ISO/IEC JTC1

ISO/IEC JTC1 (ISO/IEC ) 1988 ISO(the International Organization for Standardization) TC97 IEC(the International Electrotechnical Commission) Publicly Available Standards).
[ISO/IEC JTC1/SC17]
ISO/IEC JTC1 SC17 (IDENTIFICATION CARDS AND RELATED DEVICES) Identification Cards and personal identification (WG1,WG3,WG4,WG5,WG7,WG8,WG9,OWG,WG10,WG11).

ISO/IEC JTC1/SC17

  • ISO/IEC 7501-1:1997 3rd Identification cards — Machine readable travel documents — Part 1: Machine readable passport (Note: ISO/IEC 7501-1 endorses the Third Edition of ICAO Doc. 9303. The Fourth Edition of ICAO Doc. 9303 is not yet endorsed by ISO)
  • ISO/IEC 7501-2:1997 2nd Identification cards — Machine readable travel documents — Part 2: Machine readable visa
  • ISO/IEC 7501-3:1997 1st Identification cards — Machine readable travel documents — Part 3: Machine readable official travel documents

[ISO/IEC JTC1/SC27]
ISO/IEC JTC1 SC27 (Information technology – Security techniques)(WG1, WG2, WG3).

  • WG1
  • WG2
  • WG3

ISO/IEC JTC1/SC27

  • ISO 8372: 1987, Modes of operation for a 64- bit block cipher algorithm
  • ISO/IEC 9796-2: 1997, Digital signature schemes giving message recovery – Part 2: Mechanisms using a hash- function
  • ISO/IEC FDIS 9796-3: 1999, Digital signatures schemes giving message recovery – Part 3: Discrete logarithm based mechanisms
  • ISO/IEC 9797-1: 1999, Message authentication codes (MACs) – Part 1: Mechanisms using a block cipher
  • ISO/IEC FCD 9797-2: 1999, Message authentication codes (MACs) – Part 2: Mechanisms using a hash-function
  • ISO/IEC 9798-1: 1997, Entity authentication – Part 1: General (2nd edition)
  • ISO/IEC 9798-2: 1999, Entity authentication – Part 2: Mechanisms using symmetric encipherment algorithms (2nd edition)
  • ISO/IEC 9798-3: 1998, Entity authentication – Part 3: Mechanisms using digital signature techniques (2nd edition)
  • ISO/IEC 9798-4: 1999, Entity authentication – Part 4: Mechanisms using a cryptographic check function (2nd edition)
  • ISO/IEC 9798-5: 1999, Entity authentication – Part 5: Mechanisms using zero knowledge techniques
  • ISO/IEC 9979: 1999, Procedures for the registration of cryptographic algorithms(2nd edition)
  • ISO/IEC 10116: 1997, Modes of operation for an n- bit block cipher algorithm (2nd edition)
  • ISO/IEC FDIS 10118-1: 1999, Hash-functions – Part 1: General (2nd edition, revision of ISO/IEC 10118-1: 1994)
  • ISO/IEC FCD 10118-2: 1999, Hash-functions – Part 2: Hash-functions using an n-bit block cipher algorithm (2nd edition, revision of ISO/IEC 10118-2: 1994)
  • ISO/IEC 10118-3: 1998, Hash-functions – Part 3: Dedicated hash-functions
  • ISO/IEC 10118-4: 1998, Hash-functions – Part 4: Hash-functions using modular arithmetic
  • ISO/IEC 11770-1: 1996, Key management – Part 1: Framework
  • ISO/IEC 11770-2: 1996, Key management – Part 2: Mechanisms using symmetric techniques
  • ISO/IEC 11770-3: 1999, Key management – Part 3: Mechanisms using asymmetric techniques
  • ISO/IEC TR 13335-1: 1996, Guidelines for the management of IT Security (GMITS) – Part 1: Concepts and models for IT Security
  • ISO/IEC TR 13335-2: 1997, Guidelines for the management of IT Security (GMITS) – Part 2: Managing and planning IT Security
  • ISO/IEC TR 13335-3: 1998, Guidelines for the management of IT Security (GMITS) – Part 3: Techniques for the management of IT Security
  • ISO/IEC TR 13335-4: 2000, Guidelines for the management of IT Security (GMITS) – Part 4: Selection of safeguards
  • ISO/IEC WD 13335-5: 1999, Guidelines for the management of IT Security (GMITS) – Part 5: Management guidance on network security
  • ISO/IEC 13888-1: 1997, Non-repudiation – Part 1: General
  • ISO/IEC 13888-2: 1998, Non-repudiation – Part 2: Using symmetric techniques
  • ISO/IEC 13888-3: 1997, Non-repudiation – Part 3: Using asymmetric techniques
  • ISO/IEC DTR 14516: 1999, (x.842) Guidelines on the use and management of Trusted Third Party services
  • ISO/IEC 14888-1: 1998, Digital signatures with appendix – Part 1: General
  • ISO/IEC 14888-2: 1999, Digital signatures with appendix – Part 2: Identity-based mechanisms
  • ISO/IEC 14888-3: 1998, Digital signatures with appendix – Part 3: Certificate-based mechanisms
  • ISO/IEC CD 15292: 2000, Protection profile registration procedures
  • ISO/IEC 15408-1: 1999, Evaluation criteria for IT security – Part 1: Introduction and general model
  • ISO/IEC 15408-2: 1999, Evaluation criteria for IT Security – Part 2: Security functional requirements
  • ISO/IEC 15408-3: 1999, Evaluation criteria for IT Security – Part 3: Security assurance requirements
  • ISO/IEC WD 15443: 1999, A framework for IT Security assurance
  • ISO/IEC PDTR 15446: 2000, Guide on the production of Protection Profiles and Security Targets
  • ISO/IEC FCD 15816: 1999, (x.841) Security information objects
  • ISO/IEC FCD 15945: 1999, (x.843) Specification of TTP services to support the application of digital signatures
  • ISO/IEC FDIS 15946-1, Information technology – Security techniques – Cryptographic techniques based on elliptic curves – Part 1: General
  • ISO/IEC FDIS 15946-2, Information technology – Security techniques – Cryptographic techniques based on elliptic curves: Part 2 – Digital signatures
  • ISO/IEC FCD 15946-3, Information technology – Security techniques – Cryptographic techniques based on elliptic curves: Part 3 – Key establishment
  • ISO/IEC FCD 15946-4, Information technology – Security techniques – Cryptographic techniques based on elliptic curves: Part 4 – Digital signatures giving message recovery
  • ISO/IEC WD 15947: 1999, IT intrusion detection framework
  • ISO/IEC CD 7064: (1999), Data processing – Check character systems (2nd edition, revision of ISO 7064: 1983)