| SNo |
IS Number |
Title |
Technical Committee |
|
1 |
IS/ISO/IEC 11770 : Part 1 : 2010 |
Information Technology - Security Techniques - Key Management Part 1: Framework |
LITD 17 |
|
2 |
IS/ISO/IEC 11770 : Part 2 : 2018 |
IT Security Techniques - Key Management Part 2: Mechanisms Using Symmetric Techniques ( First Revision ) |
LITD 17 |
|
3 |
IS/ISO/IEC 11770 : Part 3 : 2021 |
Information Security - Key Management Part 3: Mechanisms using Asymmetric Techniques Second Revision |
LITD 17 |
|
4 |
IS/ISO/IEC 11770-4 : 2017 |
Information Technology - Security Techniques - Key Management Part 4: Mechanisms Based on Weak Secrets (First Revision) |
LITD 17 |
|
5 |
IS/ISO/IEC 11770 : Part 5 : 2020 |
Information Security - Key Management Part 5: Group Key Management ( First Revision ) |
LITD 17 |
|
6 |
IS/ISO/IEC 11770 : Part 6 : 2016 |
Information Technology - Security Techniques - Key Management Part 6: Key Derivation |
LITD 17 |
|
7 |
IS/ISO/IEC 11770 : Part 7 : 2021 |
Information Security - Key Management Part 7: Cross-Domain Password-Based Authenticated Key Exchange |
LITD 17 |
|
8 |
IS 16005 : Part 1 : 2019 |
Financial Services — Secure Cryptographic Devices ( Retail ) Part 1 Concepts, Requirements and Evaluation Methods ( First Revision ) |
SSD 3 |
|
9 |
IS 16005 : Part 2 : 2019 |
Financial Services — Secure Cryptographic Devices ( Retail ) Part 2 Security Compliance Checklists for Devices Used in Financial Transactions ( First Revision ) |
SSD 3 |
|
10 |
IS/ISO/IEC 18031 : 2011 |
Information Technology - Security Techniques - Random Bit Generation |
LITD 17 |
|
11 |
IS/ISO/IEC 18033 : Part 1 : 2021 |
Information Security - Encryption Algorithms Part 1: General (First Revision) |
LITD 17 |
|
12 |
IS/ISO/IEC 18033 : Part 2 : 2006 |
Information Technology - Security Techniques - Encryption Algorithms Part 2: Asymmetric Ciphers |
LITD 17 |
|
13 |
IS/ISO/IEC 18033 : Part 3 : 2010 |
Information Technology - Security Techniques - Encryption Algorithms Part 3: Block Ciphers |
LITD 17 |
|
14 |
IS/ISO/IEC 18033 : Part 4 : 2011 |
Information Technology - Security Techniques - Encryption Algorithms Part 4: Stream Ciphers |
LITD 17 |
|
15 |
IS/ISO/IEC 18033 : Part 4 : 2011 |
Information Technology - Security Techniques - Encryption Algorithms Part 4: Stream Ciphers |
LITD 17 |
|
16 |
IS/ISO 20038 : 2017 |
Banking and related financial services - Key wrap using AES |
SSD 3 |
|
17 |
IS/ISO 21188 : 2018 |
Public key infrastructure for financial services Practices and policy framework First Revision |
SSD 3 |
|
18 |
IS 16647 : 2017 |
Oriented Unplasticized Polyvinyl Chloride (PVC-O) Pipes for Water Supply - Specification |
CED 50 |