• Shopping Cart
    There are no items in your cart

ISO/TR 14742:2010

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by

Financial services — Recommendations on cryptographic algorithms and their use

Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

18-06-2010

Superseded date

21-11-2025

Superseded by

ISO/TS 14742:2025

€63.00
Excluding VAT

ISO/TR 14742:2010 provides a list of recommended cryptographic algorithms for use within applicable financial services standards prepared by ISO/TC 68. It also provides strategic guidance on key lengths and associated parameters and usage dates.

The focus is on algorithms rather than protocols, and protocols are in general not included in ISO/TR 14742:2010.

ISO/TR 14742:2010 deals primarily with recommendations regarding algorithms and key lengths.

The categories of algorithms covered in ISO/TR 14742:2010 are:

  • block ciphers;
  • stream ciphers;
  • hash functions;
  • message authentication codes (MACs);
  • asymmetric algorithms;
    • digital signature schemes giving message recovery,
    • digital signatures with appendix,
    • asymmetric ciphers;
  • authentication mechanisms;
  • key establishment and agreement mechanisms;
  • key transport mechanisms.

ISO/TR 14742:2010 does not define any cryptographic algorithms; however, the standards to which ISO/TR 14742:2010 refers may contain necessary implementation information as well as more detailed guidance regarding choice of security parameters, security analysis, and other implementation considerations.

Committee
ISO/TC 68/SC 2
DocumentType
Technical Report
Pages
31
ProductNote
This standard is also refers to ANSI X3.92,NIST SP 180-3, NIST SP 800-38B,NIST SP 800-57,NIST SP 800-90,NIST SP 800-107,
PublisherName
International Organization for Standardization
Status
Superseded
SupersededBy

Standards Relationship
PD ISO/TR 14742:2010 Identical
NEN NPR ISO/TR 14742 : 2010 Identical

ANSI X9.119-2 : 2017 RETAIL FINANCIAL SERVICES - REQUIREMENTS FOR PROTECTION OF SENSITIVE PAYMENT CARD DATA - PART 2: IMPLEMENTING POST-AUTHORIZATION TOKENIZATION SYSTEMS
ANSI X9.24-3 : 2017 RETAIL FINANCIAL SERVICES - SYMMETRIC KEY MANAGEMENT - PART 3: DERIVED UNIQUE KEY PER TRANSACTION
18/30361485 DC : 0 BS ISO/IEC 19896-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY TESTERS AND EVALUATORS - PART 3: KNOWLEDGE, SKILLS AND EFFECTIVENESS REQUIREMENTS FOR ISO/IEC 15408 EVALUATORS
11/30231373 DC : 0 BS ISO 11568-2 - FINANCIAL SERVICES - KEY MANAGEMENT (RETAIL) - PART 2: SYMMETRIC CIPHERS, THEIR KEY MANAGEMENT AND LIFE CYCLE
ANSI X9 TR 34 : 2012 INTEROPERABLE METHOD FOR DISTRIBUTION OF SYMMETRIC KEYS USING ASYMMETRIC TECHNIQUES: PART 1 - USING FACTORING-BASED PUBLIC KEY CRYPTOGRAPHY UNILATERAL KEY TRANSPORT
ISO 11568-2:2012 Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle
PD ISO/TS 12812-2:2017 Core banking. Mobile financial services Security and data protection for mobile financial services
ISO/TS 12812-2:2017 Core banking — Mobile financial services — Part 2: Security and data protection for mobile financial services
ANSI X9.119-1 : 2016 RETAIL FINANCIAL SERVICES - REQUIREMENTS FOR PROTECTION OF SENSITIVE PAYMENT CARD DATA - PART 1: USING ENCRYPTION METHODS
15/30281583 DC : 0 BS ISO 12812-2 - CORE BANKING - MOBILE FINANCIAL SERVICES - PART 2: SECURITY AND DATA PROTECTION FOR MOBILE FINANCIAL SERVICES
ANSI X9.24-1 : 2017 RETAIL FINANCIAL SERVICES - SYMMETRIC KEY MANAGEMENT - PART 1: USING SYMMETRIC TECHNIQUES
BS ISO 16609:2012 Financial services. Requirements for message authentication using symmetric techniques
BS ISO 11568-2:2012 Financial services. Key management (retail) Symmetric ciphers, their key management and life cycle
11/30231411 DC : 0 BS ISO 16609 - FINANCIAL SERVICES - REQUIREMENTS FOR MESSAGE AUTHENTICATION USING SYMMETRIC TECHNIQUES
ISO 16609:2012 Financial services — Requirements for message authentication using symmetric techniques
INCITS/ISO/IEC 19896-3:2018(R2019) IT security techniques -- Competence requirements for information security testers and evaluators -- Part 3: Knowledge, skills and effectiveness requirements for ISO/IEC 15408 evaluators

ISO/IEC 18031:2011 Information technology — Security techniques — Random bit generation
ISO/IEC 9798-3:1998 Information technology — Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques
ISO/IEC 14888-3:2016 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
ISO/TR 19038:2005 Banking and related financial services — Triple DEA — Modes of operation — Implementation guidelines
ISO 11568-2:2012 Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle
ISO 8372:1987 Information processing — Modes of operation for a 64-bit block cipher algorithm
ISO/IEC 11770-2:2008 Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques
ISO/IEC 10118-4:1998 Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic
ISO/IEC 18033-2:2006 Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
ISO/IEC 18033-3:2010 Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers
ISO/IEC 9796-3:2006 Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms
ISO/IEC 9798-4:1999 Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function
ISO 16609:2012 Financial services — Requirements for message authentication using symmetric techniques
ANSI X9.24-1 : 2017 RETAIL FINANCIAL SERVICES - SYMMETRIC KEY MANAGEMENT - PART 1: USING SYMMETRIC TECHNIQUES
ISO/IEC 9798-2:2008 Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms
ISO/IEC 9798-5:2009 Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques
ISO 11568-1:2005 Banking — Key management (retail) — Part 1: Principles
ISO/IEC 9796-2:2010 Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Integer factorization based mechanisms
ISO/IEC 9798-6:2010 Information technology — Security techniques — Entity authentication — Part 6: Mechanisms using manual data transfer
FIPS PUB 186 : 0 DIGITAL SIGNATURE STANDARD (DSS)
ISO/IEC 9797-1:2011 Information technology — Security techniques — Message Authentication Codes (MACs) — Part 1: Mechanisms using a block cipher
ISO/IEC 10118-3:2004 Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions
ANSI INCITS 92 : 1981 DATA ENCRYPTION ALGORITHM
ISO 9564-2:2014 Financial services — Personal Identification Number (PIN) management and security — Part 2: Approved algorithms for PIN encipherment
ISO 11568-4:2007 Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle
ISO/IEC 10118-2:2010 Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher
ISO/IEC 9797-2:2011 Information technology — Security techniques — Message Authentication Codes (MACs) — Part 2: Mechanisms using a dedicated hash-function
ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
ISO/IEC 14888-2:2008 Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms
ISO/IEC 18033-4:2011 Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers
ISO/IEC 11770-3:2015 Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques
ISO/IEC 9798-1:2010 Information technology — Security techniques — Entity authentication — Part 1: General

Access your standards online with a subscription

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.

€63.00
Excluding VAT