SNo |
IS Number |
Title |
Technical Committee |
1 |
IS/ISO/IEC 11770 : Part 1 : 2010 |
Information technology - Security techniques - Key management: Part 1 framework |
LITD 17 |
2 |
IS/ISO/IEC 11770 : Part 2 : 2018 |
IT Security Techniques — Key Management Part 2 Mechanisms Using Symmetric Techniques ( First Revision ) |
LITD 17 |
3 |
IS/ISO/IEC 11770 : Part 3 : 2021 |
Information security Key management Part 3: Mechanisms using asymmetric techniques Second Revision |
LITD 17 |
4 |
IS/ISO/IEC 11770-4 : 2017 |
Information technology - Security techniques - Key management: Part 4 mechanisms based on weak: Secrets (First Revision) |
LITD 17 |
5 |
IS/ISO/IEC 11770 : Part 5 : 2020 |
INFORMATION SECURITY KEY MANAGEMENT PART 5: GROUP KEY MANAGEMENT (First Revision) |
LITD 17 |
6 |
IS/ISO/IEC 11770 : Part 6 : 2016 |
Information Technology - Security Techniques - Key Management Part 6 Key Derivation |
LITD 17 |
7 |
IS/ISO/IEC 11770 : Part 7 : 2021 |
Information security Key management Part 7: Cross-domain password-based authenticated key exchange |
LITD 17 |
8 |
IS 16005 : Part 1 : 2019 |
Financial Services — Secure Cryptographic Devices ( Retail ) Part 1 Concepts, Requirements and Evaluation Methods ( First Revision ) |
SSD 3 |
9 |
IS 16005 : Part 2 : 2019 |
Financial Services — Secure Cryptographic Devices ( Retail ) Part 2 Security Compliance Checklists for Devices Used in Financial Transactions ( First Revision ) |
SSD 3 |
10 |
IS/ISO/IEC 18031 : 2011 |
Information technology - Security techniques - Random bit generation |
LITD 17 |
11 |
IS/ISO/IEC 18033 : Part 1 : 2021 |
Information security Encryption algorithms Part 1: General First Revision |
LITD 17 |
12 |
IS/ISO/IEC 18033 : Part 2 : 2006 |
Information Technology - Security Techniques - Encryption Algorithms Part 2 Asymmetric Ciphers |
LITD 17 |
13 |
IS/ISO/IEC 18033 : Part 3 : 2010 |
Information Technology-Security Techniques - Encryption Algorithms Part 3 Block Ciphers |
LITD 17 |
14 |
IS/ISO/IEC 18033 : Part 4 : 2011 |
Information technology - Security techniques - encryption algorithms: Part 4 stream ciphers |
LITD 17 |
15 |
IS/ISO/IEC 18033 : Part 4 : 2011 |
Information technology - Security techniques - encryption algorithms: Part 4 stream ciphers |
LITD 17 |
16 |
IS/ISO 20038 : 2017 |
Banking and related financial services - Key wrap using AES |
SSD 3 |
17 |
IS/ISO 21188 : 2018 |
Public key infrastructure for financial services Practices and policy framework First Revision |
SSD 3 |
18 |
IS 16647 : 2017 |
Oriented Unplasticized Polyvinyl Chloride (PVC-O) Pipes for Water Supply - Specification |
CED 50 |