• There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

ISO/IEC 9797-1:2011

Current

Current

The latest, up-to-date edition.

Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher

Available format(s)

Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users

Language(s)

English

Published date

01-03-2011

ISO/IEC 9797-1:2011 specifies six MAC algorithms that use a secret key and an n-bit block cipher to calculate an m-bit MAC.

ISO/IEC 9797-1:2011 can be applied to the security services of any security architecture, process, or application.

Key management mechanisms are outside the scope of ISO/IEC 9797-1:2011.

ISO/IEC 9797-1:2011 specifies object identifiers that can be used to identify each mechanism in accordance with ISO/IEC 8825-1. Numerical examples and a security analysis of each of the six specified algorithms are provided, and the relationship of ISO/IEC 9797-1:2011 to previous standards is explained.

DevelopmentNote
Together with ISO/IEC 9797-2 supersedes ISO/IEC 9797 (04/2004)
DocumentType
Standard
Pages
40
PublisherName
International Organization for Standardization
Status
Current
Supersedes

CSA ISO/IEC 10116 : 2007 : R2017 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER
CSA ISO/IEC 18033-2 :2006 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS
15/30288056 DC : 0 BS ISO/IEC 10116 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER
ANSI X9.24-3 : 2017 RETAIL FINANCIAL SERVICES - SYMMETRIC KEY MANAGEMENT - PART 3: DERIVED UNIQUE KEY PER TRANSACTION
BS ISO/IEC 11770-5:2011 Information technology Security techniques. Key management Group key management
10/30135070 DC : DRAFT NOV 2010 BS ISO/IEC 9797-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 3: MECHANISMS USING A UNIVERSAL HASH FUNCTION
BS ISO 11568-4:2007 Banking. Key management (retail) Asymmetric cryptosystems. Key management and life cycle
BS EN 419212-1:2017 Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services Introduction and common definitions
INCITS/ISO/IEC 9798-4 : 1999 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 4: MECHANISMS USING A CRYPTOGRAPHIC CHECK FUNCTION
TS 135 204 : 13.0.0 UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); LTE; 3G SECURITY; SPECIFICATION OF THE 3GPP CONFIDENTIALITY AND INTEGRITY ALGORITHMS; DOCUMENT 4: DESIGN CONFORMANCE TEST DATA (3GPP TS 35.204 VERSION 14.0.0 RELEASE 14)
12/30268705 DC : 0 BS EN 15509 - ELECTRONIC FEE COLLECTION - INTEROPERABILITY APPLICATION PROFILE FOR DSRC
16/30304626 DC : 0 BS ISO 20038 - BANKING AND RELATED FINANCIAL SERVICES - KEY WRAP
CSA ISO/IEC 9798-2:2010 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS
13/30293476 DC : 0 BS EN 62601 - INDUSTRIAL COMMUNICATION NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - WIA-PA
BS EN 14890-1:2008 Application interface for smart cards used as secure signature creation devices Basic services
PD CEN/TR 16968:2016 Electronic Fee Collection. Assessment of security measures for applications using Dedicated Short-Range Communication
INCITS/ISO/IEC 9797-2 : 2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 2: MECHANISMS USING A DEDICATED HASH-FUNCTION
INCITS/ISO/IEC 15946-3 : 2002 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 3: KEY ESTABLISHMENT
CSA ISO/IEC 10116 : 2007 : INC : COR 1 : 2009 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER
DD IEC PAS 62601 : DRAFT MAR 2009 INDUSTRIAL COMMUNICATION NETWORKS - FIELDBUS SPECIFICATIONS - WIA-PA COMMUNICATION NETWORK AND COMMUNICATION PROFILE
