Standard
Available Standards (316)
Showing standards 1 - 200
Standard
ISO/IEC - JTC 1/SC 27 - 27005:2018
This document provides guidelines for information security risk management in an organi...Standard
Security services using software-defined networking
Recommendation ITU-T X.1042 supports the protection of network resources using security... Wed, Jan 30 2019Standard
Air Traffic Management - Specification for software assurance levels
This Technical Specification specifies the technical, operational and maintenance requi... Thu, Apr 1 2010Working group
Standard
Application of risk management for IT-networks incorporating medical devices — Part 2-2: Guidance for the communication of medical device security needs, risks and controls
This part of IEC 80001 creates a framework for the disclosure of security-related capab... Sun, Jul 1 2012Standard
Artificial Intelligence (AI) — Bias in AI systems and AI aided decision making
Under DevelopmentStandard
Artificial Intelligence — Risk Management
Under DevelopmentStandard
Authenticated encryption
This International Standard specifies six methods for authenticated encryption, i.e. de... Sun, Feb 1 2009Standard
Authentication Step-Up Protocol and Metadata Version 1.0
The OASIS Trust Elevation TC works to define a set of standardized protocols that servi... Mon, May 1 2017Standard
Baseline identity management terms and definitions
Fri, Apr 30 2021Standard
Big data reference architecture — Part 1: Framework and application process
Under Development Thu, Feb 1 2018Standard
Big data reference architecture — Part 5: Standards roadmap
ISO/IEC TR 20547-2:2018 provides examples of big data use cases with application domain... Mon, Jan 1 2018Working group
Biometrics
Standardization of generic biometric technologies pertaining to human beings to support... Wed, Dec 18 2002Standard
Blind digital signatures -- Part 1: General
This document specifies principles, including a general model, a set of entities, a num... Tue, Nov 1 2016Standard
Blind digital signatures -- Part 2: Discrete logarithm based mechanisms
This part of ISO/IEC 18370 specifies blind digital signature mechanisms, together with ... Fri, Jul 1 2016Blockchain and distributed ledger technologies
Overview of identity management using blockchain and distributed ledger technologies ...Standard
Standard
Blockchain and distributed ledger technologies
Discovery issues related to interoperabilityStandard
Blockchain and distributed ledger technologies
Security management of digital asset custodiansStandard
Blockchain and distributed ledger technologies
Overview of and interactions between smart contracts in blockchain and distributed ledg...Standard
Blockchain and distributed ledger technologies -- Legally binding smart contracts
Blockchain and distributed ledger technologies -- Legally binding smart contracts ...Standard
Blockchain and distributed ledger technologies -- Privacy and personally identifiable information protection considerations
35.030 IT Security 35.240.99 IT applications in other fields 35.240.40 IT applications ...Standard
Blockchain and distributed ledger technologies -- Reference architecture
35.030 IT Security 35.240.40 IT applications in banking 35.240.99 IT applications in ot...Standard
Blockchain and distributed ledger technologies -- Security risks, threats and vulnerabilities
35.030 IT Security 35.240.40 IT applications in banking 35.240.99 IT applications in ot...Standard
Blockchain and distributed ledger technologies -- Taxonomy and Ontology
Standardisation of blockchain technologies and distributed ledger technologies.Standard
Blockchain and distributed ledger technologies -- Terminology
35.030 IT Security 35.240.40 IT applications in banking 01.040.35 Information technolog...Working group
Cards and security devices for personal identification
SC 17 continues to deliver card standards that are ubiquitous in their use by the world... Mon, Oct 3 2016Standard
Catalogue of architectural and design principles for secure products, systems and applications
This document provides a catalogue of architectural and design principles that can be u... Fri, Oct 1 2010Working group
CEN-CENELEC Focus Group on Cybersecurity
The Focus Group on Cybersecurity (CSCG) will support CEN and CENELEC to explore ways an...Working group
CEN/TC 224 - Personal identification and related personal devices with secure element, systems, operations and privacy in a multi sectorial environment
CEN/TC 224 multi-sectorial environment involves sectors such as Government/Citizen, Tra...Working group
Chairman advisory group
Preparation of a first draft business plan - Review the task list ( N08) provided by th...Standard
Check character systems
This International Standard specifies a set of check character systems capable of prote... Sat, Feb 1 2003Working group
Cloud Incident Response
With today’s fast-evolving threat landscape, a holistic cloud incident response framewo...Working group
Cloud Security Services Management
Collaboration and coordination among all stakeholders are critical to secure the cloud ...Standard
Competence requirements for information security testers and evaluators -- Part 1: Introduction, concepts and general requirements
This document defines terms and establishes an organized set of concepts and relationsh... Thu, Feb 1 2018Standard
Competence requirements for information security testers and evaluators -- Part 2: Knowledge, skills and effectiveness requirements for ISO/IEC 19790 testers
This document provides the minimum requirements for the knowledge, skills and effective... Wed, Aug 1 2018Standard
Competence requirements for information security testers and evaluators — Part 3: Knowledge, skills and effectiveness requirements for ISO/IEC 15408 evaluators.
