This document provides a list of recommended ISO cryptographic algorithms for use within applicable ISO TC68 – Financial Services standards. It also provides strategic guidance on key lengths and associated parameters and usage dates.
This document deals primarily with recommendations regarding algorithms and key lengths. For standards on key management, see ISO 11568 ([18], [19], and [20]).
The categories of algorithms covered are:
a) Block ciphers –
b) Stream ciphers –
c) Tweakable ciphers –
d) Hash functions –
e) Message authentication codes (MACs) –
f) Asymmetric algorithms
1) Digital signature schemes giving message recovery
2) Digital signatures with appendix
3) Asymmetric ciphers
g) Authenticated encryption algorithms
h) Authentication mechanisms
i) Key wrapping
j) Key derivation, establishment and agreement mechanisms
k) Key transport mechanisms.
This document does not define any cryptographic algorithms; however the standards to which this document refers may contain necessary implementation information as well as more detailed guidance regarding choice of security parameters, security analysis, and other implementation considerations.
PUBLISHED
ISO/TR 14742:2010
IN_DEVELOPMENT
ISO/DTS 14742
50.20
Proof sent to secretariat or FDIS ballot initiated: 8 weeks
22 korr 2025
Vetëm seksionet informative të projekteve janë në dispozicion të publikut. Për të parë përmbajtjen e plotë, do t'ju duhet të krijoni një llogari. Nëse jeni anëtar, ju lutemi hyni në llogarinë tuaj duke klikuar në butonin "Identifikohu".