Your cart is currently empty!

ISO 14742:2010
ISO 14742:2010 Financial services – Recommendations on cryptographic algorithms and their use
CDN $273.00
Description
ISO/TR 14742:2010 provides a list of recommended cryptographic algorithms for use within applicable financial services standards prepared by ISO/TC 68. It also provides strategic guidance on key lengths and associated parameters and usage dates.
The focus is on algorithms rather than protocols, and protocols are in general not included in ISO/TR 14742:2010.
ISO/TR 14742:2010 deals primarily with recommendations regarding algorithms and key lengths.
The categories of algorithms covered in ISO/TR 14742:2010 are:
- block ciphers;
- stream ciphers;
- hash functions;
- message authentication codes (MACs);
- asymmetric algorithms;
- digital signature schemes giving message recovery,
- digital signatures with appendix,
- asymmetric ciphers;
- authentication mechanisms;
- key establishment and agreement mechanisms;
- key transport mechanisms.
ISO/TR 14742:2010 does not define any cryptographic algorithms; however, the standards to which ISO/TR 14742:2010 refers may contain necessary implementation information as well as more detailed guidance regarding choice of security parameters, security analysis, and other implementation considerations.
Edition
1
Published Date
2010-06-18
Status
PUBLISHED
Pages
31
Format 
Secure PDF
Secure – PDF details
- Save your file locally or view it via a web viewer
- Viewing permissions are restricted exclusively to the purchaser
- Device limits - 3
- Printing – Enabled only to print (1) copy
See more about our Environmental Commitment

Abstract
ISO/TR 14742:2010 provides a list of recommended cryptographic algorithms for use within applicable financial services standards prepared by ISO/TC 68. It also provides strategic guidance on key lengths and associated parameters and usage dates.
The focus is on algorithms rather than protocols, and protocols are in general not included in ISO/TR 14742:2010.
ISO/TR 14742:2010 deals primarily with recommendations regarding algorithms and key lengths.
The categories of algorithms covered in ISO/TR 14742:2010 are:
- block ciphers;
- stream ciphers;
- hash functions;
- message authentication codes (MACs);
- asymmetric algorithms;
- digital signature schemes giving message recovery,
- digital signatures with appendix,
- asymmetric ciphers;
- authentication mechanisms;
- key establishment and agreement mechanisms;
- key transport mechanisms.
ISO/TR 14742:2010 does not define any cryptographic algorithms; however, the standards to which ISO/TR 14742:2010 refers may contain necessary implementation information as well as more detailed guidance regarding choice of security parameters, security analysis, and other implementation considerations.
Previous Editions
Can’t find what you are looking for?
Please contact us at:
Related Documents
-
ISO 16840:2006 Wheelchair seating – Part 1: Vocabulary, reference axis convention and measures for body segments, posture and postural support surfaces
0 out of 5CDN $351.00 Add to cart -
ISO 5053:2019 Industrial trucks – Vocabulary – Part 2: Fork arms and attachments
0 out of 5CDN $351.00 Add to cart -
ISO 80004:2011 Nanotechnologies – Vocabulary – Part 7: Diagnostics and therapeutics for healthcare
0 out of 5CDN $115.00 Add to cart -
ISO 3833:1977 Road vehicles – Types – Terms and definitions
0 out of 5CDN $115.00 Add to cart