This document provides the specialized requirements to demonstrate competence of indivi... Wed, Aug 1 2018Standard
Consumer protection - Privacy by design for consumer goods and services - Part 2: Use cases
This document provides illustrative use cases, with associated analysis, chosen to assi... Sun, Jan 1 2023Standard
Credential Management Level 1
This specification describes an imperative API enabling a website to request a user’s c... Thu, Jan 17 2019Standard
Cryptographic algorithms and security mechanisms conformance testing
This document gives guidelines for cryptographic algorithms and security mechanisms con... Thu, Dec 1 2016Standard
Cryptographic techniques based on elliptic curves -- Part 1: General
This part of ISO/IEC 15946 describes the mathematical background and general techniques... Sat, Jul 1 2006Standard
Cryptographic techniques based on elliptic curves -- Part 5: Elliptic curve generation
The ISO/IEC 15946 series specifies public-key cryptographic techniques based on ellipti... Tue, Aug 1 2017Standard
CSAF Common Vulnerability Reporting Framework (CVRF) Version 1.2
The OASIS CSAF Technical Committee is chartered to make a major revision to the Common ... Fri, Sep 1 2017Standard
Cybersecurity and ISO and IEC Standards
This document provides guidance on how to leverage existing standards in a cybersecurit... Thu, Feb 1 2018Working group
Data management and interchange
Standards for data management within and among local and distributed information system...Working group
Data Protection, Privacy and Identity Management
Data Protection, Privacy and Identity ManagementStandard
Design considerations for improved end-user perception of trustworthiness indicators
Fri, Mar 31 2017DevSecOps
Businesses are now requiring a stronger collaboration between the development, security...Standard
Digital signature schemes giving message recovery -- Part 2: Integer factorization based mechanisms
This part of ISO/IEC 9796 specifies three digital signature schemes giving message reco... Wed, Dec 1 2010Standard
Digital signature schemes giving message recovery -- Part 3: Discrete logarithm based mechanisms
This part of ISO/IEC 9796 specifies six digital signature schemes giving message recove... Sun, Oct 1 2006Standard
Digital signatures with appendix -- Part 1: General
ISO/IEC 14888 specifies several digital signature mechanisms with appendix for messages... Tue, Apr 1 2008Standard
Digital signatures with appendix -- Part 2: Integer factorization based mechanisms
This part of ISO/IEC 14888 specifies digital signatures with appendix whose security is... Tue, Apr 1 2008Standard
Digital signatures with appendix -- Part 3: Discrete logarithm based mechanisms
This document specifies digital signature mechanisms with appendix whose security is ba... Sun, Apr 1 2018Standard
DOI: 10.1109/TPSISA52974.2021.00032. The Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications
The metaverse promises a host of bright opportunities for business, economics, and soci... Wed, Dec 1 2021Standard
Encryption algorithms -- Part 1: General
This part of ISO/IEC 18033 is general in nature, and provides definitions that apply in... Sat, Aug 1 2015Standard
Encryption algorithms -- Part 2: Asymmetric ciphers
ISO/IEC 18033-2:2006 specifies encryption systems (ciphers) for the purpose of data con... Mon, May 1 2006Standard
Encryption algorithms -- Part 3: Block ciphers
This part of ISO/IEC 18033 specifies block ciphers. A block cipher maps blocks of n bit... Tue, Jun 1 2010Standard
Encryption algorithms -- Part 4: Stream ciphers
This part of ISO/IEC 18033 specifies a) output functions to combine a keystream with pl... Thu, Dec 1 2011Standard
Encryption algorithms -- Part 5: Identity-based ciphers
This part of ISO/IEC 18033 specifies identity-based encryption mechanisms. For each mec... Tue, Dec 1 2015Standard
Encryption algorithms -- Part 6: Homomorphic encryption
This document specifies the following mechanisms for homomorphic encryption. — Exponent... Wed, May 1 2019Standard
End-to-End Security and Group Authentication
The present document provides options and analyses for the security features and mechan... Thu, Sep 1 2016Standard
ETSI DGS/SAI-003 (in draft): Securing Artificial Intelligence (SAI); Security Testing of AI
Wed, Oct 23 2019Standard
