Projekta Nr.ISO/TR 14742:2010
Nosaukums<div id="MathJax_Message" style="display: none;"></div> <p>ISO/TR 14742:2010 provides a list of recommended cryptographic algorithms for use within applicable financial services standards prepared by ISO/TC 68. It also provides strategic guidance on key lengths and associated parameters and usage dates.</p> <p>The focus is on algorithms rather than protocols, and protocols are in general not included in ISO/TR 14742:2010.</p> <p>ISO/TR 14742:2010 deals primarily with recommendations regarding algorithms and key lengths.</p> <p>The categories of algorithms covered in ISO/TR 14742:2010 are:</p> <ul> <li>block ciphers;</li> <li>stream ciphers;</li> <li>hash functions;</li> <li>message authentication codes (MACs);</li> <li>asymmetric algorithms; <ul> <li>digital signature schemes giving message recovery,</li> <li>digital signatures with appendix,</li> <li>asymmetric ciphers;</li> </ul> </li> <li>authentication mechanisms;</li> <li>key establishment and agreement mechanisms;</li> <li>key transport mechanisms.</li> </ul> <p>ISO/TR 14742:2010 does not define any cryptographic algorithms; however, the standards to which ISO/TR 14742:2010 refers may contain necessary implementation information as well as more detailed guidance regarding choice of security parameters, security analysis, and other implementation considerations.</p>
Reģistrācijas numurs (WIID)54951
Darbības sfēra<div id="MathJax_Message" style="display: none;"></div> <p>ISO/TR 14742:2010 provides a list of recommended cryptographic algorithms for use within applicable financial services standards prepared by ISO/TC 68. It also provides strategic guidance on key lengths and associated parameters and usage dates.</p> <p>The focus is on algorithms rather than protocols, and protocols are in general not included in ISO/TR 14742:2010.</p> <p>ISO/TR 14742:2010 deals primarily with recommendations regarding algorithms and key lengths.</p> <p>The categories of algorithms covered in ISO/TR 14742:2010 are:</p> <ul> <li>block ciphers;</li> <li>stream ciphers;</li> <li>hash functions;</li> <li>message authentication codes (MACs);</li> <li>asymmetric algorithms; <ul> <li>digital signature schemes giving message recovery,</li> <li>digital signatures with appendix,</li> <li>asymmetric ciphers;</li> </ul> </li> <li>authentication mechanisms;</li> <li>key establishment and agreement mechanisms;</li> <li>key transport mechanisms.</li> </ul> <p>ISO/TR 14742:2010 does not define any cryptographic algorithms; however, the standards to which ISO/TR 14742:2010 refers may contain necessary implementation information as well as more detailed guidance regarding choice of security parameters, security analysis, and other implementation considerations.</p>
StatussStandarts spēkā
ICS grupa03.060
35.240.40