Banking — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle
ISO 11568-2:2005 specifies techniques for the protection of symmetric and asymmetric cryptographic keys in a retail banking environment using symmetric ciphers and the life-cycle management of the associated symmetric keys. The techniques described enable compliance with the principles described in ISO 11568-1.
The techniques described are applicable to any symmetric key management operation.
Television METADATA - Part 2: Data encoding protocol using key-length-value
IEC 62261-2:2005(E) defines an octet-level data encoding protocol for representing data items and data groups. This protocol defines a data structure which is independent of the application or transportation method used. See the IEC Television Metadata Dictionary.
Information technology — Security techniques — Entity authentication — Part 6: Mechanisms using manu...
ISO/IEC 9798-6:2005 specifies four entity authentication mechanisms based on manual data transfer between authenticating devices. Such mechanisms may be appropriate in a variety of circumstances. One such application occurs in Personal Area Networks, where the owner of two personal devices capable of wireless communications wishes them to perform an entity authentication procedure as part of the…
Information technology - Security techniques - Entity authentication - Part 6: Mechanisms using manu...
ISO/IEC 9798-6:2005 specifies four entity authentication mechanisms based on manual data transfer between authenticating devices. Such mechanisms may be appropriate in a variety of circumstances. One such application occurs in Personal Area Networks, where the owner of two personal devices capable of wireless communications wishes them to perform an entity authentication procedure as part of the…
Gas cylinders — Identification and marking using radio frequency identification technology — Part 1:...
ISO 21007-1:2005 establishes a common framework for data structure for unambiguous identification of single or manifolded gas cylinders and for other common data elements in this sector. It also serves as a terminology document in the area of radio frequency identification (RFID) technology.
The scheme and reference model architecture proposed is designed to be an enabling structure to allow some…
Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers
ISO/IEC 18033-4:2005 specifies stream cipher algorithms. A stream cipher is an encryption mechanism that uses a keystream to encrypt a plaintext in bitwise or block-wise manner. A stream cipher is technically specified by choosing a keystream generator and a mode of stream ciphers.
ISO/IEC 18033-4:2005 specifies the following ways to generate keystream.
Mechanisms based on a block cipher: OFB,…
Information technology - Security techniques - Encryption algorithms - Part 4: Stream ciphers
ISO/IEC 18033-4:2005 specifies stream cipher algorithms. A stream cipher is an encryption mechanism that uses a keystream to encrypt a plaintext in bitwise or block-wise manner. A stream cipher is technically specified by choosing a keystream generator and a mode of stream ciphers.
ISO/IEC 18033-4:2005 specifies the following ways to generate keystream.
Mechanisms based on a block cipher: OFB,…
Fibre optic interconnecting devices and passive components - Basic test and measurement procedures -...
Describes methods to measure the endface angle of flat or convex angle-polished optical fibres. The primary attributes addressed include endface angle, key angle and radius of curvature.