ETSI GR QSC 001 V1.1.1
The present document gives an overview of the current understanding and best practice i... Sat, Feb 6 2016 (Sun, Feb 7 2016)Standard
ETSI GR QSC 003 V1.1.1
The present document examines a number of real-world uses cases for the deployment of q... Wed, Mar 1 2017 (Thu, Mar 2 2017)Standard
ETSI GR/SAI-005: Securing Artificial Intelligence (SAI); Mitigation Strategy Report
Tue, Mar 23 2021Standard
ETSI GS QKD 010 V0.4.1 (Draft)
The present document specifies protection of QKD modules against Trojan horse attacks l... Tue, Jan 5 2021 (Wed, Jan 6 2021)Standard
ETSI Securing Artificial Intelligence (SAI); AI Threat Ontology AI Threat Ontology
Wed, Jan 12 2022Working group
ETSI TC CYBER
TC CYBER is recognized as a major trusted centre of expertise offering market-driven cy...Standard
ETSI TR 103 570 V1.1.1
The present document compares a selection of proposals for quantum-safe key exchanges t... Mon, Jan 9 2017 (Tue, Jan 10 2017)Standard
Evaluation criteria for IT security -- Part 1: Introduction and general model
This part of ISO/IEC 15408 establishes the general concepts and principles of IT securi... Tue, Dec 1 2009Standard
Evaluation criteria for IT security -- Part 3: Security assurance components
This part of ISO/IEC 15408 defines the assurance requirements of ISO/IEC 15408. It incl... Fri, Aug 1 2008Standard
Feature Policy
This specification defines a mechanism that allows developers to selectively enable and... Tue, Apr 16 2019Standard
Standard
Framework for standardization of signatures - Extended structure including electronic identification and authentication
The regulation on electronic identification and trusted eServices (eIDAS regulation) cl... Mon, May 1 2017Standard
Framework of de-identification process for telecommunication service providers
Thu, Sep 3 2020Standard
Functional safety - Safety instrumented systems for the process industry sector - Part 1: Framework, definitions, system, hardware and application programming requirements
EC 61511-1:2016+A1:2017 gives requirements for the specification, design, installation,... Wed, Aug 16 2017Standard
Governance of IT — Governance implications of the use of artificial intelligence by organizations
Under DevelopmentStandard
Guidance for developing security and privacy functional requirements based on ISO/IEC 15408
This document provides guidance for: — selecting and specifying security functional req... Mon, Oct 1 2018Standard
Guidance for signature creation and other related devices
The present Technical Report provides guidance on the selection of standards and option... Mon, May 1 2017Standard
Guidance for the production of protection profiles and security targets
This document provides guidance relating to the construction of Protection Profiles (PP... Sun, Oct 1 2017Standard
Guidelines for cybersecurity
This International Standard provides guidance for improving the state of Cybersecurity.... Sat, Jul 1 2017Standard
Guidelines for the use and management of Trusted Third Party services
Associated with the provision and operation of a Trusted Third Party (TTP) are a number... Sat, Jun 1 2002Working group
High Performance Computing
‘Vanilla’ cloud environments were typically not made to handle harsh environments like ...Working group
Hybrid Cloud Security Services
As businesses are developing rapidly, and IT infrastructures are constantly diversified...Standard
Standard
IEEE - P7002 - Data Privacy Process
This standard defines requirements for a systems/software engineering process for priva...Standard
IEEE - P7004 - Standard on Child and Student Data Governance
The standard defines specific methodologies to help users certify how they approach acc...Standard
IEEE - P7005 - Standard for Transparent Employer Data Governance
The standard defines specific methodologies to help employers to certify how they appro...Working group
IEEE - WG-PDAI - Personal Data AI Agent Working Group
With the advent and rise of AI there is a risk that machine-to-machine decisions will b...Standard
IEEE 1402-2000 - IEEE Guide for Electric Power Substation Physical and Electronic Security
Security issues related to human intrusion upon electric power supply substations are i... Wed, Dec 10 2008Standard
IEEE 1619-2018 - C/CPSC - IEEE Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices
