Information technology – Generic applications of ASN.1: Cryptographic message syntax |
 |
Recommendation ITU-T X.894 | ISO/IEC 24824-4 provides Abstract Syntax Notation One (ASN.1) modules for using cryptographic syntax in ITU-T Recommendations. Cryptographic message syntax (CMS) provides data integrity, confidentiality, origin authenticity, and non-repudiation services needed for reliable information exchange and for strong authentication. Recommendation ITU-T X.894 | ISO/IEC 24824-4 also brings together a set of cryptographic key management techniques to support flexible key establishment mechanisms, such as constructive key management, key agreement, key exchange, and password-based encryption. These techniques can be used to prevent fraud, and to protect personally identifiable and other sensitive information. Recommendation ITU-T X.894 | ISO/IEC 24824-4 supports digital signature, encryption, and signcryption techniques based on the public-key technology defined in the ITU-T X.500 series | ISO/IEC 9594 multipart standard. All standardized encoding rules for ASN.1 are supported.
This document integrates ITU-T X.894 (2018) and its Corrigendum 1 (2019) and Corrigendum 2 (2021) in clean text.
|
|
Citation: |
https://handle.itu.int/11.1002/1000/12848 |
Series title: |
X series: Data networks, open system communications and security X.850-X.899: OSI applications X.890-X.899: Generic applications of ASN.1 |
Approval date: |
2018-10-14 |
Identical standard: | ISO/IEC 24824-4:2021 (Common) |
Provisional name: | X.cms-prof |
Approval process: | AAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Click
here
to download all the modules of this Recommendation (zipped archive)
|
Click here to download all the modules needed to compile this Recommendation (zipped archive)
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|