1.212.642.4980     info@ansi.org    8:30am – 6pm EST, Monday – Friday
ANSI Standards Store

Browse ISO Standards
Browse IEC Standards

View all Publishers





View All Standards Packages



Search tips Search tips


Encryption and Cryptography Standards Encryption and cryptography standards address a range of algorithms and applications, as well as a host of related security considerations that factor into successful implementation. Topics are divided below for ease of locating the standard you are looking for, although in many cases the categories are interrelated in the way they would be implemented in practice. Similarly, our page for IT Security contains interrelated standards that would be used in conjunction.

go back to Software Standards home

  • Time Stamping
  • Message Authentication Codes
  • Non-Repudiation
  • Elliptical Curves

  • Encryption

    Encryption

    Digital Signature/Cryptography Package

    Digital Signature/Cryptography Package features over 15 standards and a 35% discount...

    ISO/IEC 29128:2011

    Information technology - Security techniques - Verification of cryptographic protocols

    ISO/IEC 19772:2009

    Information technology - Security techniques - Authenticated encryption

    ISO/IEC 7064:2003

    Information technology - Security techniques - Check character systems

    SCTE 52 2013

    Data Encryption Standard - Cipher Block Chaining Packet Encryption Specification

    ISO/IEC 10116:2006

    Information technology - Security techniques - Modes of operation for an n-bit block cipher

    ISO/IEC 10116/Cor1:2008

    Information technology - Modes of operation for an n-bit block cipher algorithm - Corrigendum

    ISO/IEC 23009-4:2013

    Information technology - Dynamic adaptive streaming over HTTP (DASH) - Part 4: Segment encryption and authentication

    ISO 14819-6:2006

    Traffic and Traveller Information (TTI) - TTI messages via traffic message coding - Part 6: Encryption and conditional access for the Radio Data System - Traffic Message Channel ALERT C coding

    IEEE 802.1AEbn-2011

    IEEE Standard for Local and metropolitan area networks--Media Access Control (MAC) Security Amendment 1: Galois Counter Mode--Advanced Encryption Standard-- 256 (GCM-AES-256) Cipher Suite

    FED-STD-1026

    Interoperability and Security Requirements for Use of the Data Encryption Standard in the Physical Layer of Data Communications

    FED-STD-1027

    General Security Requirements for Equipment Using the Data Encryption Standard

    IEEE 1619.1-2007

    IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices

    IEEE Std 1619.2-2010

    IEEE Standard for Wide-Block Encryption for Shared Storage Media

    IEEE Std 1619-2007

    IEEE Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices


    Entity Authentication

    Entity Authentication

    ISO/IEC 9798-1:2010

    Information technology - Security techniques - Entity authentication - Part 1: General

    ISO/IEC 9798-2:2008

    Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms

    ISO/IEC 9798-2:2008/Cor3:2013

    Corrigendum

    ISO/IEC 9798-3:1998

    Information technology - Security techniques - Entity authentication - Part 3: Mechanisms using digital signature techniques

    ISO/IEC 9798-3/Cor1:2009

    Information technology - Security techniques - Entity authentication mechanisms - Part 3: Entity authentication using a public key algorithm - Corrigendum

    ISO/IEC 9798-3/Amd1:2010

    Information technology - Security techniques - Entity authentication mechanisms - Part 3: Entity authentication using a public key algorithm - Amendment 1: .

    ISO/IEC 9798-3/Cor2:2012

    Information technology - Security techniques - Entity authentication mechanisms - Part 3: Entity authentication using a public key algorithm - Corrigendum 2

    ISO/IEC 9798-4:1999

    Information technology -- Security techniques -- Entity authentication -- Part 4: Mechanisms using a cryptographic check function

    ISO/IEC 9798-4/Cor1:2009

    Information technology - Security techniques - Entity authentication - Part 4: Mechanisms using a cryptographic check function - Corrigendum

    ISO/IEC 9798-4/Cor2:2012

    Information technology - Security techniques - Entity authentication - Part 4: Mechanisms using a cryptographic check function - Corrigendum 1

    ISO/IEC 9798-5:2009

    Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques

    ISO/IEC 9798-6:2010

    Information technology - Security techniques - Entity authentication - Part 6: Mechanisms using manual data transfer

    ISO/IEC 20009-1:2013

    Information technology - Security techniques - Anonymous entity authentication - Part 1: General

    ISO/IEC 29115:2013

    Information technology - Security techniques - Entity authentication assurance framework

    ISO/IEC 24760-1:2011

    Information technology - Security techniques - A framework for identity management - Part 1: Terminology and concepts

    ISO/IEC 29191:2012

    Information technology - Security techniques - Requirements for partially anonymous, partially unlinkable authentication.

    ISO/IEC 7816-15:2016

    Identification cards - Integrated circuit cards - Part 15: Cryptographic information application


    Digital Signature

    Digital Signature

    ISO/IEC 14888-1:2008

    Information technology - Security techniques - Digital signatures with appendix - Part 1: General

    ISO/IEC 14888-2:2008

    Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms

    ISO/IEC 14888-3:2016

    Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms

    ISO/IEC 15945:2002

    Information technology - Security techniques - Specification of TTP services to support the application of digital signatures

    ISO/IEC 9796-2:2010

    Information technology - Security techniques - Digital signature schemes giving message recovery - Part 2: Integer factorization based mechanisms

    ISO/IEC 9796-3:2006

    Information technology - Security techniques - Digital signature schemes giving message recovery - Part 3: Discrete logarithm based mechanisms


    Key Management

    Key Management

    ISO/IEC 11770-1:2010

    Information technology - Security techniques - Key management - Part 1: Framework

