{"id":422914,"date":"2024-10-20T06:43:33","date_gmt":"2024-10-20T06:43:33","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-24824-42021-2\/"},"modified":"2024-10-26T12:36:58","modified_gmt":"2024-10-26T12:36:58","slug":"bs-iso-iec-24824-42021-2","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-24824-42021-2\/","title":{"rendered":"BS ISO\/IEC 24824-4:2021"},"content":{"rendered":"
This Recommendation | International Standard enhances the existing cryptographic message syntax (CMS) protocol by adding signcryption techniques and providing a new Abstract Syntax Notation One (ASN.1) module which conforms to the latest edition of the ASN.1 standard which can be used with all standardized encoding rules of ASN.1.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | 1 Scope 2 Normative references 2.1 Identical Recommendations | International Standards 2.2 Paired Recommendations | International Standards equivalent in technical content 2.3 Additional References 3 Definitions <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | 4 Abbreviations 5 Conventions 6 Cryptographic message syntax <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 7 Signcryption <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 7.1 The SigncryptedData type 7.2 The ContentInformation type <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 7.2.1 The signcryptedContent mode 7.2.2 The signcryptedAttributes mode <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 7.2.3 The signcryptedComponents mode <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 7.2.4 The signcryptedEnvelope mode <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 7.3 The Signcrypter type <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 8 Quantum safe SignedData signatures <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 8.1 Detached content consideration 8.2 Time stamp consideration <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 8.3 The tokenizedParts attribute 9 Other key management techniques 9.1 Constructive key management <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 9.2 Database encryption key management <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 9.2.1 Single server initial data encryption key 9.2.2 Single server data encryption key change 9.2.3 Multiple data encryption keys with a single server <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 9.2.4 Multiple data encryption keys with multiple servers 9.2.5 Multiple hashed message authentication keys with multiple servers <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | Annex A ASN.1 modules A.1 Main CMS module (from IETF RFC 6268) <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | A.2 Module CMSObjectIdentifiers <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | A.3 Module AlgorithmInformation-2009 (from IETF RFC 5912) <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | A.4 Module CryptographicMessageSyntaxAlgorithms-2009 (from IETF RFC 5911) <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | A.5 Module PKIX-Algs-2009 (from IETF RFC 5912) <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | A.6 Module PKIXAttributeCertificate-2009 (from IETF RFC 5912) <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | A.7 Module AttributeCertificateVersion1-2009 (from IETF RFC 5912) <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | A.8 Module PKIX-CommonTypes-2009 (from IETF RFC 5912) <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | A.9 Module PKIX-X400Address-2009 (from IETF RFC 5912) <\/td>\n<\/tr>\n | ||||||
60<\/td>\n | A.10 Module PKIX1Explicit-2009 (from IETF RFC 5912) <\/td>\n<\/tr>\n | ||||||
66<\/td>\n | A.11 Module PKIXImplicit-2009 (from IETF RFC 5912) <\/td>\n<\/tr>\n | ||||||
73<\/td>\n | A.12 Module PKIX1-PSS-OAEP-Algorithms-2009 (from IETF RFC 5912) <\/td>\n<\/tr>\n | ||||||
77<\/td>\n | A.13 Module SecureMimeMessageV3dot1-2009 (from IETF RFC 5911) <\/td>\n<\/tr>\n | ||||||
79<\/td>\n | A.14 Module CMSSigncryption <\/td>\n<\/tr>\n | ||||||
82<\/td>\n | A.15 Module CMSCKMKeyManagement <\/td>\n<\/tr>\n | ||||||
84<\/td>\n | A.16 Module CMSDBKeyManagement <\/td>\n<\/tr>\n | ||||||
85<\/td>\n | A.17 Module CMSProfileAttributes <\/td>\n<\/tr>\n | ||||||
87<\/td>\n | A.18 Module TokenizationManifest <\/td>\n<\/tr>\n | ||||||
88<\/td>\n | A.19 Module TransientKey <\/td>\n<\/tr>\n | ||||||
89<\/td>\n | A.20 Module TrustedTimestamp <\/td>\n<\/tr>\n | ||||||
94<\/td>\n | A.21 Module ANSI-X9-42 <\/td>\n<\/tr>\n | ||||||
97<\/td>\n | A.22 Module ANSI-X9-62 <\/td>\n<\/tr>\n | ||||||
103<\/td>\n | Annex B Object identifiers defined in this Recommendation | International Standard <\/td>\n<\/tr>\n | ||||||
104<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. Generic applications of ASN.1 – Cryptographic message syntax<\/b><\/p>\n |