CSA ISO/IEC 9798-2 : 2010 : R2015 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS
CAN/CSA-ISO/IEC 18033-2:06 (R2016) INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS
BS ISO/IEC 18033-4 : 2005 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 4: STREAM CIPHERS
ISO/IEC 29167-10:2017 Information technology — Automatic identification and data capture techniques — Part 10: Crypto suite AES-128 security services for air interface communications
I.S. EN 419212-2:2017 APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 2: SIGNATURE AND SEAL SERVICES
I.S. EN 419212-1:2017 APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 1: INTRODUCTION AND COMMON DEFINITIONS
CSA ISO/IEC 29167-10 : 2016 INFORMATION TECHNOLOGY - AUTOMATIC IDENTIFICATION AND DATA CAPTURE TECHNIQUES - PART 10: CRYPTO SUITE AES-128 SECURITY SERVICES FOR AIR INTERFACE COMMUNICATIONS
I.S. EN 62734:2015 INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A
PREN 419212-5 : DRAFT 2016 APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 5: TRUSTED ESERVICE
ISO 11568-4:2007 Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle
ISO/IEC TR 29149:2012 Information technology Security techniques Best practices for the provision and use of time-stamping services
CEN/TS 16702-2:2015 Electronic fee collection - Secure monitoring for autonomous toll systems - Part 2: Trusted recorder
I.S. EN 15509:2014 ELECTRONIC FEE COLLECTION - INTEROPERABILITY APPLICATION PROFILE FOR DSRC
CEN ISO/TS 19299 : 2015 ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015)
CEN ISO/TS 17574:2017 Electronic fee collection - Guidelines for security protection profiles (ISO/TS 17574:2017)
CEN/TS 14821-5:2003 TRAFFIC AND TRAVEL INFORMATION (TTI) - TTI MESSAGES VIA CELLULAR NETWORKS - PART 5: INTERNAL SERVICES
EN 62734:2015 Industrial networks - Wireless communication network and communication profiles - ISA 100.11a
EN 62601:2016 Industrial networks - Wireless communication network and communication profiles - WIA-PA
ISO/IEC 11770-5:2011 Information technology Security techniques Key management Part 5: Group key management
TS 103 484-2 : 9.0.0 SMART CARDS; TEST SPECIFICATION FOR THE SECURE CHANNEL INTERFACE; PART 2: UICC FEATURES (RELEASE 9)
BS ISO/IEC 9798-2:2008 Information technology. Security techniques. Entity authentication Mechanisms using symmetric encipherment algorithms
09/30202174 DC : 0 BS EN 50159 - RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY RELATED COMMUNICATION IN TRANSMISSION SYSTEMS
INCITS/ISO/IEC 9798-4 : 1999 : R2005 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 4: MECHANISMS USING A CRYPTOGRAPHIC CHECK FUNCTION
ISO/IEC 24771:2014 Information technology Telecommunications and information exchange between systems MAC/PHY standard for ad hoc wireless network to support QoS in an industrial work environment
ISO/IEC 18013-3:2017 Information technology — Personal identification — ISO-compliant driving licence — Part 3: Access control, authentication and integrity validation
I.S. EN 419212-5:2018 APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 5: TRUSTED ESERVICE
S.R. CEN/TS 16702-2:2015 ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 2: TRUSTED RECORDER
EG 202 009-1 : 1.3.1 USER GROUP; QUALITY OF TELECOM SERVICES; PART 1: METHODOLOGY FOR IDENTIFICATION OF INDICATORS RELEVANT TO THE USERS
12/30236952 DC : 0 BS ISO/IEC 20009-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ANONYMOUS ENTITY AUTHENTICATION - PART 2: MECHANISMS BASED ON SIGNATURES USING A GROUP PUBLIC KEY