In this standards are defined cryptographic transform for protection of data in sector-...Standard
IEEE 1619-2018 - IEEE Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices
Cryptographic transform for protection of data in sector-level storage devices is speci... Fri, Jan 25 2019Standard
IEEE 1619.1-2007 - C/CPSC - IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices
This standard specifies cryptographic and data authentication procedures for storage de...Standard
IEEE 1667-2006 - C/CPSC - IEEE Standard Protocol for Authentication in Host Attachments of Transient Storage Devices
Cryptographic and data authentication procedures for storage devices that support lengt...Standard
IEEE 1667-2018 - C/CPSC - IEEE Standard for Discovery, Authentication, and Authorization in Host Attachments of Storage Devices
Discovery, authentication, and authorization protocols between hosts and storage device...Standard
IEEE 1686-2007 - PE/PSCC - IEEE Standard for Substation Intelligent Electronic Devices (IEDs) Cyber Security Capabilities
In this standards are defined the functions and features to be provided in substation i...Standard
IEEE 1686-2013 - PE/PSCC - IEEE Standard for Intelligent Electronic Devices Cyber Security Capabilities
In this standards are defined the functions and features to be provided in intelligent ...Standard
IEEE 1711-2010 - PE/PSCC - IEEE Trial-Use Standard for a Cryptographic Protocol for Cyber Security of Substation Serial Links
In this standards is defined a cryptographic protocol to provide integrity, and optiona...Standard
IEEE 1815.1-2015 - PE/PSCC - IEEE Standard for Exchanging Information Between Networks Implementing IEC 61850 and IEEE Std 1815(TM) [Distributed Network Protocol (DNP3)]
This document specifies the standard approach for mapping between IEEE Std 1815™ [Distr...Standard
IEEE 1901.1-2018 - IEEE Standard for Medium Frequency (less than 12 MHz) Power Line Communications for Smart Grid Applications
Physical (PHY) and media access control (MAC) layers of the medium frequency band (less... Mon, May 14 2018Standard
IEEE 2600-2008 - C/CPSC - IEEE Standard for Information Technology: Hardcopy Device and System Security
This standard defines security requirements (all aspects of security including but not ...Standard
IEEE C37.240-2014 - IEEE Standard Cybersecurity Requirements for Substation Automation, Protection, and Control Systems
Cybersecurity measures require that a balance be achieved between technical feasibility... Fri, Jan 30 2015Standard
IEEE P1711.1 - Standard for a Cryptographic Protocol for Cyber Security of Substation Serial Links: Substation Serial Protection Protocol
This standard defines a cryptographic protocol to provide integrity, and optional confi...Standard
IEEE P1912 - Standard for Privacy and Security Framework for Consumer Wireless Devices
This standard defines a privacy scale that shall be applied to data that is defined as ...Standard
IEEE P2846 - Assumptions for Models in Safety-Related Automated Vehicle Behavior
Thu, Sep 24 2020Standard
IEEE Standard Cybersecurity Requirements for Substation Automation, Protection, and Control Systems
The standard provides technical requirements for power system cybersecurity. Thu, May 2 2019Standard
IEEE Standard for Biometric Open Protocol
Identity assertion, role gathering, multilevel access control, assurance, and auditing ... Thu, Sep 27 2018Standard
IEEE Standard for Data Privacy Process
The requirements for a systems/software engineering process for privacy-oriented consid... Fri, Apr 1 2022Standard
IEEE Std 1888.3-2013, IEEE Standard for Ubiquitous Green Community Control Network: Security
The enhanced security management function for the protocol defined in IEEE 1888(TM), “U... Fri, Dec 6 2013Standard
Incident organization and security incident handling: Guidelines for telecommunication organizations
The purpose of this Recommendation is to analyse, structure and suggest a method for es... Fri, May 28 2004Standard
Information security controls for the energy utility industry
Effective information security in the process control domain of the energy utility sect... Sun, Oct 1 2017Standard
Information security management guidelines for cyber insurance
This document provides guidelines for adopting cyber insurance as a risk treatment opti...Working group
