Banking — Requirements for message authentication (wholesale)
Operation implies acceptance of the responsibility for their MAC (message authentication code) by the correspondent financial institutions. Specifies the method by which authentication algorithms are to be approved for inclusion in ISO 8731. It specifies a technique for protecting either the whole of the message or specified elements within it. The authentication of messages is independent of the…
Information Processing - SGML Support Facilities - Techniques for Using SGML
This National Standard of Canada is equivalent to ISO/IEC
Technical Report 9573.
1 Scope and Field of Application
This Technical Report complements ISO 8879 by providing additional tutorial information. It is not intended, and should not be regarded, as an extension, modification, or interpretation of ISO 8879. The SGML language contains a number of components, some of which are optional…
Mechanical vibration — Balancing — Shaft and fitment key convention
Is intended to provide compatibility of all balanced components so that when they are assembled they will meet the overall balance and/or vibration tolerance levels for that assembly.
Predominantly key-operated cast iron gate valves for underground use
Specifies requirements for two types of predominantly key-operated valves for underground use with flanges or spigot ends or socket ends. The two types shall be specified as type A or type B and shall include the following features: inside screw stem; wedge or parallel obturator; metallic or elastomeric obturator seatings; metallic or elastomeric body seatings; ferrous metal and/or copper alloy…
Describes the process whereby cryptographic keys and initialisation vectors (keying material) are provided for use by two parties and continue to be subject to secure handling procedures until they have been destroyed. Has been divided into sections as follows: One: General, Two: Manual distributionof keying material, Three: Automatic distribution of keying material. Annex A gives an example of…
Numeric keyboard for home electronic systems (HES)
Applies to all kinds of equipment with numeric input used in homes. Specifies the layout of numerical keyboards with three rows of three keys each plus a fourth row with at least one key. Note: -For the price of this publication, please consult the ISO/IEC price-code list.
Photography — Overhead projectors — Part 3: Film rolls, cores and winders — Dimensions
In addition to the film roll core dimensions and film roll diameters, this part of the standard specifies the dimensions of the keys on winders for film rolls fitted to the projetor scroll units or attachments. It does not require that scroll units for one projector type accept film rolls intended for another type.
Information processing — Modes of operation for a 64-bit block cipher algorithm
Defines four modes for any 64-bit block cipher algorithm using a secret key for applications such as data transmission, data storage authentication. Defines the formation of the starting variable and the values of parameters. Reference: ANSI X3.92-1981.
Information processing - Modes of operation for a 64-bit block cipher algorithm
Defines four modes for any 64-bit block cipher algorithm using a secret key for applications such as data transmission, data storage authentication. Defines the formation of the starting variable and the values of parameters. Reference: ANSI X3.92-1981.