1.5.7 PROYECTOS EN CURSO DE NORMAS DEL ISO JTC1/SC27

 

ISO/IEC JTC 1/SC 27 N 2065

ISO/IEC JTC 1/SC 27 Programme of Work (SD4)

PROJECT WG

EDITOR

TITLE REFERENCE DOCUMENT

TARGET DATES
WD/CD/FDIS/IS/
WD/PDTR/TR/TR/

1.27.01 2 WG 2 Modes of operation for a 64-bit block cipher algorithm. IS 8372: 1987    2nd conf.1997 Review in 2000
1.27.02 2 WG 2 Modes of operation for an n-bit block cipher algorithm (2nd Edition) IS 10116:1997 Review in 2000
1.27.03.01 2 WG 2 Entity authentication - Part 1: Genearal (2nd Edition) IS 9798-1:1997 Review in 2000
1.27.03.02 2 Mitchell Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms (2nd edition) FCD 9798-2 (N 2019) Review in 1997
98-03 98-05 98-11 99-05
1.27.03.03 2 WG 2 Entity authentication - Part 4: Mechanisms using asymmetric signature techniques (2nd edition) IS 9798-3:N 1868 (Final vers.) awaiting publication
1.27.03.04 2 Mitchell(6)
(acting)
Entity authentication - Part 4: Mechanisms using a cryptographic check funtion IS 9798-4:1995 Review in 1998 (1)
1.27.03.05 2 WG 2 Entity authentication - Part 5: Mechanisms using zero knowledge techniques IS 9798-5: N 1870 (Final vers.) awaiting publication
1.27.04.01 2 Preneel Message authentication codes (MACs) - Part 1: Mechanisms using a block cipher (3rd edition) FCD 9797-1 N 2023

-- 97-11 98-11 99-05

1.27.04.02 2 Preneel Message authentication codes (MACs) - Part 1: Mechanisms using a hash-function (3rd edition) CD 9797-2 N 2025

-- 98-05 98-11 99-05

1.27.06.01 2 WG 2 Non-repudiation - Part 1: General IS 13888-1: 1997 Review in 2000
1.27.06.02 2 WG 2 Non-repudiation - Part 2: Using symmetric techniques IS 13888-2 N 1875 (Final vers.) awaiting publication
1.27.06.03 2 WG 2 Non-repudiation - Part 3: Usyng asymmetric techniques IS 13888-3:1997 review in 2000
1.27.07.01 2 WG 2 Digital Signature schemes giving message recovery - Part 1: Mechanisms using redundancy IS 9796:1991 Under review by
JTC 1
1.27.07.02 2 WG 2 Digital Signature schemes giving message recovery - Part 2: Mechanisms using a hash-function IS 9796-2:1997 review in 2000
1.27.07.03(2) 2 Guillow Digital Signature schemes giving message recovery - Part 3: Mechanisms using a check-function WD 9796-3 WG 2 N 404

98-05 98-11 99-11 00-05

1.27.07.04 2 Nyberg Digital Signature schemes giving message recovery - Part 4: Discrete logarithm based mechanisms CD 9796-4 N 1876rev1

98-05 98-05 99-05 99-11

1.27.08.01 2 Nyberg Digital signatures with appendix - Part 1: General FDIS 14888-1 N 2027

-- 95-11 98-05 98-11

1.27.08.02 2 Chawrun Digital signatures with appendix -
Part 2: Identity-based mechanismsl
FDIS 14888-2 N 2028

-- 95-11 98-05 98-11

1.27.08.03 2 Wallner Digital signatures with appendix -
Part 3: Certificate-based mechanismsl
FDIS 14888-3 N 2030

-- 95-11 98-05 98-11

1.27.09.01 2 Gupta (6)
Johnson (acting)
Hash-functions - Part 1: General (2nd Edition) CD 10118-1 N 2058

Review in 1997
-- 98-05 99-05 99-11

1.27.09.02 2 Gupta (6)
Johnson (acting)
Hash-functions -
Part 2: Hash functions using an n-bit block cipher algorithm (2nd Edition)
CD 10118-2 N 2059 Review in 1997
-- 98-05 99-05 99-11
1.27.09.03 2 WG 2 Hash-functions - Part 3: Dedicated hash-functions IS10118-3 N 1693 (Final vers.) awaiting publication
1.27.09.04 2 Herda Hash-functions -
Part 4: Hash-functions using modular arithmetic
FDIS 10118-4 N 2032

-- 97-05 98-05 98-11

1.27.10 1 Humphreys Procedures for the registration of cryptographic algorithms (2nd Edition) IS 9979:1991
(1st ed.)
N 1857 (Final vers.)
awaiting publication
1.27.13 (7) 1 McDowell(6)
(acting)
Security information objects WD 15816 N 1853

