ISO

Available (778)

Showing 565 - 576 per page



ISO/IEC JTC 1/SC 27 11770-3:2015 - Key management - Part 3: Mechanisms using asymmetric techniques

This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals.

a) Establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B by key agreement.

b) Establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B via key transport.

c) Make an entity's public key available to other entities via key transport.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:11770:-3:ed-3:v1:en

ISO/IEC JTC 1/SC 27 11770-2:2018 - Key management - Part 2: Mechanisms using symmetric techniques

This document defines key establishment mechanisms using symmetric cryptographic techniques.
This document addresses three environments for the establishment of keys: Point-to-Point, Key Distribution Centre (KDC), and Key Translation Centre (KTC).

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:11770:-2:ed-3:v1:en

ISO/IEC JTC 1/SC 27 11770-1:2010 - Key management - Part 1: Framework

In information technology there is an ever-increasing need to use cryptographic mechanisms for the protection of data against unauthorised disclosure or manipulation, for entity authentication, and for non-repudiation functions. The security and reliability of such mechanisms are directly dependent on the management and protection afforded to a security parameter, the key.
This part of ISO/IEC 11770:

a) establishes the general model on which key management mechanisms are based.

b) defines the basic concepts of key management which are common to all the parts of ISO/IEC 11770.

c) specifies the characteristics of key management services.

d) establishes general principles on the management of keying material during its life cycle.

e) establishes the conceptual model of key distribution.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:11770:-1:ed-2:v1:en

ISO/IEC JTC 1/SC 27 10118-3:2018 Hash-functions - Part 3: Dedicated hash-functions

This document specifies dedicated hash-functions, i.e. specially designed hash-functions. The hash-functions in this document are based on the iterative use of a round-function. Distinct round-functions are specified, giving rise to distinct dedicated hash-functions.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:10118:-3:ed-4:v1:en

ISO/IEC JTC 1/SC 27 10118-2:2010 - Hash-functions - Part 2: Hash-functions using an n-bit block cipher

This part of ISO/IEC 10118 specifies hash-functions which make use of an n-bit block cipher algorithm.
Four hash-functions are specified. The first provides hash-codes of length less than or equal to n, where n is the block-length of the underlying block cipher algorithm used. The second provides hash-codes of length less than or equal to 2n; the third provides hash-codes of length equal to 2n; and the fourth provides hash-codes of length 3n.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:10118:-2:ed-3:v1:en

ISO/IEC JTC 1/SC 27 10118-1:2016 - Hash-functions - Part 1: General

ISO/IEC 10118 specifies hash-functions and is therefore applicable to the provision of authentication, integrity and non-repudiation services. Hash-functions can be used for:

— reducing a message to a short imprint for input to a digital signature mechanism.

— committing the user to a given string of bits without revealing this string.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:10118:-1:ed-3:v1:en

ISO/IEC JTC 1/SC 27 10116:2017 - Modes of operation for an n-bit block cipher

This document establishes five modes of operation for applications of an n-bit block cipher (e.g. protection of data during transmission or in storage). The defined modes only provide protection of data confidentiality.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:10116:ed-4:v1:en

ISO/IEC JTC 1/SC 27 9798-6:2010 - Entity authentication - Part 6: Mechanisms using manual data transfer

This part of ISO/IEC 9798 specifies eight entity authentication mechanisms based on manual data transfer between authenticating devices. It indicates how these mechanisms can be used to support key management functions, and provides guidance on secure choices of parameters for the mechanisms.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:9798:-6:ed-2:v1:en

ISO/IEC JTC 1/SC 27 11770-5:2011 - Key management - Part 5: Group key management

This part of ISO/IEC 11770 specifies key establishment mechanisms for multiple entities to provide procedures for handling cryptographic keying material used in symmetric or asymmetric cryptographic algorithms according to the security policy in force.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:11770:-5:ed-1:v1:en

ISO/IEC JTC 1/SC 27 27043:2015 - Incident investigation principles and processes

This International Standard provides guidelines based on idealized models for common incident investigation processes across various incident investigation scenarios involving digital evidence. This includes processes from pre-incident preparation through investigation closure, as well as any general advice and caveats on such processes.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:27043:ed-1:v1:en

ISO/IEC JTC 1/SC 27 27042:2015 - Guidelines for the analysis and interpretation of digital evidence

This International Standard provides guidance on the conduct of the analysis and interpretation of potential digital evidence in order to identify and evaluate digital evidence which can be used to aid understanding of an incident. The exact nature of the data and information making up the potential digital evidence will depend on the nature of the incident and the digital evidence sources involved in that incident.

This International Standard provides guidance on the analysis and interpretation of digital evidence in a manner which addresses issues of continuity, validity, reproducibility, and repeatability.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:27042:ed-1:v1:en