ISO/IEC 9797-3:2011 Information technology — Security techniques — Message Authentication Codes (MACs) — Part 3: Mechanisms using a universal hash-function
BS EN ISO 13141 : 2015 ELECTRONIC FEE COLLECTION - LOCALISATION AUGMENTATION COMMUNICATION FOR AUTONOMOUS SYSTEMS
BS ISO/IEC 20009-2:2013 Information technology. Security techniques. Anonymous entity authentication Mechanisms based on signatures using a group public key
14/30275432 DC : 0 BS ISO/IEC 29167-10 - INFORMATION TECHNOLOGY - AUTOMATIC IDENTIFICATION AND DATA CAPTURE TECHNIQUES - PART 10: CRYPTO SUITE AES-128 SECURITY SERVICES FOR AIR INTERFACE COMMUNICATIONS
ISO/TS 21719-2:2018 Electronic fee collection — Personalization of on-board equipment (OBE) — Part 2: Using dedicated short-range communication
11/30228418 DC : DRAFT JUNE 2011 BS ISO/IEC 29192-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 3: STREAM CIPHERS
TS 103 484-1 : 9.0.0 SMART CARDS; TEST SPECIFICATION FOR THE SECURE CHANNEL INTERFACE; PART 1: TERMINAL FEATURES (RELEASE 9)
PD ISO/TR 14742:2010 Financial services. Recommendations on cryptographic algorithms and their use
BS ISO/IEC 18367:2016 Information technology. Security techniques. Cryptographic algorithms and security mechanisms conformance testing
CSA ISO/IEC 10116 : 2007 : R2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER
CSA ISO/IEC 9797-2:2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 2: MECHANISMS USING A DEDICATED HASH-FUNCTION
ISO/TR 11633-2:2009 Health informatics Information security management for remote maintenance of medical devices and medical information systems Part 2: Implementation of an information security management system (ISMS)
CAN/CSA-ISO/IEC 9797-2:13 (R2017) Information technology - Security techniques - Message authentication codes (MACs) - Part 2: Mechanisms using a dedicated hash-function (Adopted ISO/IEC 9797-2:2011, second edition, 2011-05-01)
CSA ISO/IEC 9798-2 : 2010 : INC : COR 2 : 2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS
CSA ISO/IEC 10116 : 2007 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER
INCITS/ISO/IEC 18033-2 : 2008 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS
I.S. EN ISO 13141:2015 ELECTRONIC FEE COLLECTION - LOCALISATION AUGMENTATION COMMUNICATION FOR AUTONOMOUS SYSTEMS (ISO 13141:2015)
ISO/TR 11633-1:2009 Health informatics Information security management for remote maintenance of medical devices and medical information systems Part 1: Requirements and risk analysis
BS ISO/IEC 18013-3:2017 Information technology. Personal identification. ISO-compliant driving licence Access control, authentication and integrity validation
CAN/CSA-ISO/IEC 18367:18 Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing (Adopted ISO/IEC 18367:2016, first edition, 2016-12-15)
I.S. EN 14890-1:2008 APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
I.S. EN 62601:2016 INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - WIA-PA
PREN 50159 : DRAFT 2009 RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS
ISO/IEC 18367:2016 Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing
CEN/TS 16702-1:2014 Electronic fee collection - Secure monitoring for autonomous toll systems - Part 1: Compliance checking
04/30040717 DC : DRAFT JUL 2004 ISO/IEC 18033-2 - INFORMATION TECHNOLOGY - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS
08/30135059 DC : 0 ISO/IEC 9797-2 (REV) - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS)
TS 135 201 : 13.0.0 UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); LTE; 3G SECURITY; SPECIFICATION OF THE 3GPP CONFIDENTIALITY AND INTEGRITY ALGORITHMS; DOCUMENT 1: F8 AND F9 SPECIFICATION (3GPP TS 35.201 VERSION 14.0.0 RELEASE 14)
BS ISO/IEC 29192-2:2012 Information technology. Security techniques. Lightweight cryptography Block ciphers
PD CEN/TS 16702-2:2015 Electronic fee collection. Secure monitoring for autonomous toll systems Trusted recorder
DIN EN 62601:2016-10 Industrial networks - Wireless communication network and communication profiles - WIA-PA (IEC 62601:2015); English version EN 62601:2016
BS EN 50159:2010 Railway applications. Communication, signalling and processing systems. Safety-related communication in transmission systems
07/30163724 DC : 0 BS ISO/IEC 24727-4 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS PROGRAMMING INTERFACE - PART 4: API ADMINISTRATION
16/30332188 DC : 0 BS ISO/IEC 29167-10 - INFORMATION TECHNOLOGY - AUTOMATIC IDENTIFICATION AND DATA CAPTURE TECHNIQUES - PART 10: CRYPTO SUITE AES-128 SECURITY SERVICES FOR AIR INTERFACE COMMUNICATIONS
TS 131 113 : 8.0.0 UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); LTE; UNIVERSAL SUBSCRIBER IDENTITY MODULE APPLICATION TOOLKIT (USAT) INTERPRETER BYTE CODES
PD CEN/TS 16702-1:2014 Electronic fee collection. Secure monitoring for autonomous toll system Compliance checking
DIN EN 14890-1:2009-03 APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
07/30162384 DC : 0 BS ISO/IEC 7501-1 - IDENTIFICATION CARDS - MACHINE READABLE TRAVEL DOCUMENTS - PART 1: MACHINE READABLE PASSPORT
18/30354751 DC : DRAFT FEB 2018 BS ISO/IEC 18033-6 - INFORMATION TECHNOLOGY SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 6: HOMOMORPHIC ENCRYPTION
BS ISO/IEC 25185-1:2016 Identification cards. Integrated circuit card authentication protocols Protocol for Lightweight Authentication of Identity
07/30161079 DC : 0 BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
PD ISO/TR 11633-2:2009 Health informatics. Information security management for remote maintenance of medical devices and medical information systems Implementation of an information security management system (ISMS)
12/30255293 DC : 0 BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
16/30345808 DC : 0 BS EN 419212-1 - APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 1: INTRODUCTION AND COMMON DEFINITIONS
BS ISO/IEC 29150:2011 Information technology. Security techniques. Signcryption
CAN/CSA-ISO/IEC 25185-1:18 Identification cards — Integrated circuit card authentication protocols — Part 1: Protocol for Lightweight Authentication of Identity (Adopted ISO/IEC 25185-1:2016, first edition, 2016-01-15)
IEC PAS 62601:2009 Industrial communication networks - Fieldbus specifications - WIA-PA communication network and communication profile
CSA ISO/IEC 18033-4 : 2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 4: STREAM CIPHERS
BS EN 62734:2015 Industrial networks. Wireless communication network and communication profiles. ISA 100.11a
DIN CEN ISO/TS 19299;DIN SPEC 74125:2016-02 ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015)
INCITS/ISO/IEC 9798-2 : 2010 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS
INCITS/ISO/IEC 11770-5 : 2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 5: GROUP KEY MANAGEMENT
BS ISO/IEC 29167-10:2017 Information technology. Automatic identification and data capture techniques Crypto suite AES-128 security services for air interface communications
ANSI X9.58 : 2013 FINANCIAL TRANSACTION MESSAGES - ELECTRONIC BENEFITS TRANSFER (EBT) - SUPPLEMENTAL NUTRITION ASSISTANCE PROGRAM (SNAP) AND CASH BENEFIT PROGRAMS
ISO 15764:2004 Road vehicles Extended data link security
S.R. CEN/TS 16702-1:2014 ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 1: COMPLIANCE CHECKING
BS ISO/IEC 24727-4 : 2008 IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 4: APPLICATION PROGRAMMING INTERFACE (API) ADMINISTRATION
ISO/IEC 25185-1:2016 Identification cards Integrated circuit card authentication protocols Part 1: Protocol for Lightweight Authentication of Identity
I.S. EN 50159:2010 RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS
CEN/TR 16968:2016 Electronic Fee Collection - Assessment of security measures for applications using Dedicated Short-Range Communication
S.R. CWA 16926-65:2015 EXTENSIONS FOR FINANCIAL SERVICES (XFS) INTERFACE SPECIFICATION RELEASE 3.30 - PART 65: PIN KEYPAD DEVICE CLASS INTERFACE - MIGRATION FROM VERSION 3.20 (CWA 16374) TO VERSION 3.30 (THIS CWA) - PROGRAMMER'S REFERENCE
ISO/IEC 29192-2:2012 Information technology Security techniques Lightweight cryptography Part 2: Block ciphers
ECMA 409 : 2ED 2015 NFC-SEC-02: NFC-SEC CRYPTOGRAPHY STANDARD USING ECDH-256 AND AES-GCM
S.R. CWA 16374-65:2011 EXTENSIONS FOR FINANCIAL SERVICES (XFS) INTERFACE SPECIFICATION RELEASE 3.20 - PART 65: PIN KEYPAD DEVICE CLASS INTERFACE MIGRATION FROM VERSION 3.10 (CWA 15748) TO VERSION 3.20 (THIS CWA) PROGRAMMER'S REFERENCE
ISO 16609:2012 Financial services — Requirements for message authentication using symmetric techniques
ANSI X9.24-1 : 2017 RETAIL FINANCIAL SERVICES - SYMMETRIC KEY MANAGEMENT - PART 1: USING SYMMETRIC TECHNIQUES
ISO 20038:2017 Banking and related financial services — Key wrap using AES
S.R. CEN ISO/TS 19299:2015 ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015)
BS ISO 16609:2012 Financial services. Requirements for message authentication using symmetric techniques
S.R. CWA 15748-65:2008 EXTENSIONS FOR FINANCIAL SERVICES (XFS) INTERFACE SPECIFICATION - RELEASE 3.10 - PART 65: PIN KEYPAD DEVICE CLASS INTERFACE - MIGRATION FROM VERSION 3.03 (CWA 14050) TO VERSION 3.10 (THIS CWA) - PROGRAMMER'S REFERENCE
BS ISO/IEC 10116:2017 Information technology. Security techniques. Modes of operation for an <i>n</i>-bit block cipher
ISO/IEC 18033-4:2011 Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers
ISO/TR 14742:2010 Financial services Recommendations on cryptographic algorithms and their use
ISO/IEC 24727-4:2008 Identification cards Integrated circuit card programming interfaces Part 4: Application programming interface (API) administration
ISO/IEC 9797-2:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function
ISO/TR 19038:2005 Banking and related financial services Triple DEA Modes of operation Implementation guidelines
ISO/TS 19299:2015 Electronic fee collection Security framework
UNE-EN 50159:2011 Railway applications - Communication, signalling and processing systems - Safety-related communication in transmission systems
IEC 62734:2014 Industrial networks - Wireless communication network and communication profiles - ISA 100.11a
CEI EN 50159 : 2012 RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS
UNI EN 419212-1 : 2015 APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
UNI EN 15509 : 2014 ELECTRONIC FEE COLLECTION - INTEROPERABILITY APPLICATION PROFILE FOR DSRC
UNI CEI ISO/IEC 18013-3 : 2011 INFORMATION TECHNOLOGY - PERSONAL IDENTIFICATION - ISO-COMPLIANT DRIVING LICENCE - PART 3: ACCESS CONTROL, AUTHENTICATION AND INTEGRITY VALIDATION
PREN 419212-1 : DRAFT 2016 APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 1: INTRODUCTION AND COMMON DEFINITIONS
BS IEC 62601:2011 Industrial communication networks. Fieldbus specifications. WIA-PA communication network and communication profile
BS EN 419212-2:2017 Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services Signature and Seal Services
BS ISO/IEC 29192-1:2012 Information technology. Security techniques. Lightweight cryptography General
PD ISO/TR 11633-1:2009 Health informatics. Information security management for remote maintenance of medical devices and medical information systems Requirements and risk analysis
UNI CEN/TS 16702-1 : 2014 ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 1: COMPLIANCE CHECKING
ISO/IEC 9798-2:2008 Information technology Security techniques Entity authentication Part 2: Mechanisms using symmetric encipherment algorithms
DIN EN 14890-1 E : 2009 APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
DD CEN ISO/TS 17574:2009 Electronic fee collection. Guidelines for security protection profiles
DIN CEN ISO/TS 19299;DIN SPEC 74125:2016-02 ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015)
16/30345811 DC : 0 BS EN 419212-2 - APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 2: SIGNATURE AND SEAL SERVICES
BS ISO 20038:2017 Banking and related financial services. Key wrap using AES
PD CEN ISO/TS 19299:2015 Electronic fee collection. Security framework
07/30173155 DC : 0 BS ISO/IEC 9798-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS
TS 135 202 : 13.0.0 UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); LTE; 3G SECURITY; SPECIFICATION OF THE 3GPP CONFIDENTIALITY AND INTEGRITY ALGORITHMS; DOCUMENT 2: KASUMI SPECIFICATION (3GPP TS 35.202 VERSION 14.0.0 RELEASE 14)
09/30207165 DC : 0 BS EN 62601 - INDUSTRIAL COMMUNICATION NETWORKS - FIELDBUS SPECIFICATIONS - WIA-PA COMMUNICATION NETWORK AND COMMUNICATION PROFILE
BS ISO/IEC 9797-3:2011 Information technology. Security techniques. Message Authentication Codes (MACs) Mechanisms using a universal hash-function
11/30204850 DC : 0 BS ISO/IEC 29192-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 1: GENERAL
UNI CEN/TS 16439 : 2013 ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK
EN 300 674-3-1 : 3.0.0 DRAFT INTELLIGENT TRANSPORT SYSTEMS (ITS); ROAD TRANSPORT AND TRAFFIC TELEMATICS (RTTT); DEDICATED SHORT RANGE COMMUNICATIONS (DSRC); PART 3-1: TECHNICAL CHARACTERISTICS AND TEST METHODS FOR HIGH DATA RATE (HDR) DATA TRANSMISSION EQUIPMENT OPERATING IN THE 5,8 GHZ INDUSTRIAL, SCIENTIFIC AND MEDICAL (ISM) BAND
07/30161082 DC : 0 BS EN 14890-2 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 2: ADDITIONAL SERVICES
PREN 15509 : DRAFT 2012 ELECTRONIC FEE COLLECTION - INTEROPERABILITY APPLICATION PROFILE FOR DSRC
INCITS/ISO/IEC 10116 : 2008 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER
CAN/CSA-ISO/IEC 18033-4:13 (R2017) Information technology - Security techniques - Encryption algorithms - Part 4: Stream ciphers (Adopted ISO/IEC 18033-4:2011, second edition, 2011-12-15)
S.R. CEN/TS 16439:2013 ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK
S.R. CEN ISO/TS 17574:2017 ELECTRONIC FEE COLLECTION - GUIDELINES FOR SECURITY PROTECTION PROFILES (ISO/TS 17574:2017)
ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
INCITS/ISO/IEC 18033-4 : 2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 4: STREAM CIPHERS
S.R. CWA 16926-6:2015 EXTENSIONS FOR FINANCIAL SERVICES (XFS) INTERFACE SPECIFICATION RELEASE 3.30 - PART 6: PIN KEYPAD DEVICE CLASS INTERFACE - PROGRAMMER&#39;S REFERENCE
ISO/IEC 19772:2009 Information technology Security techniques Authenticated encryption
S.R. CWA 15748-6:2008 EXTENSIONS FOR FINANCIAL SERVICES (XFS) INTERFACE SPECIFICATION - RELEASE 3.10 - PART 6: PIN KEYPAD DEVICE CLASS INTERFACE - PROGRAMMER&#39;S REFERENCE
I.S. CWA 14890-2:2004 APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 2: ADDITIONAL SERVICES
ISO/IEC 7501-1:2008 Identification cards Machine readable travel documents Part 1: Machine readable passport
ISO/IEC 29150:2011 Information technology — Security techniques — Signcryption
CEN ISO/TS 21719-2:2018 Electronic fee collection - Personalization of on-board equipment (OBE) - Part 2: Using dedicated short-range communication (ISO/TS 21719-2:2018)
ISO/IEC 29192-1:2012 Information technology — Security techniques — Lightweight cryptography — Part 1: General
ISO/IEC 15444-8:2007 Information technology — JPEG 2000 image coding system: Secure JPEG 2000 — Part 8:
IEC 62280:2014 Railway applications - Communication, signalling and processing systems - Safety related communication in transmission systems
EN 50159:2010 Railway applications - Communication, signalling and processing systems - Safety-related communication in transmission systems
IEC 62601:2015 Industrial networks - Wireless communication network and communication profiles - WIA-PA
ISO/TS 17574:2017 Electronic fee collection — Guidelines for security protection profiles
EN 15509:2014 Electronic fee collection - Interoperability application profile for DSRC
EN 419212-1:2017 Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 1: Introduction and common definitions
EN 419212-2:2017 Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 2: Signature and Seal Services
EN 14890-1:2008 Application Interface for smart cards used as Secure Signature Creation Devices - Part 1: Basic services
08/30175546 DC : DRAFT SEP 2008 BS ISO/IEC 19785-4 - INFORMATION TECHNOLOGY - COMMON BIOMETRIC EXCHANGE FORMATS FRAMEWORK - PART 4: SECURITY BLOCK FORMAT SPECIFICATIONS
BS ISO/IEC 19772:2009 Information technology. Security techniques. Authenticated encryption
11/30231411 DC : 0 BS ISO 16609 - FINANCIAL SERVICES - REQUIREMENTS FOR MESSAGE AUTHENTICATION USING SYMMETRIC TECHNIQUES
10/30228415 DC : DRAFT NOV 2010 BS ISO/IEC 29192-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 2: BLOCK CIPHERS
PD ISO/IEC TR 29149:2012 Information technology. Security techniques. Best practices for the provision and use of time-stamping services
BS ISO/IEC 18033-2 : 2006 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS
S.R. CWA 16374-6:2011 EXTENSIONS FOR FINANCIAL SERVICES (XFS) INTERFACE SPECIFICATION RELEASE 3.20 - PART 6: PIN KEYPAD DEVICE CLASS INTERFACE PROGRAMMER&#39;S REFERENCE
ISO/IEC 20009-2:2013 Information technology — Security techniques — Anonymous entity authentication — Part 2: Mechanisms based on signatures using a group public key
ISO/IEC 18033-2:2006 Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
PD CEN/TS 16439:2013 Electronic fee collection. Security framework
DD CEN/TS 14821-5:2003 Traffic and Travel Information (TTI). TTI messages via cellular networks Internal services
BS ISO/IEC 9797-2:2011 Information technology. Security techniques. Message Authentication Codes (MACs) Mechanisms using a dedicated hash-function
PD CEN ISO/TS 17574:2017 Electronic fee collection. Guidelines for security protection profiles
