1.5.7 PROYECTOS EN CURSO DE NORMAS DEL ISO JTC1/SC27
ISO/IEC JTC 1/SC 27 N 2065
ISO/IEC JTC 1/SC 27 Programme of Work (SD4)
| PROJECT | WG | EDITOR |
TITLE | REFERENCE DOCUMENT | TARGET
DATES |
| 1.27.01 | 2 | WG 2 | Modes of operation for a 64-bit block cipher algorithm. | IS 8372: 1987 2nd conf.1997 | Review in 2000 |
| 1.27.02 | 2 | WG 2 | Modes of operation for an n-bit block cipher algorithm (2nd Edition) | IS 10116:1997 | Review in 2000 |
| 1.27.03.01 | 2 | WG 2 | Entity authentication - Part 1: Genearal (2nd Edition) | IS 9798-1:1997 | Review in 2000 |
| 1.27.03.02 | 2 | Mitchell | Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms (2nd edition) | FCD 9798-2 (N 2019) | Review in 1997 98-03 98-05 98-11 99-05 |
| 1.27.03.03 | 2 | WG 2 | Entity authentication - Part 4: Mechanisms using asymmetric signature techniques (2nd edition) | IS 9798-3:N 1868 (Final vers.) | awaiting publication |
| 1.27.03.04 | 2 | Mitchell(6) (acting) |
Entity authentication - Part 4: Mechanisms using a cryptographic check funtion | IS 9798-4:1995 | Review in 1998 (1) |
| 1.27.03.05 | 2 | WG 2 | Entity authentication - Part 5: Mechanisms using zero knowledge techniques | IS 9798-5: N 1870 (Final vers.) | awaiting publication |
| 1.27.04.01 | 2 | Preneel | Message authentication codes (MACs) - Part 1: Mechanisms using a block cipher (3rd edition) | FCD 9797-1 N 2023 | -- 97-11 98-11 99-05 |
| 1.27.04.02 | 2 | Preneel | Message authentication codes (MACs) - Part 1: Mechanisms using a hash-function (3rd edition) | CD 9797-2 N 2025 | -- 98-05 98-11 99-05 |
| 1.27.06.01 | 2 | WG 2 | Non-repudiation - Part 1: General | IS 13888-1: 1997 | Review in 2000 |
| 1.27.06.02 | 2 | WG 2 | Non-repudiation - Part 2: Using symmetric techniques | IS 13888-2 N 1875 (Final vers.) | awaiting publication |
| 1.27.06.03 | 2 | WG 2 | Non-repudiation - Part 3: Usyng asymmetric techniques | IS 13888-3:1997 | review in 2000 |
| 1.27.07.01 | 2 | WG 2 | Digital Signature schemes giving message recovery - Part 1: Mechanisms using redundancy | IS 9796:1991 | Under review by JTC 1 |
| 1.27.07.02 | 2 | WG 2 | Digital Signature schemes giving message recovery - Part 2: Mechanisms using a hash-function | IS 9796-2:1997 | review in 2000 |
| 1.27.07.03(2) | 2 | Guillow | Digital Signature schemes giving message recovery - Part 3: Mechanisms using a check-function | WD 9796-3 WG 2 N 404 | 98-05 98-11 99-11 00-05 |
| 1.27.07.04 | 2 | Nyberg | Digital Signature schemes giving message recovery - Part 4: Discrete logarithm based mechanisms | CD 9796-4 N 1876rev1 | 98-05 98-05 99-05 99-11 |
| 1.27.08.01 | 2 | Nyberg | Digital signatures with appendix - Part 1: General | FDIS 14888-1 N 2027 | -- 95-11 98-05 98-11 |
| 1.27.08.02 | 2 | Chawrun | Digital signatures with appendix - Part 2: Identity-based mechanismsl |
FDIS 14888-2 N 2028 | -- 95-11 98-05 98-11 |
| 1.27.08.03 | 2 | Wallner | Digital signatures with appendix - Part 3: Certificate-based mechanismsl |
FDIS 14888-3 N 2030 | -- 95-11 98-05 98-11 |
| 1.27.09.01 | 2 | Gupta (6) Johnson (acting) |
Hash-functions - Part 1: General (2nd Edition) | CD 10118-1 N 2058 | Review in 1997 |
| 1.27.09.02 | 2 | Gupta (6) Johnson (acting) |
Hash-functions - Part 2: Hash functions using an n-bit block cipher algorithm (2nd Edition) |
CD 10118-2 N 2059 | Review in 1997 -- 98-05 99-05 99-11 |
| 1.27.09.03 | 2 | WG 2 | Hash-functions - Part 3: Dedicated hash-functions | IS10118-3 N 1693 (Final vers.) | awaiting publication |
| 1.27.09.04 | 2 | Herda | Hash-functions - Part 4: Hash-functions using modular arithmetic |
FDIS 10118-4 N 2032 | -- 97-05 98-05 98-11 |
| 1.27.10 | 1 | Humphreys | Procedures for the registration of cryptographic algorithms (2nd Edition) | IS 9979:1991 (1st ed.) N 1857 (Final vers.) |
awaiting publication |
| 1.27.13 (7) | 1 | McDowell(6) (acting) |
Security information objects | WD 15816 N 1853 | 97-11 98-10 99-05 99-11 |
| 1.27.14.01 | 1 | WG 1 | Guidelines for the management of IT Security - Part 1:Concepts and models for IT Security |
TR 13335-1:1996 | Review in 1999 |
| 1.27.14.02 | 1 | WG 1 | Guidelines for the management of IT Security - Part 2:Managing and planning IT Security |
