Information technology – ASN.1 encoding rules: Registration and application of PER encoding instructions |
 |
ITU-T Rec. X.695 | ISO/IEC 8825-6 specifies the rules for applying PER encoding instructions using either type prefixes or an encoding control section.Encoding instructions are a means of modifying the encodings of ASN.1 types for some specified encoding rule (in this case PER). They can be inserted in an ASN.1 specification in square brackets (much like a tag in the Basic Encoding Rules, (BER)) immediately before the type that they affect (type prefixes), or they can be collected together at the end of an ASN.1 module (an encoding control section).It also specifies the procedures for developing, registering and publishing new PER encoding instructions from time to time. |
|
Citation: |
https://handle.itu.int/11.1002/1000/9112 |
Series title: |
X series: Data networks, open system communications and security X.600-X.699: OSI networking and system aspects X.680-X.699: Abstract Syntax Notation One (ASN.1) |
Approval date: |
2007-05-29 |
Identical standard: | ISO/IEC 8825-6:2008 (Common) |
Approval process: | AAP |
Status: |
Superseded |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
X.695 (2007-05)
|
Index of all ASN.1 assignments defined in this Recommendation.
|
|
Click
here
to download all the modules of this Recommendation (zipped archive)
|
Click here to download all the modules needed to compile this Recommendation (zipped archive)
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|