ISO TR 14742-2010 Financial services - Recommendations on cryptographic algorithms and their use《金融服务 密码算法及其应用的推荐规范》.pdf
《ISO TR 14742-2010 Financial services - Recommendations on cryptographic algorithms and their use《金融服务 密码算法及其应用的推荐规范》.pdf》由会员分享,可在线阅读,更多相关《ISO TR 14742-2010 Financial services - Recommendations on cryptographic algorithms and their use《金融服务 密码算法及其应用的推荐规范》.pdf(38页珍藏版)》请在麦多课文档分享上搜索。
1、 Reference number ISO/TR 14742:2010(E) ISO 2010TECHNICAL REPORT ISO/TR 14742 First edition 2010-07-01 Financial services Recommendations on cryptographic algorithms and their use Services financiers Recommandations sur les algorithmes cryptographiques et leur utilisation ISO/TR 14742:2010(E) PDF dis
2、claimer This PDF file may contain embedded typefaces. In accordance with Adobes licensing policy, this file may be printed or viewed but shall not be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In downloading this file, parties
3、 accept therein the responsibility of not infringing Adobes licensing policy. The ISO Central Secretariat accepts no liability in this area. Adobe is a trademark of Adobe Systems Incorporated. Details of the software products used to create this PDF file can be found in the General Info relative to
4、the file; the PDF-creation parameters were optimized for printing. Every care has been taken to ensure that the file is suitable for use by ISO member bodies. In the unlikely event that a problem relating to it is found, please inform the Central Secretariat at the address given below. COPYRIGHT PRO
5、TECTED DOCUMENT ISO 2010 All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or ISOs
6、member body in the country of the requester. ISO copyright office Case postale 56 CH-1211 Geneva 20 Tel. + 41 22 749 01 11 Fax + 41 22 749 09 47 E-mail copyrightiso.org Web www.iso.org Published in Switzerland ii ISO 2010 All rights reservedISO/TR 14742:2010(E) ISO 2010 All rights reserved iiiConten
7、ts Page Foreword iv Introduction.v 1 Scope1 2 Measuring bits of security2 3 Algorithm migration 3 4 Block ciphers .4 4.1 General .4 4.2 Keying options.4 4.3 Recommended block ciphers 5 4.4 Block size and key use .6 4.5 Modes of operation .6 4.6 Enciphering small plaintexts7 4.7 Migrating from TDEA t
8、o AES7 5 Stream ciphers.7 6 Hash functions.7 6.1 Hash functions and their properties7 6.2 Hash functions based on block ciphers .8 6.3 Dedicated hash functions.8 6.4 Hash functions using modular arithmetic 10 6.5 Migrating from one hash function to another.10 7 Message authentication codes 11 7.1 Re
9、commended MAC algorithms 11 7.2 MAC algorithms based on block ciphers11 7.3 MAC algorithms based on hash functions .11 7.4 Length of the MAC.12 7.5 Message span of the key 12 8 Asymmetric algorithms.12 8.1 General .12 8.2 Factorization-based security mechanisms.14 8.3 Integer discrete logarithm-base
10、d security mechanisms.14 8.4 Elliptic curve discrete logarithm-based security mechanisms 15 8.5 Algorithm or key expiry 15 8.6 Digital signature schemes giving message recovery15 8.7 Digital signatures with appendix .16 8.8 Asymmetric ciphers 16 9 Random number generation.18 Annex A (informative) En
11、tity authentication and key management mechanisms .19 Bibliography28 ISO/TR 14742:2010(E) iv ISO 2010 All rights reservedForeword ISO (the International Organization for Standardization) is a worldwide federation of national standards bodies (ISO member bodies). The work of preparing International S
12、tandards is normally carried out through ISO technical committees. Each member body interested in a subject for which a technical committee has been established has the right to be represented on that committee. International organizations, governmental and non-governmental, in liaison with ISO, als
13、o take part in the work. ISO collaborates closely with the International Electrotechnical Commission (IEC) on all matters of electrotechnical standardization. International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2. The main task of technical committe
14、es is to prepare International Standards. Draft International Standards adopted by the technical committees are circulated to the member bodies for voting. Publication as an International Standard requires approval by at least 75 % of the member bodies casting a vote. In exceptional circumstances, w
15、hen a technical committee has collected data of a different kind from that which is normally published as an International Standard (“state of the art”, for example), it may decide by a simple majority vote of its participating members to publish a Technical Report. A Technical Report is entirely in
16、formative in nature and does not have to be reviewed until the data it provides are considered to be no longer valid or useful. Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. ISO shall not be held responsible for identifying any
17、or all such patent rights. ISO/TR 14742 was prepared by Technical Committee ISO/TC 68, Financial services, Subcommittee SC 2, Security management and general banking operations. ISO/TR 14742:2010(E) ISO 2010 All rights reserved vIntroduction The financial services industry has a clear need for crypt
18、ographic algorithms for a number of different applications. ISO standards provide definitions for an extensive and comprehensive set of such algorithms. However, as the state of the art of cryptology progresses and the power of computers increases, cryptographic algorithms as well as cryptographic k
19、eys of a particular length all have a limited window of time in which they can be considered secure. Furthermore, as neither the development of cryptology nor the increase in computing power are entirely predictable, the collective wisdom of the cryptographic community as to which algorithms and key
20、 lengths are secure is constantly evolving. For this reason it was felt that there was an equally clear need in the financial services industry for guidance regarding the current and up-to-date view in the cryptographic community about the security of cryptographic algorithms and their keys. It was
21、also felt that there was a need for appropriate guidance on migration from one algorithm or key length to another. The ISO standards that define cryptographic algorithms for the financial services industry do not contain such guidance, and by the evolving nature of the field, it would be difficult f
22、or them to do so. Hence, the need was recognized for a document that could contain such guidance, and be updated more frequently than the five year review cycle for ISO standards. This Technical Report is intended to be that document. The intention is to update this Technical Report when the need ar
23、ises, or at least every other year. The strength requirements of a security mechanism can vary depending on the application(s) in which the mechanism is being used and the way it is being used. The recommendations given in this Technical Report are considered to be general purpose recommendations. A
24、lthough it is accepted that there may exist low-risk applications that do not warrant the level of cryptographic strength recommended in this Technical Report, it is advisable that deviation from the recommendations only be made after appropriate analysis of the risks and in the context of any rules
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ISOTR147422010FINANCIALSERVICESRECOMMENDATIONSONCRYPTOGRAPHICALGORITHMSANDTHEIRUSE 金融 服务 密码 算法 及其 应用

链接地址:http://www.mydoc123.com/p-1257673.html