07/30105115 DC : 0 BS ISO/IEC 19772 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - AUTHENTICATED ENCRYPTION
INCITS/ISO/IEC 24727-4 : 2009(R2014) IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 4: APPLICATION PROGRAMMING INTERFACE (API) ADMINISTRATION
UNI 11310 : 2013 ROAD TRAFFIC AND TRANSPORT TELEMATICS - AUTOMATIC DYNAMIC DEBITING SYSTEMS AND AUTOMATIC ACCESS CONTROL SYSTEMS USING DEDICATED SHORT-RANGE COMMUNICATION AT 5,8 GHZ - INTEROPERABILITY APPLICATION PROFILE FOR EETS
ES 200 674-1 : 2.4.1 INTELLIGENT TRANSPORT SYSTEMS (ITS); ROAD TRANSPORT AND TRAFFIC TELEMATICS (RTTT); DEDICATED SHORT RANGE COMMUNICATIONS (DSRC); PART 1: TECHNICAL CHARACTERISTICS AND TEST METHODS FOR HIGH DATA RATE (HDR) DATA TRANSMISSION EQUIPMENT OPERATING IN THE 5,8 GHZ INDUSTRIAL, SCIENTIFIC AND MEDICAL (ISM) BAND
TS 135 203 : 13.0.0 UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); LTE; 3G SECURITY; SPECIFICATION OF THE 3GPP CONFIDENTIALITY AND INTEGRITY ALGORITHMS; DOCUMENT 3: IMPLEMENTORS&#39; TEST DATA (3GPP TS 35.203 VERSION 14.0.0 RELEASE 14)
ANSI X9 TR 31 : 2010 INTEROPERABLE SECURE KEY EXCHANGE KEY BLOCK SPECIFICATION FOR SYMMETRIC ALGORITHMS
EN 419212-5:2018 Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 5: Trusted eService
ISO/IEC 24767-2:2009 Information technology Home network security Part 2: Internal security services: Secure Communication Protocol for Middleware (SCPM)
S.R. CEN/TR 16968:2016 ELECTRONIC FEE COLLECTION - ASSESSMENT OF SECURITY MEASURES FOR APPLICATIONS USING DEDICATED SHORT-RANGE COMMUNICATION
S.R. CEN ISO/TS 21719-2:2018 ELECTRONIC FEE COLLECTION - PERSONALIZATION OF ON-BOARD EQUIPMENT (OBE) - PART 2: USING DEDICATED SHORT-RANGE COMMUNICATION (ISO/TS 21719-2:2018)
ISO/IEC 13157-3:2016 Information technology Telecommunications and information exchange between systems NFC Security Part 3: NFC-SEC cryptography standard using ECDH-256 and AES-GCM
16/30345819 DC : 0 BS EN 419212-5 - APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 5: TRUSTED ESERVICE
BS EN 15509:2014 Electronic fee collection. Interoperability application profile for DSRC
ISO 13141:2015 Electronic fee collection — Localisation augmentation communication for autonomous systems
CEN/TS 16439:2013 Electronic fee collection - Security framework
EN ISO 13141:2015/A1:2017 ELECTRONIC FEE COLLECTION - LOCALISATION AUGMENTATION COMMUNICATION FOR AUTONOMOUS SYSTEMS (ISO 13141:2015/AMD 1:2017)

ISO/IEC 8825-1:2015 Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1:
ANSI X9.19 : 1996 FINANCIAL INSTITUTION RETAIL MESSAGE AUTHENTICATION
AS ISO/IEC 9797.2:2019 Information technology - Security techniques - Message Authentication Codes (MACs) Mechanisms using a dedicated hash-function
ISO/IEC 18033-3:2010 Information technology Security techniques Encryption algorithms Part 3: Block ciphers
ISO 8731-1:1987 Banking Approved algorithms for message authentication Part 1: DEA
ANSI X9.9 : 86(R1994) FINANCIAL INSTITUTION MESSAGE AUTHENTICATION (WHOLESALE)
ANSI X9.24-1 : 2017 RETAIL FINANCIAL SERVICES - SYMMETRIC KEY MANAGEMENT - PART 1: USING SYMMETRIC TECHNIQUES
ISO 9807:1991 Banking and related financial services Requirements for message authentication (retail)
ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
ISO/IEC 9798-1:2010 Information technology Security techniques Entity authentication Part 1: General

View more information
£159.00
Excluding VAT

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.