• PD ISO/TR 14742:2010

    Current The latest, up-to-date edition.

    Financial services. Recommendations on cryptographic algorithms and their use

    Available format(s):  Hardcopy, PDF

    Language(s):  English

    Published date:  31-08-2010

    Publisher:  British Standards Institution

    Add To Cart

    General Product Information - (Show below) - (Hide below)

    Committee IST/12
    Document Type Standard
    Publisher British Standards Institution
    Status Current

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
    ISO/IEC 9798-3:1998 Information technology Security techniques Entity authentication Part 3: Mechanisms using digital signature techniques
    ISO/IEC 14888-3:2016 Information technology Security techniques Digital signatures with appendix Part 3: Discrete logarithm based mechanisms
    ISO/TR 19038:2005 Banking and related financial services Triple DEA Modes of operation Implementation guidelines
    ISO 11568-2:2012 Financial services Key management (retail) Part 2: Symmetric ciphers, their key management and life cycle
    ISO 8372:1987 Information processing Modes of operation for a 64-bit block cipher algorithm
    ISO/IEC 11770-2:2008 Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques
    ISO/IEC 10118-4:1998 Information technology Security techniques Hash-functions Part 4: Hash-functions using modular arithmetic
    ISO/IEC 18033-2:2006 Information technology Security techniques Encryption algorithms Part 2: Asymmetric ciphers
    ISO/IEC 18033-3:2010 Information technology Security techniques Encryption algorithms Part 3: Block ciphers
    ISO/IEC 9796-3:2006 Information technology Security techniques Digital signature schemes giving message recovery Part 3: Discrete logarithm based mechanisms
    ISO/IEC 9798-4:1999 Information technology Security techniques Entity authentication Part 4: Mechanisms using a cryptographic check function
    ISO 16609:2012 Financial services — Requirements for message authentication using symmetric techniques
    ANSI X9.24-1 : 2017 RETAIL FINANCIAL SERVICES - SYMMETRIC KEY MANAGEMENT - PART 1: USING SYMMETRIC TECHNIQUES
    ISO/IEC 9798-2:2008 Information technology Security techniques Entity authentication Part 2: Mechanisms using symmetric encipherment algorithms
    ISO/IEC 9798-5:2009 Information technology Security techniques Entity authentication Part 5: Mechanisms using zero-knowledge techniques
    ISO 11568-1:2005 Banking Key management (retail) Part 1: Principles
    ISO/IEC 9796-2:2010 Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms
    ISO/IEC 9798-6:2010 Information technology Security techniques Entity authentication Part 6: Mechanisms using manual data transfer
    FIPS PUB 186 : 0 DIGITAL SIGNATURE STANDARD (DSS)
    ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
    ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
    ANSI INCITS 92 : 1981 DATA ENCRYPTION ALGORITHM
    ISO 9564-2:2014 Financial services Personal Identification Number (PIN) management and security Part 2: Approved algorithms for PIN encipherment
    ISO 11568-4:2007 Banking Key management (retail) Part 4: Asymmetric cryptosystems Key management and life cycle
    ISO/IEC 10118-2:2010 Information technology Security techniques Hash-functions Part 2: Hash-functions using an n-bit block cipher
    ISO/IEC 9797-2:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function
    ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
    ISO/IEC 14888-2:2008 Information technology Security techniques Digital signatures with appendix Part 2: Integer factorization based mechanisms
    TS 102 176-1 : 2.1.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); ALGORITHMS AND PARAMETERS FOR SECURE ELECTRONIC SIGNATURES; PART 1: HASH FUNCTIONS AND ASYMMETRIC ALGORITHMS
    ISO/IEC 18033-4:2011 Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers
    ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
    ISO/IEC 9798-1:2010 Information technology Security techniques Entity authentication Part 1: General
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective