ISO/TR 14742:2010 provides a list of recommended cryptographic algorithms for use within applicable financial services standards prepared by ISO/TC 68. It also provides strategic guidance on key lengths and associated parameters and usage dates.
The focus is on algorithms rather than protocols, and protocols are in general not included in ISO/TR 14742:2010.
ISO/TR 14742:2010 deals primarily with recommendations regarding algorithms and key lengths.
The categories of algorithms covered in ISO/TR 14742:2010 are:
- block ciphers;
- stream ciphers;
- hash functions;
- message authentication codes (MACs);
- asymmetric algorithms;
- digital signature schemes giving message recovery,
- digital signatures with appendix,
- asymmetric ciphers;
- authentication mechanisms;
- key establishment and agreement mechanisms;
- key transport mechanisms.
ISO/TR 14742:2010 does not define any cryptographic algorithms; however, the standards to which ISO/TR 14742:2010 refers may contain necessary implementation information as well as more detailed guidance regarding choice of security parameters, security analysis, and other implementation considerations.
Status: PublishedPublication date: 2010-07
Edition: 1Number of pages: 31
Technical Committee: ISO/TC 68/SC 2 Financial Services, security
This standard contributes to the following Sustainable Development Goal:
Buy this standard
|std 1 145|
|std 2 145||Paper|
A standard is reviewed every 5 years
Stage: 90.92 (To be revised)
Will be replaced byUnder development
ISO/AWI TS 14742
Got a question?
Check out our FAQs
Monday to Friday - 09:00-12:00, 14:00-17:00 (UTC+1)
Keep up to date with ISO
Sign up to our newsletter for the latest news, views and product information.