30.60 Close of voting/ comment period Oct 19, 2024
ISO
ISO/TC 68/SC 2 Financial Services, security
Technical Specification
This document provides a list of recommended ISO cryptographic algorithms for use within applicable ISO TC68 – Financial Services standards. It also provides strategic guidance on key lengths and associated parameters and usage dates.
This document deals primarily with recommendations regarding algorithms and key lengths. For standards on key management, see ISO 11568 ([18], [19], and [20]).
The categories of algorithms covered are:
a) Block ciphers –
b) Stream ciphers –
c) Tweakable ciphers –
d) Hash functions –
e) Message authentication codes (MACs) –
f) Asymmetric algorithms
1) Digital signature schemes giving message recovery
2) Digital signatures with appendix
3) Asymmetric ciphers
g) Authenticated encryption algorithms
h) Authentication mechanisms
i) Key wrapping
j) Key derivation, establishment and agreement mechanisms
k) Key transport mechanisms.
This document does not define any cryptographic algorithms; however the standards to which this document refers may contain necessary implementation information as well as more detailed guidance regarding choice of security parameters, security analysis, and other implementation considerations.
PUBLISHED
ISO/TR 14742:2010
IN_DEVELOPMENT
ISO/CD TS 14742
30.60
Close of voting/ comment period
Oct 19, 2024