Information security, cybersecurity and privacy protection
The development of standards for the protection of information and ICT. This includes g... Thu, Oct 10 2019Standard
Information security, cybersecurity and privacy protection - Privacy enhancing data de-identification framework
This document provides a framework for identifying and mitigating re-identification ris... Tue, Nov 1 2022Standard
Information security, cybersecurity and privacy protection - Requirements for attribute-based unlinkable entity authentication
This document provides a framework and establishes requirements for attribute-based unl... Wed, Sep 1 2021Standard
Information security, cybersecurity and privacy protection - User-centric privacy preferences management framework
This document provides a user-centric framework for handling personally identifiable in... Sat, Oct 1 2022Standard
Information technology - Online privacy notices and consent
This document specifies controls which shape the content and the structure of online pr... Mon, Jun 1 2020Standard
Information technology - Security techniques - A framework for access management
ISO/IEC 29146:2016 defines and establishes a framework for access management (AM) and t... Wed, Jun 1 2016Standard
Information technology - Security techniques - A framework for identity management
ISO/IEC 24760-2:2015:- provides guidelines for the implementation of systems for the ma... Mon, Jun 1 2015Standard
Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015)
The standard provides guidelines for the security standards of organizational informati... Wed, Feb 1 2017Standard
Standard
Information technology - Security techniques - Entity authentication assurance framework
ISO/IEC 29115:2013 provides a framework for managing entity authentication assurance in... Mon, Apr 1 2013Standard
Information technology - Security techniques - Guidance on assuring suitability and adequacy of incident investigative method (ISO/IEC 27041:2015)
The standard provides a guideline on the mechanisms to ensure that the methods and proc... Mon, Aug 1 2016Standard
Information technology - Security techniques - Guidelines for identification, collection, acquisition and preservation of digital evidence (ISO/IEC 27037:2012)
The standard defines the specific guidelines for the management of digital data which a... Tue, Aug 2 2016Standard
Information technology - Security techniques - Guidelines for privacy impact assessment
This document gives guidelines for:- a process on privacy impact assessments, and- a st... Mon, May 1 2023Standard
Information technology - Security techniques - Identity proofing
The ISO/IEC TS 29003:2018 standard:- gives guidelines for the identity proofing of a pe... Thu, Mar 1 2018Standard
Information technology - Security techniques - Incident investigation principles and processes (ISO/IEC 27043:2015)
Describes guidelines based on idealized models for common incident investigation proces... Mon, Aug 1 2016Standard
Information technology - Security techniques - Information security management systems - Overview and vocabulary (ISO/IEC 27000:2016)
This document provides a standardized IoT Reference Architecture using a common vocabul... Wed, Aug 1 2018Standard
Information technology - Security techniques - Privacy engineering for system life cycle processes
This document provides privacy engineering guidelines that are intended to help organiz... Sun, Sep 1 2019Standard
Information technology - Security techniques - Privacy framework
ISO/IEC 29100:2011 provides a privacy framework which- specifies a common privacy termi... Thu, Dec 1 2011Standard
Information technology - Security techniques - Specification for digital redaction (ISO/IEC 27038:2014)
The international standard specifies the technical characteristics for the preparation ... Mon, Aug 1 2016Standard
Information technology - Security techniques - Specification for digital redaction (ISO/IEC 27038:2014)
The international standard specifies the technical characteristics for the preparation ... Mon, Aug 1 2016Standard
Information technology -- Biometric application programming interface -- Part 1: BioAPI specification
ISO/IEC 19784-1:2018 defines the Application Programming Interface (API) and Service Pr... Sun, Apr 1 2018Standard
