IT-säkerhet

Ämnesområden: IT-säkerhet
Kommittébeteckning: SIS/TK 318 (Informationssäkerhet)
Källa: ISO
Svarsdatum: den 10 nov 2018
Se merSe mindre
 

This document specifies broadcast authentication protocols, which are protocols that provide data integrity and entity authentication in a broadcast setting, i.e. a setting with one sender transmitting messages to many receivers. To provide entity authentication, there should be a pre-existing infrastructure which links the sender to a cryptographic secret. The establishment of such an infrastructure is beyond the scope of this document.

Ämnesområden: IT-säkerhet
Kommittébeteckning: SIS/TK 318 (Informationssäkerhet)
Källa: ISO
Svarsdatum: den 10 nov 2018
Se merSe mindre
 

This document specifies MAC algorithms suitable for applications requiring lightweight cryptographic

mechanisms. These mechanisms can be used as data integrity mechanisms to verify that data has not

been altered in an unauthorised manner. They can also be used as message authentication mechanisms

to provide assurance that a message has been originated by an entity in possession of the secret key.

The following MAC algorithms are specified in this document:

a) LightMAC;

b) Tsudik's keymode;

c) Chaskey-12.

Annex A defines the Object Identifiers for the MAC algorithms specified in this document.

Ämnesområden: IT-säkerhet
Kommittébeteckning: SIS/TK 611 (Systemintegration för unika enheters identifiering och dess attribut)
Källa: ISO
Svarsdatum: den 26 dec 2018
Se merSe mindre
 

This part of ISO/IEC 19823 describes methods for determining conformance to the security crypto suite defined in ISO/IEC 29167-21.

This part of ISO/IEC 19823 contains conformance tests for all mandatory functions.

The conformance parameters are the following:

— parameters that apply directly affecting system functionality and inter-operability

— protocol including commands and replies

— nominal values and tolerances

Unless otherwise specified, the tests in this part of ISO/IEC 19823 are to be applied exclusively to RFID tags and interrogators defined in the ISO/IEC 18000- series using ISO/IEC 29167-21.

Ämnesområden: IT-säkerhet
Kommittébeteckning: SIS/TK 611 (Systemintegration för unika enheters identifiering och dess attribut)
Källa: ISO
Svarsdatum: den 26 dec 2018
Se merSe mindre
 

This part of ISO/IEC 19823 describes methods for determining conformance to the security crypto suite defined in ISO/IEC 29167-22.

This part of ISO/IEC 19823 contains conformance tests for all mandatory functions.

The conformance parameters are the following:

— parameters that apply directly affecting system functionality and inter-operability

— protocol including commands and replies

— nominal values and tolerances

Unless otherwise specified, the tests in this part of ISO/IEC 19823 are to be applied exclusively to RFID tags and interrogators defined in the ISO/IEC 18000- series using ISO/IEC 29167-22.