ISO/TC 68/SC 2
Projekta Nr. | ISO/TR 14742:2010 |
---|---|
Nosaukums | <div id="MathJax_Message" style="display: none;"></div> <p>ISO/TR 14742:2010 provides a list of recommended cryptographic algorithms for use within applicable financial services standards prepared by ISO/TC 68. It also provides strategic guidance on key lengths and associated parameters and usage dates.</p> <p>The focus is on algorithms rather than protocols, and protocols are in general not included in ISO/TR 14742:2010.</p> <p>ISO/TR 14742:2010 deals primarily with recommendations regarding algorithms and key lengths.</p> <p>The categories of algorithms covered in ISO/TR 14742:2010 are:</p> <ul> <li>block ciphers;</li> <li>stream ciphers;</li> <li>hash functions;</li> <li>message authentication codes (MACs);</li> <li>asymmetric algorithms; <ul> <li>digital signature schemes giving message recovery,</li> <li>digital signatures with appendix,</li> <li>asymmetric ciphers;</li> </ul> </li> <li>authentication mechanisms;</li> <li>key establishment and agreement mechanisms;</li> <li>key transport mechanisms.</li> </ul> <p>ISO/TR 14742:2010 does not define any cryptographic algorithms; however, the standards to which ISO/TR 14742:2010 refers may contain necessary implementation information as well as more detailed guidance regarding choice of security parameters, security analysis, and other implementation considerations.</p> |
Reģistrācijas numurs (WIID) | 54951 |
Darbības sfēra | <div id="MathJax_Message" style="display: none;"></div> <p>ISO/TR 14742:2010 provides a list of recommended cryptographic algorithms for use within applicable financial services standards prepared by ISO/TC 68. It also provides strategic guidance on key lengths and associated parameters and usage dates.</p> <p>The focus is on algorithms rather than protocols, and protocols are in general not included in ISO/TR 14742:2010.</p> <p>ISO/TR 14742:2010 deals primarily with recommendations regarding algorithms and key lengths.</p> <p>The categories of algorithms covered in ISO/TR 14742:2010 are:</p> <ul> <li>block ciphers;</li> <li>stream ciphers;</li> <li>hash functions;</li> <li>message authentication codes (MACs);</li> <li>asymmetric algorithms; <ul> <li>digital signature schemes giving message recovery,</li> <li>digital signatures with appendix,</li> <li>asymmetric ciphers;</li> </ul> </li> <li>authentication mechanisms;</li> <li>key establishment and agreement mechanisms;</li> <li>key transport mechanisms.</li> </ul> <p>ISO/TR 14742:2010 does not define any cryptographic algorithms; however, the standards to which ISO/TR 14742:2010 refers may contain necessary implementation information as well as more detailed guidance regarding choice of security parameters, security analysis, and other implementation considerations.</p> |
Statuss | Standarts spēkā |
ICS grupa | 03.060 35.240.40 |