This document provides a list of recommended ISO cryptographic algorithms for use within applicable ISO TC68 – Financial Services standards. It also provides strategic guidance on key lengths and associated parameters and usage dates. This document deals primarily with recommendations regarding algorithms and key lengths. For standards on key management, see ISO 11568 (, , and ). The categories of algorithms covered are: a) Block ciphers – b) Stream ciphers – c) Tweakable ciphers – d) Hash functions – e) Message authentication codes (MACs) – f) Asymmetric algorithms 1) Digital signature schemes giving message recovery 2) Digital signatures with appendix 3) Asymmetric ciphers g) Authenticated encryption algorithms h) Authentication mechanisms i) Key wrapping j) Key derivation, establishment and agreement mechanisms k) Key transport mechanisms. This document does not define any cryptographic algorithms; however the standards to which this document refers may contain necessary implementation information as well as more detailed guidance regarding choice of security parameters, security analysis, and other implementation considerations.
Status: Under development
Technical Committee: ISO/TC 68/SC 2 Financial Services, security
- ICS :
This standard contributes to the following Sustainable Development Goal:
ISO/AWI TS 14742Stage: 20.00
Got a question?
Check out our FAQs
Monday to Friday - 09:00-12:00, 14:00-17:00 (UTC+1)
Keep up to date with ISO
Sign up to our newsletter for the latest news, views and product information.