Your cart is currently empty!

ISO 14742:2010
ISO 14742:2010 Financial services – Recommendations on cryptographic algorithms and their use
CDN $273.00
Description
ISO/TR 14742:2010 provides a list of recommended cryptographic algorithms for use within applicable financial services standards prepared by ISO/TC 68. It also provides strategic guidance on key lengths and associated parameters and usage dates.
The focus is on algorithms rather than protocols, and protocols are in general not included in ISO/TR 14742:2010.
ISO/TR 14742:2010 deals primarily with recommendations regarding algorithms and key lengths.
The categories of algorithms covered in ISO/TR 14742:2010 are:
- block ciphers;
- stream ciphers;
- hash functions;
- message authentication codes (MACs);
- asymmetric algorithms;
- digital signature schemes giving message recovery,
- digital signatures with appendix,
- asymmetric ciphers;
- authentication mechanisms;
- key establishment and agreement mechanisms;
- key transport mechanisms.
ISO/TR 14742:2010 does not define any cryptographic algorithms; however, the standards to which ISO/TR 14742:2010 refers may contain necessary implementation information as well as more detailed guidance regarding choice of security parameters, security analysis, and other implementation considerations.
Edition
1
Published Date
2010-06-18
Status
PUBLISHED
Pages
31
Format 
Secure PDF
Secure – PDF details
- Save your file locally or view it via a web viewer
- Viewing permissions are restricted exclusively to the purchaser
- Device limits - 3
- Printing – Enabled only to print (1) copy
See more about our Environmental Commitment

Abstract
ISO/TR 14742:2010 provides a list of recommended cryptographic algorithms for use within applicable financial services standards prepared by ISO/TC 68. It also provides strategic guidance on key lengths and associated parameters and usage dates.
The focus is on algorithms rather than protocols, and protocols are in general not included in ISO/TR 14742:2010.
ISO/TR 14742:2010 deals primarily with recommendations regarding algorithms and key lengths.
The categories of algorithms covered in ISO/TR 14742:2010 are:
- block ciphers;
- stream ciphers;
- hash functions;
- message authentication codes (MACs);
- asymmetric algorithms;
- digital signature schemes giving message recovery,
- digital signatures with appendix,
- asymmetric ciphers;
- authentication mechanisms;
- key establishment and agreement mechanisms;
- key transport mechanisms.
ISO/TR 14742:2010 does not define any cryptographic algorithms; however, the standards to which ISO/TR 14742:2010 refers may contain necessary implementation information as well as more detailed guidance regarding choice of security parameters, security analysis, and other implementation considerations.
Previous Editions
Can’t find what you are looking for?
Please contact us at:
Related Documents
-
ISO 4006:1991 Measurement of fluid flow in closed conduits – Vocabulary and symbols
0 out of 5CDN $351.00 Add to cart -
ISO 1176:1990 Road vehicles – Masses – Vocabulary and codes
0 out of 5CDN $115.00 Add to cart -
ISO 80004:2021 Nanotechnologies – Vocabulary – Part 6: Nano-object characterization
0 out of 5CDN $76.00 Add to cart -
ISO 2382:2015 Information technology – Vocabulary
0 out of 5CDN $0.00 Add to cart