97-11 98-10 99-05 99-11

1.27.14.01 1 WG 1 Guidelines for the management of IT Security -
Part 1:Concepts and models for IT Security
TR 13335-1:1996 Review in 1999
1.27.14.02 1 WG 1 Guidelines for the management of IT Security -
Part 2:Managing and planning IT Security
TR 13335-2:1997 Review in 2000
1.27.14.03 1 WG 1 Guidelines for the management of IT Security -
Part 3:Techniques for the management of IT Security
TR 13335-3: N 1845 (Final vers.) awaiting publication
1.27.14.04 1 Plate Guidelines for the management of IT Security -
Part 4:Selection of safeguards
WD 13335-4 N 1997

97-12 98-10 99-05   99-11

1.27.14.05 1 Moses Guidelines for the management of IT Security - Part 5:Aplication of IT Security services and mechanisms WD 13335-5 N 1999

97-12 98-10 99-05 99-11

1.27.16.01 3 Troy Evaluation criteria for IT Security -
Part 1: Introduction and general model
FCD 15408-1 N 1951

-- 96-05 98-11 99-05

1.27.16.02 3 Nash Evaluation criteria for IT Security -
Part 2:Security functional requirements
FCD 15408-2 N 1952

-- 96-05 98-11 99-05

1.27.16.03 3 Van Essen Evaluation criteria for IT Security -
Part 3:Security assurance requirements
FCD 15408-3 N 1953

-- 96-05 98-11 99-05

1.27.18.01 1 WG 1 Key management - Part 1: Framework IS 11770-1: 1996 Review in 1999
1.27.18.02 2 WG 2 Key management - Part 2: Mechanisms using symmetric techniques IS 11770-2: 1996 Review in 1999
1.27.18.03 2 Lai (acting) Key management - Part 3: Mechanisms using asymmetric techniques IS 11770-3: N 2038 (final version) Awaiting publication
1.27.19 1 Hanscom Guidelines on the use and management of Trusted Third Party services WD 14516 N 2002

97-12 98-05 98-11   99-05

1.27.20 3 Nash (6) (acting) Protection Profile registration procedures WD 15292 N 1916

98-05 98-11 99-11   00-11

1.27.21 3 Barker A Framework for IT security assurance WD 15443 (NP N 1560) N 2060

98-05 98-11 99-11   00-11

1.27.22 3 Donaldson Guide on the production of Protection Profiles and Security Targets WD 15446 (NP N 1559r2) N 2061

98-05 98-11 99-11  00-11

1.27.23 2 Vacant Data Processing - Check character systems IS 7064(3):1983  
1.27.24 1 Krüger Specification of TTP services to support the application of digital signatures WD 15945 (NP N 1905) N 2004

97-12 99-05 99-11 00-05

1.27.25 1 Nelson(6)
(acting)
IT intrusion detection framework WD 15947 (NP N 1859) N 2008

87-05 99-05 99-11 00-11

1.27.26.01
(4)
2 Horne (acting) Cryptographic techniques based on elliptic curves- Part 1: General WD 15946-1 (NP N 1896) N 2034

98-05  98-11  98-11 00-03

1.27.26.02
(4)
2 Horne (acting) Cryptographic techniques based on elliptic curves - Part 2:Digital Signatures WD 15946-3 (NP N 1896) N 2056

98-05  98-11  98-11 00-03

1.27.26.03
(4)
2 Zuccherato (acting) Cryptographic techniques based on elliptic curves - Part 3:Key establishment WD 15946-3 (NP N 1896) N 2057

98-05  98-11  98-11 00-03

study period 1 Brackney Humphreys Tabuchi
(acting)
(coordinators)
GII Security (in accordance with SC 27 N 1598)    
study period (5) 2 Guillou (acting) Random number generation, random number generator validation and cryptographic key generation/validation    

 

(1)    Subject to approval by the next SC 27 Plenary meeting in Itacurussa, Brazil, October 1998, of the revision of the IS project (Resoluciton 15 of the SC 27/WG 2 meeting in Kista, Sweden, April 1998).

(2)    Subject to approval by the next SC 27 Plenary meeting in Itacurussa, Brazil, October 1998, of the deletion of the project (Resoluction 14 of the SC 27/WG 2 meeting in Kista, Sweden, April 1998).

(3)    IS inherited from JTC 1 (Resoluction 42 of JTC 1 Plenary meeting, September 1997) and assigned to SC 27/WG 2 (Resolution 23 of the 9th SC 27 Plenary meeting, October 1997).

(4)    Subject to approval by SC 27 and endorsement by JTC 1 of the subdivision of the project (Resolution 13 of the 16th SC 27/WG 2 meeting Kista, Sweden, April 1998)

(5)    Study period on WG 2 level (Resolution 7 of the 15th SC 27/WG 2 meeting, October 1997).

(6)    Subject to approval by SC 27 Plenary meeting in Itacurussa, Brazil, October 1998, of the appointment of Projects Editors.

(7)    Subject to establishment of collaborative work with ITU-T SG7/Q20.

 

Volver