Skip to main content

Part of the book series: Telecommunications ((TELECOMMUNICATI,volume 18))

  • 87 Accesses

Zusammenfassung

Diese Arbeit gibt einen Einblick in die Entstehung einer Norm, einen Überblick über die Normungsgremien und deren Aktivitäten auf dem Gebiet der IT-Sicherheit sowie einen Ausblick auf die in den nächsten Jahren zu erwartenden Normen auf diesem Gebiet. Hierbei liegt der Schwerpunkt auf den Normen und Normvorhaben des internationalen Komitees SC27, dem weltweit für Fragen im Bereich allgemeiner Sicherheitsmechanismen und Kriterien für IT-Sicherheit zuständigen Gremium von ISO und IEC, und denen des ETSI, welches sich im Rahmen der Standardisierung der Telekommunikation für Europa auch mit Fragen der Sicherheit beschäftigt.

Ein Unternehmen der Firmengruppe Giesecke & Devrient

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Literaturverzeichnis

  1. ANSI X3.92: 1981, Data Encryption Algorithm,American National Standards Institute

    Google Scholar 

  2. ANSI X9.30, Public Key Cryptography Using Irreversible Algorithms for the Financial Services Industry,4 parts (part 1 is FIPS XX [18]), 199X

    Google Scholar 

  3. ANSI X9.31, Public Key Cryptography Using Reversible Algorithms for the Financial Services Industry,4 parts (part 1 is based on ISO/IEC 9796), 199X

    Google Scholar 

  4. C. Bourstin, Security and Standardization, AFNOR, preprint 1992

    Google Scholar 

  5. CEC, Green Book on the Security of information Systems,Draft 3.6, July 1993

    Google Scholar 

  6. CEC, Information Technology Security Evaluation Criteria (ITSEC),Office for Official Publications of the European Communities, Luxemburg 1991 (version 1.2)

    Google Scholar 

  7. CEN, European Standardization of the IT Security Evaluation Criteria,CEN Project Team PT05, issue 1.1, March 1993

    Google Scholar 

  8. CCITT Recommendation X.509: 1988 The Directory - Authentication Framework

    Google Scholar 

  9. M. De Soete and K. Vedder, Authentication Standards, in: W. Wolfowicz (ed.): Proceedings of the 3rd Symposium on: State and Progress of Research in Cryptography, Fondazione Ugo Bordoni, Rome 1993, 207–218

    Google Scholar 

  10. DIN, Europäische Normung - Ein Leitfaden des DIN, DIN Deutsches Institut für Normung e.V., Berlin 1991

    Google Scholar 

  11. DIN-NI, Wir geben der Informationstechnik Profil, NI-Gremienliste, Normenausschuß Informationsverarbeitungssysteme im DIN, Berlin 1993

    Google Scholar 

  12. ETS 300 175–7: 1992 Digital European Cordless Telecommunications (DECT) Common interface Part 7: Security Features

    Google Scholar 

  13. ETSI, Terms of Reference for Technical Committees and Sub Committees of the European Telecommunications Standards Institute, Sophia Antipolis, July 1993

    Google Scholar 

  14. ETSI, Technical Specification GSM 02.09: “Security Aspects”,Phase 1, Release 1992

    Google Scholar 

  15. ETSI, Technical Specification GSM 03.20: “Security Related Network Functions”, Phase 1, Release 1992

    Google Scholar 

  16. FIPS 46: 1977, Federal Information Processing Standards Publication, Data Encryption Standard, National Bureau of Standards

    Google Scholar 

  17. FIPS 81: 1980, Federal Information Processing Standards Publication, DES Modes of Operation, National Bureau of Standards

    Google Scholar 

  18. FIPS XX, Federal Information Processing Standards Publication, Digital Signature Standard, National Institute of Standards and Technology, 199X

    Google Scholar 

  19. T. Humphreys, Taxonomy and Directory of European standardisation requirements for information system security, ITAEGV N69, April 1992 (version 2. 0 )

    Google Scholar 

  20. ISO 8372: 1987 Information processing - Modes of operation for a 64-bit block cipher algorithm

    Google Scholar 

  21. ISO 8730: 1986/90 Banking - Reqirements for message authentication (wholesale)

    Google Scholar 

  22. ISO 8731–1: 1987 Banking - Approved algorithms for message authentication - Part 1: DEA

    Google Scholar 

  23. ISO/IEC 9796: 1991 Information technology - Security techniques - Digital signature scheme giving message recovery

    Google Scholar 

  24. ISO/IEC 9979: 1991 Data cryptographic techniques - Procedures for the registration of cryptographic algorithms

    Google Scholar 

  25. ISO/IEC JTC1/SC27Secretariat’s Report for presentation to JTC1 Plenary, Berlin, March 1993, JTC1/SC27 Secretariat, December 1992

    Google Scholar 

  26. ISO/IEC, Directives, Procedures for the technical work of ISO/IEC JTC1 on Information Technology, Geneva 1992 (second edition)

    Google Scholar 

  27. ISO/IEC, Directives Part 3, Drafting and presentation of International Standards, Geneva 1989 (second edition)

    Google Scholar 

  28. Kommission der Europäischen Gemeinschaften, Grünbuch der EG-Kommission zur Entwicklung der europäischen Normung: Maßnahmen für eine schnellere technologische Integration in Europa, KOM(90) 456 endg., Brüssel 1990

    Google Scholar 

  29. G. Lennox, EDI security, in: B. Preneel, R. Govaerts and J. Vandewalle (eds.): Computer Security and Industrial Cryptography, State of the Art and Evolution, Lect. Notes in Comp. Science 741, Springer-Verlag, Berlin 1993, 235–243

    Google Scholar 

  30. C.J. Mitchell, M. Walker and P.D.C. Rush, CCITT/ISO standards for secure message handling, IEEE Journal of Selected Areas in Communications, Vol. 7 (1989), 517–524

    Article  Google Scholar 

  31. H. Ochsner: Das zukünftige paneuropäische digitale Mobiltelephonsystem, Teil 3: Digitalisierung der Sprache und Netzwerkaspekte, Bull. ASE/UCS 79 (1988) 21, 1318–1324

    Google Scholar 

  32. R.L. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Comm. ACM, Vol 21 (1978), 120126

    Google Scholar 

  33. R.L. Rivest, M.E. Hellman and J.C. Anderson, Who Holds the Key, Responses to NIST’s Proposal, Comm. of the ACM, Vol 35, No. 7, 41–52

    Google Scholar 

  34. R.A. Rueppel Criticism of ISO CD 11166 Banking - Key Management by Means of Asymmetric Algorithms in: W. Wolfowicz (ed.): Proceedings of the 3rd Symposium on: State and Progress of Research in Cryptography Fondazione Ugo Bordoni, Rome 1993, 207–218

    Google Scholar 

  35. W.H.W. Tuttlebee (ed.): Cordless Telecommunications in Europe, Springer-Verlag, London, 1990

    Google Scholar 

  36. K. Vedder, Security Aspects of Mobile Communications, in: B. Preneel, R. Govaerts and J. Vandewalle (eds.): Computer Security and Industrial Cryptography, State of the Art and Evolution, Lect. Notes in Comp. Science 741, Springer-Verlag, Berlin 1993, 193–210

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1994 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Vedder, K. (1994). Internationale Standardisierung für Informationssicherheit. In: Eberspächer, J. (eds) Sichere Daten, sichere Kommunikation / Secure Information, Secure Communication. Telecommunications, vol 18. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-85103-2_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-85103-2_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-57744-7

  • Online ISBN: 978-3-642-85103-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics