×
Informējam, ka Sistēma pielāgota darbam ar interneta pārlūkprogrammu Internet Explorer (8. un jaunākām versijām) un Mozilla Firefox (3.6 un jaunākām versijām).
Izmantojot citu interneta pārlūkprogrammu, brīdinām, ka Sistēmas funkcionalitāte var tikt traucēta.
Projekta Nr. ISO/TS 14742:2025
Nosaukums <p class="MsoBodyText"><span lang="EN-GB">This document provides a list of recommended ISO cryptographic algorithms for use within applicable ISO TC 68, <em style="mso-bidi-font-style: normal;">Financial services</em>, standards. It also provides strategic guidance on key lengths and associated parameters and usage dates.</span></p>
<p class="MsoBodyText"><span lang="EN-GB">This document focuses on core algorithms, key lengths and frequently used mechanisms. The included algorithms are considered to be fit for purpose for financial service use. For additional algorithms, see the body of standards produced by ISO/IEC JTC 1 SC 27, <em style="mso-bidi-font-style: normal;">Information security, cybersecurity and privacy protection</em>. For standards on key management, see ISO 11568.</span></p>
<p class="MsoBodyText"><span lang="EN-GB">The categories of algorithms covered are:</span></p>
<p class="ListNumber1" style="mso-list: l0 level1 lfo4;"><!-- [if !supportLists]--><span lang="EN-GB" style="mso-fareast-font-family: Cambria; mso-bidi-font-family: Cambria;"><span style="mso-list: Ignore;">a)<span style="font: 7.0pt 'Times New Roman';"> </span></span></span><!--[endif]--><span lang="EN-GB">block ciphers and modes of operation;</span></p>
<p class="ListNumber1" style="mso-list: l0 level1 lfo4;"><!-- [if !supportLists]--><span lang="EN-GB" style="mso-fareast-font-family: Cambria; mso-bidi-font-family: Cambria;"><span style="mso-list: Ignore;">b)<span style="font: 7.0pt 'Times New Roman';"> </span></span></span><!--[endif]--><span lang="EN-GB">stream ciphers;</span></p>
<p class="ListNumber1" style="mso-list: l0 level1 lfo4;"><!-- [if !supportLists]--><span lang="EN-GB" style="mso-fareast-font-family: Cambria; mso-bidi-font-family: Cambria;"><span style="mso-list: Ignore;">c)<span style="font: 7.0pt 'Times New Roman';"> </span></span></span><!--[endif]--><span lang="EN-GB">message authentication codes (MACs);</span></p>
<p class="ListNumber1" style="mso-list: l0 level1 lfo4;"><!-- [if !supportLists]--><span lang="EN-GB" style="mso-fareast-font-family: Cambria; mso-bidi-font-family: Cambria;"><span style="mso-list: Ignore;">d)<span style="font: 7.0pt 'Times New Roman';"> </span></span></span><!--[endif]--><span lang="EN-GB">authenticated encryption algorithms;</span></p>
<p class="ListNumber1" style="mso-list: l0 level1 lfo4;"><!-- [if !supportLists]--><span lang="EN-GB" style="mso-fareast-font-family: Cambria; mso-bidi-font-family: Cambria;"><span style="mso-list: Ignore;">e)<span style="font: 7.0pt 'Times New Roman';"> </span></span></span><!--[endif]--><span lang="EN-GB">format preserving encryption;</span></p>
<p class="ListNumber1" style="mso-list: l0 level1 lfo4;"><!-- [if !supportLists]--><span lang="EN-GB" style="mso-fareast-font-family: Cambria; mso-bidi-font-family: Cambria;"><span style="mso-list: Ignore;">f)<span style="font: 7.0pt 'Times New Roman';"> </span></span></span><!--[endif]--><span lang="EN-GB">hash functions;</span></p>
<p class="ListNumber1" style="mso-list: l0 level1 lfo4;"><!-- [if !supportLists]--><span lang="EN-GB" style="mso-fareast-font-family: Cambria; mso-bidi-font-family: Cambria;"><span style="mso-list: Ignore;">g)<span style="font: 7.0pt 'Times New Roman';"> </span></span></span><!--[endif]--><span lang="EN-GB">asymmetric algorithms:</span></p>
<p class="MsoListNumber2" style="mso-list: l1 level1 lfo3;"><!-- [if !supportLists]--><span lang="EN-GB" style="mso-fareast-font-family: Cambria; mso-bidi-font-family: Cambria;"><span style="mso-list: Ignore;">1)<span style="font: 7.0pt 'Times New Roman';"> </span></span></span><!--[endif]--><span lang="EN-GB">digital signature schemes giving message recovery;</span></p>
<p class="MsoListNumber2" style="mso-list: l1 level1 lfo3;"><!-- [if !supportLists]--><span lang="EN-GB" style="mso-fareast-font-family: Cambria; mso-bidi-font-family: Cambria;"><span style="mso-list: Ignore;">2)<span style="font: 7.0pt 'Times New Roman';"> </span></span></span><!--[endif]--><span lang="EN-GB">digital signatures with appendix;</span></p>
<p class="MsoListNumber2" style="mso-list: l1 level1 lfo3;"><!-- [if !supportLists]--><span lang="EN-GB" style="mso-fareast-font-family: Cambria; mso-bidi-font-family: Cambria;"><span style="mso-list: Ignore;">3)<span style="font: 7.0pt 'Times New Roman';"> </span></span></span><!--[endif]--><span lang="EN-GB">asymmetric ciphers.</span></p>
<p class="ListNumber1" style="mso-list: l3 level1 lfo2;"><!-- [if !supportLists]--><span lang="EN-GB" style="mso-fareast-font-family: Cambria; mso-bidi-font-family: Cambria;"><span style="mso-list: Ignore;">h)<span style="font: 7.0pt 'Times New Roman';"> </span></span></span><!--[endif]--><span lang="EN-GB">authentication mechanisms;</span></p>
<p class="ListNumber1" style="mso-list: l3 level1 lfo2;"><!-- [if !supportLists]--><span lang="EN-GB" style="mso-fareast-font-family: Cambria; mso-bidi-font-family: Cambria;"><span style="mso-list: Ignore;">i)<span style="font: 7.0pt 'Times New Roman';"> </span></span></span><!--[endif]--><span lang="EN-GB">key derivation, establishment and agreement mechanisms;</span></p>
<p class="ListNumber1" style="mso-list: l3 level1 lfo2;"><!-- [if !supportLists]--><span lang="EN-GB" style="mso-fareast-font-family: Cambria; mso-bidi-font-family: Cambria;"><span style="mso-list: Ignore;">j)<span style="font: 7.0pt 'Times New Roman';"> </span></span></span><!--[endif]--><span lang="EN-GB">key transport mechanisms:</span></p>
<p class="MsoListNumber2" style="mso-list: l2 level1 lfo1;"><!-- [if !supportLists]--><span lang="EN-GB" style="mso-fareast-font-family: Cambria; mso-bidi-font-family: Cambria;"><span style="mso-list: Ignore;">1)<span style="font: 7.0pt 'Times New Roman';"> </span></span></span><!--[endif]--><span lang="EN-GB">key wrapping.</span></p>
<p class="MsoBodyText"><span lang="EN-GB">This document does not define any cryptographic algorithms. However, the standards to which this document refers contain necessary implementation information as well as more detailed guidance regarding choice of security parameters, security analysis and other implementation considerations.</span></p>
Reģistrācijas numurs (WIID) 84609
Darbības sfēra <p class="MsoBodyText"><span lang="EN-GB">This document provides a list of recommended ISO cryptographic algorithms for use within applicable ISO TC 68, <em style="mso-bidi-font-style: normal;">Financial services</em>, standards. It also provides strategic guidance on key lengths and associated parameters and usage dates.</span></p>
<p class="MsoBodyText"><span lang="EN-GB">This document focuses on core algorithms, key lengths and frequently used mechanisms. The included algorithms are considered to be fit for purpose for financial service use. For additional algorithms, see the body of standards produced by ISO/IEC JTC 1 SC 27, <em style="mso-bidi-font-style: normal;">Information security, cybersecurity and privacy protection</em>. For standards on key management, see ISO 11568.</span></p>
<p class="MsoBodyText"><span lang="EN-GB">The categories of algorithms covered are:</span></p>
<p class="ListNumber1" style="mso-list: l0 level1 lfo4;"><!-- [if !supportLists]--><span lang="EN-GB" style="mso-fareast-font-family: Cambria; mso-bidi-font-family: Cambria;"><span style="mso-list: Ignore;">a)<span style="font: 7.0pt 'Times New Roman';"> </span></span></span><!--[endif]--><span lang="EN-GB">block ciphers and modes of operation;</span></p>
<p class="ListNumber1" style="mso-list: l0 level1 lfo4;"><!-- [if !supportLists]--><span lang="EN-GB" style="mso-fareast-font-family: Cambria; mso-bidi-font-family: Cambria;"><span style="mso-list: Ignore;">b)<span style="font: 7.0pt 'Times New Roman';"> </span></span></span><!--[endif]--><span lang="EN-GB">stream ciphers;</span></p>
<p class="ListNumber1" style="mso-list: l0 level1 lfo4;"><!-- [if !supportLists]--><span lang="EN-GB" style="mso-fareast-font-family: Cambria; mso-bidi-font-family: Cambria;"><span style="mso-list: Ignore;">c)<span style="font: 7.0pt 'Times New Roman';"> </span></span></span><!--[endif]--><span lang="EN-GB">message authentication codes (MACs);</span></p>
