Abstract
ISO/IEC 29150:2011 specifies four mechanisms for signcryption that employ public key cryptographic techniques requiring both the originator and the recipient of protected data to have their own public and private key pairs. The methods specified in ISO/IEC 29150:2011 have been designed to maximize the level of security and provide efficient processing of data. All the mechanisms defined have mathematical "proofs of security", i.e. rigorous arguments supporting their security claims.
ISO/IEC 29150:2011 is not applicable to infrastructures for management of public keys which are defined in ISO/IEC 11770-1 and ISO/IEC 9594.
General information
-
Status: PublishedPublication date: 2011-12Stage: International Standard confirmed [90.93]
-
Edition: 1Number of pages: 53
-
Technical Committee :ISO/IEC JTC 1/SC 27ICS :35.030
- RSS updates
Read sample
Preview this standard in our Online Browsing Plateform (OBP)
Life cycle
-
Now
-
00
Preliminary
-
10
Proposal
-
20
Preparatory
-
30
Committee
-
40
Enquiry
-
50
Approval
-
60
Publication
-
90
Review
-
95
Withdrawal
Corrigenda / Amendments
PublishedISO/IEC 29150:2011/Cor 1:2014
-
00
Got a question?
Check out our FAQs
Customer care
+41 22 749 08 88
Opening hours:
Monday to Friday - 09:00-12:00, 14:00-17:00 (UTC+1)