Standards/standards1 Min Read homerpaponMarch 6, 2025 ISO/IEC JTC 1/SC 27 9798-1:2010 Entity authentication – Part 1: General This part of ISO/IEC 9798 specifies an authentication model and general requirements and constraints for entity authentication mechanisms…
Standards/standards1 Min Read homerpaponMarch 6, 2025 ISO/IEC JTC 1/SC 27 9798-2:2008 Entity authentication – Part 2: Mechanisms using symmetric encipherment algorithms This part of ISO/IEC 9798 specifies entity authentication mechanisms using symmetric encipherment algorithms. Four of the mechanisms provide…
Standards/standards1 Min Read homerpaponMarch 6, 2025 ISO/IEC JTC 1/SC 27 10116:2017 – Modes of operation for an n-bit block cipher This document establishes five modes of operation for applications of an n-bit block cipher (e.g. protection of data during transmission or in…
Standards/standards1 Min Read homerpaponMarch 6, 2025 ISO/IEC JTC 1/SC 27 27002:2013 – Code of practice for information security controls This International Standard gives guidelines for organizational information security standards and information security management practices…
Standards/standards1 Min Read homerpaponMarch 6, 2025 ISO/IEC JTC 1/SC 27 27037:2012 Guidelines for identification, collection, acquisition and preservation of digital evidence This International Standard provides guidelines for specific activities in handling digital evidence, which are identification, collection,…
Standards/standards1 Min Read homerpaponMarch 6, 2025 ISO/IEC JTC 1/SC 27 27042:2015 – Guidelines for the analysis and interpretation of digital evidence This International Standard provides guidance on the conduct of the analysis and interpretation of potential digital evidence in order to…
Standards/standards1 Min Read homerpaponMarch 6, 2025 ISO/IEC JTC 1/SC 27 27043:2015 – Incident investigation principles and processes This International Standard provides guidelines based on idealized models for common incident investigation processes across various incident…
Standards/standards1 Min Read homerpaponMarch 6, 2025 ISO/IEC JTC 1/SC 27 11770-5:2011 – Key management – Part 5: Group key management This part of ISO/IEC 11770 specifies key establishment mechanisms for multiple entities to provide procedures for handling cryptographic…
Standards/standards1 Min Read homerpaponMarch 6, 2025 ISO/IEC JTC 1/SC 27 11770-6:2016 – Key management – Part 6: Key derivation This document specifies key derivation functions, i.e. functions which take secret information and other (public) parameters as input and…