ISO 15408-1 – Evaluation Criteria
Beschreibung ISO/IEC 15408-1:2009 establishes the general concepts and principles of IT security evaluation and specifies the general model of evaluation given by various parts of ISO/IEC 15408 which in its…
Beschreibung ISO/IEC 15408-1:2009 establishes the general concepts and principles of IT security evaluation and specifies the general model of evaluation given by various parts of ISO/IEC 15408 which in its…
Beschreibung ISO/IEC 14888 specifies digital signatures with appendix.ISO Weiterführende Links Das Dokument kann hier erworben werden. Schlagwörter Information technology — Security techniques — Digital signatures with appendix Status Aktuell: Stand…
Beschreibung This document defines key establishment mechanisms using symmetric cryptographic techniques.ISO Weiterführende Links Das Dokument kann hier erworben werden. Schlagwörter IT Security techniques — Key management — Mechanisms using symmetric…
Beschreibung This document specifies dedicated hash-functions, i.e. specially designed hash-functions. The hash-functions in this document are based on the iterative use of a round-function. Distinct round-functions are specified, giving rise…
Beschreibung ISO/IEC 10116:2017 data during transmission or in storage). The defined modes only provide protection of data confidentiality. Protection of data integrity is not within the scope of this document.…
Beschreibung ISO/IEC 9798-1:2010 specifies an authentication model and general requirements and constraints for entity authentication mechanisms which use security techniques. These mechanisms are used to corroborate that an entity is…
Beschreibung ISO/IEC 9797-1:2011 specifies six MAC algorithms that use a secret key and an n-bit block cipher to calculate an m-bit MAC.ISO.org Weiterführende Links Das Dokument kann hier erworben werden. Schlagwörter Information…
Beschreibung ISO/IEC 9796-2:2010 specifies three digital signature schemes giving message recovery, two of which are deterministic (non-randomized) and one of which is randomized. The security of all three schemes is…
Beschreibung ISO/IEC 7064 defines algorithms for calculating check digit characters. The checks should be applicable to alphanumeric strings and should be able to detect all single substitution errors, all or nearly all…
Auflistung Nachstehend finden Sie alle BSI-Standards, welche auf dieser Seite angeführt werden. BSI 200-3 : RisikomanagementBSI 100-1 : ISMSBSI 100-2 : ISMSBSI 100-3 : RisikomanagementBSI 100-4 : NotfallmanagementBSI SSL/TLS :…