Information technology -- Biometric Identity Assurance Services -- Part 1: BIAS services
ISO/IEC 30108-1:2015 defines the architecture, operations, data elements, and basic req... Sun, Nov 1 2015Standard
Information technology -- Biometric presentation attack detection -- Part 1: Framework
The purpose of ISO/IEC 30107-1 is to provide a foundation for PAD through defining term... Fri, Jan 1 2016Standard
Information technology -- Common Biometric Exchange Formats Framework -- Part 1: Data element specification
ISO/IEC 19785-1:2015 defines structures and data elements for biometric information rec... Sat, Aug 1 2015Standard
Information technology -- Object oriented BioAPI -- Part 1: Architecture
ISO/IEC 30106-1:2016 specifies an architecture for a set of interfaces which define the... Tue, Mar 1 2016Standard
Information technology -- Vocabulary -- Part 37: Biometrics
ISO/IEC 2382-37:2017 establishes a systematic description of the concepts in the field ... Wed, Feb 1 2017Standard
Information technology — Big data — Overview and vocabulary
This document provides a set of terms and definitions needed to promote improved commun... Fri, Feb 1 2019Standard
Information technology — Process reference model (PRM) for information security management
ISO/IEC TS 33052:2016 defines a process reference model (PRM) for the domain of informa... Thu, Jun 30 2016Standard
Information technology — Security techniques — A framework for identity management — Part 2: Reference architecture and requirements
ISO/IEC 24760-2:2015 provides guidelines for the implementation of systems for the mana... Tue, Jun 30 2015Standard
Information technology — Security techniques — Biometric information protection
ISO/IEC 24745:2011 provides guidance for the protection of biometric information under ... Thu, Jun 30 2011Standard
Information technology — Security techniques — Guidelines for privacy impact assessment
ISO/IEC 29134:2017 gives guidelines for - a process on privacy impact assessments, and ... Fri, Jun 30 2017Standard
Information technology — Security techniques — Privacy architecture framework
This document defines a privacy architecture framework that: — specifies concerns for I... Fri, Nov 30 2018Standard
Information technology — Security techniques — Requirements for partially anonymous, partially unlinkable authentication.
ISO/IEC 29191:2012 provides a framework and establishes requirements for partially anon... Sun, Dec 30 2012Standard
Information technology — Cybersecurity — Overview and concepts
This document provides the overview of cybersecurity. The terms and definitions provide... Wed, Dec 30 2020Standard
Information technology, cybersecurity and privacy protection - Cybersecurity framework development guidelines
This document specifies guidelines for developing a cybersecurity framework. It is appl... Mon, Feb 1 2021Standard
Interoperability of Flight Data Processing (Air Traffic Control - Air Traffic Control) for application under the Single European Sky - Interoperability Regulation EC 552/2004
This Technical Specification is for the production of conformity evidence for FDP-FDP g... Wed, Sep 1 2010Standard
ISO 25237:2017, 3.42.Health informatics: Pseudonymization
ISO 25237:2017 contains principles and requirements for privacy protection using pseudo... Mon, Jan 30 2017Standard
ISO/IEC JTC 1/SC 27/WG1 27000:2018 - Information security management systems - Overview and vocabulary
This document provides the overview of information security management systems (ISMS)....Standard
Standard
Standard
ISO/IEC 9797-3:2011 Message Authentication Codes (MACs) - Part 3: Mechanisms using a universal hash-function
This part of ISO/IEC 9797 specifies the following MAC algorithms that use a secret key ...Standard
Standard
ISO/IEC CD 23837-1.2
Information technology security techniques — Security requirements, test and evaluation...Standard
Standard
ISO/IEC JTC 1/SC 27 11770-3:2015 - Key management - Part 3: Mechanisms using asymmetric techniques
This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric crypto...Standard
ISO/IEC JTC 1/SC 27 9798-4:1999 Entity authentication - Part 4: Mechanisms using a cryptographic check function
This part of ISO/IEC 9798 specifies entity authentication mechanisms using a cryptograp...Standard
