BS ISO 11568-2:2012 | Financial services. Key management (retail) Symmetric ciphers, their key management and life cycle |
11/30231411 DC : 0 | BS ISO 16609 - FINANCIAL SERVICES - REQUIREMENTS FOR MESSAGE AUTHENTICATION USING SYMMETRIC TECHNIQUES |
ISO 16609:2012 | Financial services — Requirements for message authentication using symmetric techniques |
ISO/IEC 18031:2011 | Information technology Security techniques Random bit generation |
ISO/IEC 9798-3:1998 | Information technology Security techniques Entity authentication Part 3: Mechanisms using digital signature techniques |
ISO/IEC 14888-3:2016 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms |
ISO/TR 19038:2005 | Banking and related financial services Triple DEA Modes of operation Implementation guidelines |
ISO 11568-2:2012 | Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle |
ISO 8372:1987 | Information processing Modes of operation for a 64-bit block cipher algorithm |
ISO/IEC 11770-2:2008 | Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques |
ISO/IEC 10118-4:1998 | Information technology Security techniques Hash-functions Part 4: Hash-functions using modular arithmetic |
ISO/IEC 18033-2:2006 | Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers |
ISO/IEC 18033-3:2010 | Information technology Security techniques Encryption algorithms Part 3: Block ciphers |
ISO/IEC 9796-3:2006 | Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms |
ISO/IEC 9798-4:1999 | Information technology Security techniques Entity authentication Part 4: Mechanisms using a cryptographic check function |
ISO 16609:2012 | Financial services — Requirements for message authentication using symmetric techniques |
ANSI X9.24-1 : 2017 | RETAIL FINANCIAL SERVICES - SYMMETRIC KEY MANAGEMENT - PART 1: USING SYMMETRIC TECHNIQUES |
ISO/IEC 9798-2:2008 | Information technology Security techniques Entity authentication Part 2: Mechanisms using symmetric encipherment algorithms |
ISO/IEC 9798-5:2009 | Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques |
ISO 11568-1:2005 | Banking — Key management (retail) — Part 1: Principles |
ISO/IEC 9796-2:2010 | Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms |
ISO/IEC 9798-6:2010 | Information technology Security techniques Entity authentication Part 6: Mechanisms using manual data transfer |
FIPS PUB 186 : 0 | DIGITAL SIGNATURE STANDARD (DSS) |
ISO/IEC 9797-1:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher |
ISO/IEC 10118-3:2004 | Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions |
ANSI INCITS 92 : 1981 | DATA ENCRYPTION ALGORITHM |
ISO 9564-2:2014 | Financial services — Personal Identification Number (PIN) management and security — Part 2: Approved algorithms for PIN encipherment |
ISO 11568-4:2007 | Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle |
ISO/IEC 10118-2:2010 | Information technology Security techniques Hash-functions Part 2: Hash-functions using an n-bit block cipher |
ISO/IEC 9797-2:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function |
ISO/IEC 10116:2017 | Information technology — Security techniques — Modes of operation for an n-bit block cipher |
ISO/IEC 14888-2:2008 | Information technology Security techniques Digital signatures with appendix Part 2: Integer factorization based mechanisms |
TS 102 176-1 : 2.1.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); ALGORITHMS AND PARAMETERS FOR SECURE ELECTRONIC SIGNATURES; PART 1: HASH FUNCTIONS AND ASYMMETRIC ALGORITHMS |
ISO/IEC 18033-4:2011 | Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers |
ISO/IEC 11770-3:2015 | Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
ISO/IEC 9798-1:2010 | Information technology Security techniques Entity authentication Part 1: General |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.