SNo |
IS Number |
Title |
Technical Committee |
1 |
IS 14990 : PART 1 : 2012 |
Information technology - Security techniques - Evaluation criteria for it: Security: Part 1 introduction and general model (Second Revision) |
LITD 17 |
2 |
IS 14990 : Part 2 : 2017 |
Information technology - Security techniques - Evaluation criteria for it: Security: Part 2 Security functional requirements (Second Revision) |
LITD 17 |
3 |
IS 14990 : Part 3 : 2016 |
Information technology - Security techniques - Evaluation criteria for it: Security: Part 3 Security assurance components (Second Revision) |
LITD 17 |
4 |
IS 15042 : Part 1 : 2015 |
Financial Services - Personal Identification Number (PIN) Management and Security Part 1 Basic Principles and Requirements for Pins in Card-Based Systems ( Second Revision ) |
SSD 3 |
5 |
IS 15042 : Part 2 : 2017 |
Financial services — Personal Identification Number (PIN) management and security — Part 2: Approved algorithms for PIN encipherment ( Second Revision) |
SSD 3 |
6 |
IS 15042 : PART 4 : 2019 |
Financial Services — Personal Identification Number (PIN) Management and Security Part 4 Requirements for PIN Handling in eCommerce for Payment Transactions |
SSD 3 |
7 |
IS 15256 : Part 1 : 2011 |
Banking - Key Management (Retail) - Part 1 Principles |
SSD 3 |
8 |
IS 15256 : PART 2 : 2016 |
Banking Key Management (Retail) Part 2 Symmetric Ciphers, Their Key Management and Life Cycle ( First Revision ) |
SSD 3 |
9 |
IS 15256 : Part 4 : 2013 |
Banking - Key Management (Retail) - Part 4 : Key Management Techniques Using Public Key Cryptography |
SSD 3 |
10 |
IS 16005 : Part 1 : 2019 |
Financial Services — Secure Cryptographic Devices ( Retail ) Part 1 Concepts, Requirements and Evaluation Methods ( First Revision ) |
SSD 3 |
11 |
IS 16005 : Part 2 : 2019 |
Financial Services — Secure Cryptographic Devices ( Retail ) Part 2 Security Compliance Checklists for Devices Used in Financial Transactions ( First Revision ) |
SSD 3 |
12 |
IS/ISO/IEC 29192 : Part 1 : 2012 |
Information Technology - Security Techniques - Lightweight Crytography Part 1 General |
LITD 17 |
13 |
IS/ISO/IEC 29192 : Part 2 : 2012 |
Information Technology - Security Techniques - Lightweight Cryptography Part 2 Block Ciphers |
LITD 17 |
14 |
IS/ISO/IEC 29192 : Part 3 : 2012 |
Information Technology - Security Techniques - Lightweight Cryptography Part 3 Stream Ciphers |
LITD 17 |
15 |
IS/ISO/IEC 29192 : Part 4 : 2013 |
Information Technology - Security Techniques - Lightweight Cryptography Part 4 Mechanisms Using Asymmetric Techniques |
LITD 17 |
16 |
IS/ISO/IEC 29192 : Part 5 : 2016 |
Information Technology - Security Techniques - Lightweight Cryptography Part 5 Hash-Functions |
LITD 17 |
17 |
IS 8590 : 1977 |
Specification for indium sulphate for electroplating |
CHD 5 |