TR 13335-2:1997 | Review in 2000 |
| 1.27.14.03 | 1 | WG 1 | Guidelines for the management of IT Security - Part 3:Techniques for the management of IT Security |
TR 13335-3: N 1845 (Final vers.) | awaiting publication |
| 1.27.14.04 | 1 | Plate | Guidelines for the management of IT Security - Part 4:Selection of safeguards |
WD 13335-4 N 1997 | 97-12 98-10 99-05 99-11 |
| 1.27.14.05 | 1 | Moses | Guidelines for the management of IT Security - Part 5:Aplication of IT Security services and mechanisms | WD 13335-5 N 1999 | 97-12 98-10 99-05 99-11 |
| 1.27.16.01 | 3 | Troy | Evaluation criteria for IT Security - Part 1: Introduction and general model |
FCD 15408-1 N 1951 | -- 96-05 98-11 99-05 |
| 1.27.16.02 | 3 | Nash | Evaluation criteria for IT Security - Part 2:Security functional requirements |
FCD 15408-2 N 1952 | -- 96-05 98-11 99-05 |
| 1.27.16.03 | 3 | Van Essen | Evaluation criteria for IT Security - Part 3:Security assurance requirements |
FCD 15408-3 N 1953 | -- 96-05 98-11 99-05 |
| 1.27.18.01 | 1 | WG 1 | Key management - Part 1: Framework | IS 11770-1: 1996 | Review in 1999 |
| 1.27.18.02 | 2 | WG 2 | Key management - Part 2: Mechanisms using symmetric techniques | IS 11770-2: 1996 | Review in 1999 |
| 1.27.18.03 | 2 | Lai (acting) | Key management - Part 3: Mechanisms using asymmetric techniques | IS 11770-3: N 2038 (final version) | Awaiting publication |
| 1.27.19 | 1 | Hanscom | Guidelines on the use and management of Trusted Third Party services | WD 14516 N 2002 | 97-12 98-05 98-11 99-05 |
| 1.27.20 | 3 | Nash (6) (acting) | Protection Profile registration procedures | WD 15292 N 1916 | 98-05 98-11 99-11 00-11 |
| 1.27.21 | 3 | Barker | A Framework for IT security assurance | WD 15443 (NP N 1560) N 2060 | 98-05 98-11 99-11 00-11 |
| 1.27.22 | 3 | Donaldson | Guide on the production of Protection Profiles and Security Targets | WD 15446 (NP N 1559r2) N 2061 | 98-05 98-11 99-11 00-11 |
| 1.27.23 | 2 | Vacant | Data Processing - Check character systems | IS 7064(3):1983 | |
| 1.27.24 | 1 | Krüger | Specification of TTP services to support the application of digital signatures | WD 15945 (NP N 1905) N 2004 | 97-12 99-05 99-11 00-05 |
| 1.27.25 | 1 | Nelson(6) (acting) |
IT intrusion detection framework | WD 15947 (NP N 1859) N 2008 | 87-05 99-05 99-11 00-11 |
| 1.27.26.01 (4) |
2 | Horne (acting) | Cryptographic techniques based on elliptic curves- Part 1: General | WD 15946-1 (NP N 1896) N 2034 | 98-05 98-11 98-11 00-03 |
| 1.27.26.02 (4) |
2 | Horne (acting) | Cryptographic techniques based on elliptic curves - Part 2:Digital Signatures | WD 15946-3 (NP N 1896) N 2056 | 98-05 98-11 98-11 00-03 |
| 1.27.26.03 (4) |
2 | Zuccherato (acting) | Cryptographic techniques based on elliptic curves - Part 3:Key establishment | WD 15946-3 (NP N 1896) N 2057 | 98-05 98-11 98-11 00-03 |
| study period | 1 | Brackney Humphreys Tabuchi (acting) (coordinators) |
GII Security (in accordance with SC 27 N 1598) | ||
| study period (5) | 2 | Guillou (acting) | Random number generation, random number generator validation and cryptographic key generation/validation |
(1) Subject to approval by the next SC 27 Plenary meeting in Itacurussa, Brazil, October 1998, of the revision of the IS project (Resoluciton 15 of the SC 27/WG 2 meeting in Kista, Sweden, April 1998).
(2) Subject to approval by the next SC 27 Plenary meeting in Itacurussa, Brazil, October 1998, of the deletion of the project (Resoluction 14 of the SC 27/WG 2 meeting in Kista, Sweden, April 1998).
(3) IS inherited from JTC 1 (Resoluction 42 of JTC 1 Plenary meeting, September 1997) and assigned to SC 27/WG 2 (Resolution 23 of the 9th SC 27 Plenary meeting, October 1997).
(4) Subject to approval by SC 27 and endorsement by JTC 1 of the subdivision of the project (Resolution 13 of the 16th SC 27/WG 2 meeting Kista, Sweden, April 1998)
(5) Study period on WG 2 level (Resolution 7 of the 15th SC 27/WG 2 meeting, October 1997).
(6) Subject to approval by SC 27 Plenary meeting in Itacurussa, Brazil, October 1998, of the appointment of Projects Editors.
(7) Subject to establishment of collaborative work with ITU-T SG7/Q20.
| Volver |