    ISO/IEC 11770-2:2008

    Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques

    ISO/IEC 11770-2/Cor1:2009

    Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques - Corrigendum 1

    ISO/IEC 11770-3:2015

    Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques

    ISO/IEC 11770-4:2006

    Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets

    ISO/IEC 11770-4/Cor1:2009

    Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets - Corrigendum 1

    ISO/IEC 11770-5:2011

    Information technology - Security techniques - Key management - Part 5: Group key management


    Public Key

    Public Key

    ISO/IEC 29150:2011

    Information technology - Security techniques - Signcryption

    ANSI X9.44-2007

    Key Establishment Using Integer Factorization Cryptography

    IEEE 1363-2000

    Standard Specifications for Public Key Cryptography

    IEEE Std 1363.1-2008

    IEEE Standard Specification for Public Key Cryptographic Techniques Based on Hard Problems over Lattices

    IEEE 1363.2-2008

    Standard Specifications for Password-Based Public-Key Cryptographic Techniques

    IEEE 1363.3-2013

    IEEE Standard for Identity-Based Cryptographic Techniques using Pairings

    IEEE Std 1363a-2004

    IEEE Standard Specifications for Public-Key Cryptography - Amendment 1: Additional Techniques


    Algorithms

    Algorithms

    ISO/IEC 18031:2011

    Information technology - Security techniques - Random bit generation

    ISO/IEC 18031:2011/Cor1:2014

    Corrigendum

    ISO/IEC 18032:2005

    Information technology - Security techniques - Prime number generation

    ISO/IEC 18033-1:2015

    Information technology - Security techniques - Encryption algorithms - Part 1: General

    ISO/IEC 18033-2:2006

    Information technology - Security techniques - Encryption algorithms - Part 2: Asymmetric ciphers

    ISO/IEC 18033-3:2010

    Information technology - Security techniques - Encryption algorithms - Part 3: Block ciphers

    ISO/IEC 18033-4:2011

    Information technology - Security techniques - Encryption algorithms - Part 4: Stream ciphers


    Hash Functions

    Hash Functions

    ISO/IEC 10118-1:2016

    Information technology - Security techniques - Hash-functions - Part 1: General

    ISO/IEC 10118-2:2010

    Information technology - Security techniques - Hash-functions - Part 2: Hash-functions using an n-bit block cipher

    ISO/IEC 10118-2/Cor1:2011

    Information technology - Security techniques - Hash-functions - Part 2: Hash-functions using an n-bit block cipher algorithm - Corrigendum 1

    ISO/IEC 10118-3:2004

    Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash-functions

    ISO/IEC 10118-3/Amd1:2006

    Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash-functions - Amendment 1: Dedicated Hash-Function 8 (SHA-224)

    ISO/IEC 10118-3/Cor1:2011

    Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash-functions - Corrigendum 1

    ISO/IEC 10118-4:1998

    Information technology - Security techniques - Hash-functions - Part 4: Hash-functions using modular arithmetic

    ISO/IEC 10118-4:1998/Cor1:2014

    Corrigendum

    ISO/IEC 10118-4:1998/Amd1:2014

    - Amendment 1: Object identifiers


    Lightweight Cryptography

    Lightweight Cryptography

    ISO/IEC 29192-1:2012

    Information technology - Security techniques - Lightweight cryptography - Part 1: General

    ISO/IEC 29192-2:2012

    Information technology - Security techniques - Lightweight cryptography - Part 2: Block ciphers

    ISO/IEC 29192-3:2012

    Information technology - Security techniques - Lightweight cryptography - Part 3: Stream ciphers

    ISO/IEC 29192-4:2013

    Information technology - Security techniques - Lightweight cryptography - Part 4: Mechanisms using asymmetric techniques


    Time Stamping

    Time Stamping

    ISO/IEC 18014-1:2008

    Information technology - Security techniques - Time-stamping services - Part 1: Framework

    ISO/IEC 18014-2:2009

    Information technology - Security techniques - Time-stamping services - Part 2: Mechanisms producing independent tokens

    ISO/IEC 18014-3:2009

    Information technology - Security techniques - Time-stamping services - Part 3: Mechanisms producing linked tokens

    ISO/IEC TR 29149:2012

    Information technology - Security techniques - Best practices for the provision and use of time-stamping services


    Message Authentication Codes

    Message Authentication Codes

    ISO/IEC 9797-1:2011

    Information technology - Security techniques - Message Authentication Codes (MACs) - Part 1: Mechanisms using a block cipher

    ISO/IEC 9797-2:2011

    Information technology - Security techniques - Message Authentication Codes (MACs) - Part 2: Mechanisms using a dedicated hash-function

    ISO/IEC 9797-3:2011

    Information technology - Security techniques - Message Authentication Codes (MACs) - Part 3: Mechanisms using a universal hash-function


    Non-Repudiation

    Non-Repudiation

    ISO/IEC 13888-1:2009

    Information technology - Security techniques - Non-repudiation - Part 1: General

    ISO/IEC 13888-2:2010

    Information technology - Security techniques - Non-repudiation - Part 2: Mechanisms using symmetric techniques

    ISO/IEC 13888-2:2010/Cor1:2012

    Corrigendum

    ISO/IEC 13888-3:2009

    Information technology - Security techniques - Non-repudiation - Part 3: Mechanisms using asymmetric techniques


    Elliptical Curves

    Elliptical Curves

    ISO/IEC 15946-1:2016

    Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General

    ISO/IEC 15946-5:2009

    Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 5: Elliptic curve generation

    ISO/IEC 15946-5:2009/Cor1:2012

    Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 5: Elliptic curve generation - Corrigendum 1