Abstract
This document provides a list of recommended ISO cryptographic algorithms for use within applicable ISO TC68 – Financial Services standards. It also provides strategic guidance on key lengths and associated parameters and usage dates. This document deals primarily with recommendations regarding algorithms and key lengths. For standards on key management, see ISO 11568 ([18], [19], and [20]). The categories of algorithms covered are: a) Block ciphers – b) Stream ciphers – c) Tweakable ciphers – d) Hash functions – e) Message authentication codes (MACs) – f) Asymmetric algorithms 1) Digital signature schemes giving message recovery 2) Digital signatures with appendix 3) Asymmetric ciphers g) Authenticated encryption algorithms h) Authentication mechanisms i) Key wrapping j) Key derivation, establishment and agreement mechanisms k) Key transport mechanisms. This document does not define any cryptographic algorithms; however the standards to which this document refers may contain necessary implementation information as well as more detailed guidance regarding choice of security parameters, security analysis, and other implementation considerations.
General information
-
Status: Under developmentStage: CD consultation initiated [30.20]
-
Edition: 1
-
Technical Committee :ISO/TC 68/SC 2
- RSS updates
Life cycle
-
Previously
PublishedISO/TR 14742:2010
-
Now