ISO/IEC JTC 1/SC 27 10118-1:2016 - Hash-functions - Part 1: General
ISO/IEC 10118 specifies hash-functions and is therefore applicable to the provision of ...Standard
ISO/IEC JTC 1/SC 27 10118-2:2010 - Hash-functions - Part 2: Hash-functions using an n-bit block cipher
This part of ISO/IEC 10118 specifies hash-functions which make use of an n-bit block ci...Standard
ISO/IEC JTC 1/SC 27 10118-3:2018 Hash-functions - Part 3: Dedicated hash-functions
This document specifies dedicated hash-functions, i.e. specially designed hash-function...Standard
ISO/IEC JTC 1/SC 27 11770-1:2010 - Key management - Part 1: Framework
In information technology there is an ever-increasing need to use cryptographic mechani...Standard
ISO/IEC JTC 1/SC 27 11770-2:2018 - Key management - Part 2: Mechanisms using symmetric techniques
This document defines key establishment mechanisms using symmetric cryptographic techni...Standard
ISO/IEC JTC 1/SC 27 11770-5:2011 - Key management - Part 5: Group key management
This part of ISO/IEC 11770 specifies key establishment mechanisms for multiple entities...Standard
ISO/IEC JTC 1/SC 27 11770-6:2016 - Key management - Part 6: Key derivation
This document specifies key derivation functions, i.e. functions which take secret info...Standard
ISO/IEC JTC 1/SC 27 13888-1:2009 - Non-repudiation - Part 1: General
The goal of a non-repudiation service is to generate, collect, maintain, make available...Standard
ISO/IEC JTC 1/SC 27 27002:2013 - Code of practice for information security controls
This International Standard gives guidelines for organizational information security s...Standard
ISO/IEC JTC 1/SC 27 27037:2012 Guidelines for identification, collection, acquisition and preservation of digital evidence
This International Standard provides guidelines for specific activities in handling di...Standard
ISO/IEC JTC 1/SC 27 27042:2015 - Guidelines for the analysis and interpretation of digital evidence
This International Standard provides guidance on the conduct of the analysis and interp...Standard
ISO/IEC JTC 1/SC 27 27043:2015 - Incident investigation principles and processes
This International Standard provides guidelines based on idealized models for common i...Standard
ISO/IEC JTC 1/SC 27 9798-1:2010 Entity authentication - Part 1: General
This part of ISO/IEC 9798 specifies an authentication model and general requirements an...Standard
ISO/IEC JTC 1/SC 27 9798-2:2008 Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms
This part of ISO/IEC 9798 specifies entity authentication mechanisms using symmetric en...Standard
ISO/IEC JTC 1/SC 27 10116:2017 - Modes of operation for an n-bit block cipher
This document establishes five modes of operation for applications of an n-bit block ci...Standard
ISO/IEC JTC 1/SC 27 27038:2014 - Specification for digital redaction
Some documents can contain information that must not be disclosed to some communities. ...Standard
ISO/IEC JTC 1/SC 27 27041:2015 - Guidance on assuring suitability and adequacy of incident investigative method
This International Standard provides guidance on mechanisms for ensuring that methods ...Standard
ISO/IEC JTC 1/SC 27 9797-2:2011 Message Authentication Codes (MACs) - Part 2: Mechanisms using a dedicated hash-function
This part of ISO/IEC 9797 specifies three MAC algorithms that use a secret key and a ha...Standard
ISO/IEC JTC 1/SC 27 9798-5:2009 - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques
This part of ISO/IEC 9798 specifies entity authentication mechanisms using zero-knowled...Standard
ISO/IEC JTC 1/SC 27 9798-6:2010 - Entity authentication - Part 6: Mechanisms using manual data transfer
This part of ISO/IEC 9798 specifies eight entity authentication mechanisms based on man...Working group
ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection
The development of standards for the protection of information and ICT. This includes g...Standard
ISO/IEC JTC 1/SC 27/WG 1 27001:2013 - Information security management systems - Requirements
This International Standard specifies the requirements for establishing, implementin...Standard
ISO/IEC JTC 1/SC27 9798-3:2019 Entity authentication Part 3: Mechanisms using digital signature techniques
This document specifies entity authentication mechanisms using digital signatures based...Standard
Standard
Standard