<p class="ListNumber1" style="mso-list: l0 level1 lfo4;"><!-- [if !supportLists]--><span lang="EN-GB" style="mso-fareast-font-family: Cambria; mso-bidi-font-family: Cambria;"><span style="mso-list: Ignore;">d)<span style="font: 7.0pt 'Times New Roman';"> </span></span></span><!--[endif]--><span lang="EN-GB">authenticated encryption algorithms;</span></p>
<p class="ListNumber1" style="mso-list: l0 level1 lfo4;"><!-- [if !supportLists]--><span lang="EN-GB" style="mso-fareast-font-family: Cambria; mso-bidi-font-family: Cambria;"><span style="mso-list: Ignore;">e)<span style="font: 7.0pt 'Times New Roman';"> </span></span></span><!--[endif]--><span lang="EN-GB">format preserving encryption;</span></p>
<p class="ListNumber1" style="mso-list: l0 level1 lfo4;"><!-- [if !supportLists]--><span lang="EN-GB" style="mso-fareast-font-family: Cambria; mso-bidi-font-family: Cambria;"><span style="mso-list: Ignore;">f)<span style="font: 7.0pt 'Times New Roman';"> </span></span></span><!--[endif]--><span lang="EN-GB">hash functions;</span></p>
<p class="ListNumber1" style="mso-list: l0 level1 lfo4;"><!-- [if !supportLists]--><span lang="EN-GB" style="mso-fareast-font-family: Cambria; mso-bidi-font-family: Cambria;"><span style="mso-list: Ignore;">g)<span style="font: 7.0pt 'Times New Roman';"> </span></span></span><!--[endif]--><span lang="EN-GB">asymmetric algorithms:</span></p>
<p class="MsoListNumber2" style="mso-list: l1 level1 lfo3;"><!-- [if !supportLists]--><span lang="EN-GB" style="mso-fareast-font-family: Cambria; mso-bidi-font-family: Cambria;"><span style="mso-list: Ignore;">1)<span style="font: 7.0pt 'Times New Roman';"> </span></span></span><!--[endif]--><span lang="EN-GB">digital signature schemes giving message recovery;</span></p>
<p class="MsoListNumber2" style="mso-list: l1 level1 lfo3;"><!-- [if !supportLists]--><span lang="EN-GB" style="mso-fareast-font-family: Cambria; mso-bidi-font-family: Cambria;"><span style="mso-list: Ignore;">2)<span style="font: 7.0pt 'Times New Roman';"> </span></span></span><!--[endif]--><span lang="EN-GB">digital signatures with appendix;</span></p>
<p class="MsoListNumber2" style="mso-list: l1 level1 lfo3;"><!-- [if !supportLists]--><span lang="EN-GB" style="mso-fareast-font-family: Cambria; mso-bidi-font-family: Cambria;"><span style="mso-list: Ignore;">3)<span style="font: 7.0pt 'Times New Roman';"> </span></span></span><!--[endif]--><span lang="EN-GB">asymmetric ciphers.</span></p>
<p class="ListNumber1" style="mso-list: l3 level1 lfo2;"><!-- [if !supportLists]--><span lang="EN-GB" style="mso-fareast-font-family: Cambria; mso-bidi-font-family: Cambria;"><span style="mso-list: Ignore;">h)<span style="font: 7.0pt 'Times New Roman';"> </span></span></span><!--[endif]--><span lang="EN-GB">authentication mechanisms;</span></p>
<p class="ListNumber1" style="mso-list: l3 level1 lfo2;"><!-- [if !supportLists]--><span lang="EN-GB" style="mso-fareast-font-family: Cambria; mso-bidi-font-family: Cambria;"><span style="mso-list: Ignore;">i)<span style="font: 7.0pt 'Times New Roman';"> </span></span></span><!--[endif]--><span lang="EN-GB">key derivation, establishment and agreement mechanisms;</span></p>
<p class="ListNumber1" style="mso-list: l3 level1 lfo2;"><!-- [if !supportLists]--><span lang="EN-GB" style="mso-fareast-font-family: Cambria; mso-bidi-font-family: Cambria;"><span style="mso-list: Ignore;">j)<span style="font: 7.0pt 'Times New Roman';"> </span></span></span><!--[endif]--><span lang="EN-GB">key transport mechanisms:</span></p>
<p class="MsoListNumber2" style="mso-list: l2 level1 lfo1;"><!-- [if !supportLists]--><span lang="EN-GB" style="mso-fareast-font-family: Cambria; mso-bidi-font-family: Cambria;"><span style="mso-list: Ignore;">1)<span style="font: 7.0pt 'Times New Roman';"> </span></span></span><!--[endif]--><span lang="EN-GB">key wrapping.</span></p>
<p class="MsoBodyText"><span lang="EN-GB">This document does not define any cryptographic algorithms. However, the standards to which this document refers contain necessary implementation information as well as more detailed guidance regarding choice of security parameters, security analysis and other implementation considerations.</span></p>
Statuss Standarts spēkā
ICS grupa 35.240.40