Перелік стандартів для ЕЦП (Україна)
Перейти до навігації
Перейти до пошуку
Перелік міжнародних та європейських стандартів, інших актів технічного регулювання для гармонізації з метою реформування, розвитку та забезпечення інтероперабельності системи електронного цифрового підпису — визначений наказом Міністерства юстиції України, Адміністрації Державної служби спеціального зв'язку та захисту інформації України 05.12.2013 № 2563/5/645 (у редакції наказу Міністерства юстиції України, Адміністрації Державної служби спеціального зв'язку та захисту інформації України 25.12.2014 № 2170/5/703).[1]
- ISO/IEC 9796-2:2010 «Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Integer factorization based mechanisms».
- ISO/IEC 9796-3:2006 «Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms».
- ISO/IEC 14888-1:2008 «Information technology — Security techniques — Digital signatures with appendix — Part 1: General».
- ISO/IEC 14888-2:2008 «Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms».
- ISO/IEC 14888-3:2006 «Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms».
- ISO/IEC 15946-1:2008 «Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General».
- ISO/IEC 15946-5:2009 «Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generation».
- ISO/IEC 18014-1:2008 «Information technology — Security techniques — Time-stamping services — Part 1: Framework».
- ISO/IEC 18014-2:2009 «Information technology — Security techniques — Time-stamping services — Part 2: Mechanisms producing independent tokens».
- ISO/IEC 18014-3:2009 «Information technology — Security techniques — Time-stamping services — Part 3: Mechanisms producing linked tokens».
- ISO/IEC 9594-8:2008 «Information technology — Open Systems Interconnection — The Directory: Public-key and attribute certificate frameworks».
- ISO/IEC 11770-1:2010 «Information technology — Security techniques — Key management — Part 1: Framework».
- ISO/IEC 11770-2:2008 «Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques».
- ISO/IEC 11770-3:2008 «Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques».
- ISO/IEC 11770-4:2006 «Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets».
- ISO/IEC 11770-5:2011 «Information technology — Security techniques — Key management — Part 5: Group key management».
- ISO/IEC 9797-1:2011 «Information technology — Security techniques — Message Authentication Codes (MACs) — Part 1: Mechanisms using a block cipher».
- SO/IEC 9797-2:2011 «Information technology — Security techniques — Message Authentication Codes (MACs) — Part 2: Mechanisms using a dedicated hash-function».
- ISO/IEC 9797-3:2011 «Information technology — Security techniques — Message Authentication Codes (MACs) — Part 3: Mechanisms using a universal hash-function».
- ISO/IEC 10118-1:2003 «Information technology — Security techniques — Hash-functions — Part 1: General».
- ISO/IEC 10118-2:2010 «Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher».
- ISO/IEC 10118-3:2005 «Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions».
- ISO/IEC 10118-4:1998 «Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic».
- ISO/IEC 9798-1:2010 «Information technology — Security techniques — Entity authentication — Part 1: General».
- ISO/IEC 9798-2:2008 «Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms».
- ISO/IEC 9798-3:1998 «Information technology — Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques».
- ISO/IEC 9798-4:1999 «Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function».
- ISO/IEC 9798-5:2009 «Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques».
- ISO/IEC 9798-6:2010 «Information technology — Security techniques — Entity authentication — Part 6: Mechanisms using manual data transfer».
- ISO/IEC FDIS 29115 «Information technology — Security techniques — Entity authentication assurance framework».
- ISO/IEC 29191:2012 «Information technology — Security techniques — Requirements for partially anonymous, partially unlink able authentication».
- ISO/IEC 18031:2011 «Information technology — Security techniques — Random bit generation».
- ISO/IEC 18032:2005 «Information technology — Security techniques — Prime number generation».
- ISO/IEC 13888-1:2009 «Information technology — Security techniques — Non-repudiation — Part 1: General».
- ISO/IEC 13888-2:2010 «Information technology — Security techniques — Non-repudiation — Part 2: Mechanisms using symmetric techniques».
- ISO/IEC 13888-3:2009 «Information technology — Security techniques — Non-repudiation — Part 3: Mechanisms using asymmetric techniques».
- ISO/IEC 10116:2006 «Information technology — Security techniques — Modes of operation for an n-bit block cipher».
- ISO/IEC 18033-1:2005 «Information technology — Security techniques — Encryption algorithms — Part 1: General».
- ISO/IEC 18033-2:2006 «Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers».
- ISO/IEC 18033-3:2010 «Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers».
- ISO/IEC 18033-4:2011 «Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers».
- ISO/IEC 19790:2012 «Information technology — Security techniques — Security requirements for cryptographic modules».
- ISO/IEC DIS 24759 «Information technology — Security techniques — Test requirements for cryptographic modules».
- ISO/IEC 29100:2011 «Information technology — Security techniques — Privacy framework».
- ISO/IEC 15408-1:2009 «Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model».
- ISO/IEC 15408-2:2008 «Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components».
- ISO/IEC 15408-3:2008 «Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components».
- ISO/IEC TR 15446:2009 «Information technology — Security techniques — Guide for the production of Protection Profiles and Security Targets».
- ISO/IEC 18045:2008 «Information technology — Security techniques — Methodology for IT security evaluation».
- ISO/IEC TR 19791:2010 «Information technology — Security techniques — Security assessment of operational systems».
- ISO/IEC 19792:2009 «Information technology — Security techniques — Security evaluation of biometrics».
- ISO/IEC 24745:2011 «Information technology — Security techniques — Biometric information protection».
- ISO/IEC 24761:2009 «Information technology — Security techniques — Authentication context for biometrics».
- CWA 14167-1:2003 «Security Requirements for Trust worthy Systems Managing Certificates for Electronic Signatures — Part 1: System Security Requirements».
- CWA 14167-2:2004 «Cryptographic module for CSP signing operations with backup — Protection profile — CMCSOB PP».
- CWA 14167-4:2004 «Cryptographic module for CSP signing operations — Protection profile — CMCSO PP».
- CWA 14169:2004 «Secure signature-creation devices „EAL 4+“.
- CWA 16093:2010 „Feasibility Study for a Global eBusiness Interoperability Test Bed (GTIB)“.
- CWA 16022:2009 „Project Schedule and Cost Performance Management (PSCPM)“.
- CWA 15994:2009 „eTendering Process“.
- CWA 15666:2007 „Business Requirements Specification, Cross industry e-Tendering process“.
- CWA 15667:2007 „Business Requirements Specification, Cross industry Catalogue Process“.
- CWA 15668:2007 „Business Requirements Specification, Cross industry Invoicing Process“.
- CWA 15669-1:2007 „Business requirements specification — Cross industry ordering process — Part 1: Global ordering process model definition“.
- CWA 15669-2:2007 „Business requirements specification — Cross industry ordering process — Part 2: Order transaction“.
- CWA 15669-3:2007 „Business requirements specification — Cross industry ordering process — Part 3: Order change transaction“.
- CWA 15669-4:2007 „Business requirements specification — Cross industry ordering process — Part 4: Order response transaction“.
- CWA 15670:2007 „Business Requirements Specification, Cross industry Remittance Advice Process“.
- CWA 15671:2007 „Business Requirements Specification, Cross industry Scheduling Process“.
- CWA 15672:2007 „Business Requirements Specification, Cross industry Despatch and Receive Process“.
- CWA 15066:2004 „SAD Transit Declaration — Implementation Model“.
- CWA 15065:2004 „SAD Exports Declaration — Implementation Model“.
- CWA 15672:2007 „Business Requirements Specification, Cross industry Despatch and Receive Process“.
- CWA 15066:2004 „SAD Transit Declaration — Implementation Model“.
- CWA 15065:2004 „SAD Exports Declaration — Implementation Model“.
- CWA 15064:2004 „SAD Imports Declaration — Implementation Model“.
- CWA 14729-1:2003 „The Intrastat System — Part 1: The Implementation Model“.
- CWA 14729-3:2003 „The Intrastat System — Part 3: Message Implementation Guideline of INSRES/XML“.
- ETSI TS 101 456:2005 „Electronic Signatures and Infrastructures (ESI). Policy Requirements for certification authorities issuing qualified certificates“.
- ETSI TR 102 437:2006 „Electronic Signatures and Infrastructures (ESI); Guidance on TS 101 456 (Policy Requirements for certification authorities issuing qualified certificates)“.
- ETSI TS 102 778:2009 „Electronic Signatures and Infrastructures (ESI). — PDF Advanced Electronic Signature Profiles; CMS Profile based on ISO 32000-1“.
- ETSI TS 102 778-1:2009 „Electronic Signatures and Infrastructures (ESI). — PDF Advanced Electronic Signature Profiles. — Part 1: PAdES Overview — a framework document for PAdES“.
- ETSI TS 102 778-2:2009 „Electronic Signatures and Infrastructures (ESI) — PDF Advanced Electronic Signature Profiles — Part 2: PAdES Basic — Profile based on ISO 32000-1“.
- ETSI TS 102 778-3:2009 „Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles; Part 3: PAdES Enhanced — PadES-BES and PAdES-EPES Profiles“.
- ETSI TS 102 778-4:2009 „Electronic Signatures and Infrastructures (ESI) — PDF Advanced Electronic Signature Profiles — Part 4: PAdES Long Term — PadES LTV Profile“.
- ETSI TS 102 778-5:2009 „Electronic Signatures and Infrastructures (ESI) — PDF Advanced Electronic Signature Profiles — Part 5: PAdES for XML Content — Profiles for XAdES signatures“.
- ETSI TS 102 231:2006 „Electronic Signatures and Infrastructures (ESI) — Provision of harmonized Trust-service status information“.
- ETSI TR 102 272:2003 „Electronic Signatures and Infrastructures (ESI); ASN.1 format for signature policies“.
- ETSI TR 102 158:2003 „Electronic Signatures and Infrastructures (ESI); Policy requirements for Certification Service Providers issuing attribute certificates usable with Qualified certificates“.
- RFC 3739 Internet X.509 „Public Key Infrastructure: Qualified Certificates Profile“.
- RFC 4510 „Lightweight Directory Access Protocol (LDAP): Technical Specification Road Map“.
- RFC 4511 „Lightweight Directory Access Protocol (LDAP): The Protocol“
- RFC 4512 „Lightweight Directory Access Protocol (LDAP): Directory Information Models“.
- RFC 4513 „Lightweight Directory Access Protocol (LDAP): Authentication Methods and Security Mechanisms“.
- RFC 4514 „Lightweight Directory Access Protocol (LDAP): String Representation of Distinguished Names“.
- RFC 4515 „Lightweight Directory Access Protocol (LDAP): String Representation of Search Filters“.
- RFC 4516 „Lightweight Directory Access Protocol (LDAP): Uniform Resource Locator“.
- RFC 4517 „Lightweight Directory Access Protocol (LDAP): Syntaxes and Matching Rules“.
- RFC 4518 „Lightweight Directory Access Protocol (LDAP): Internationalized String Preparation“.
- RFC 4519 „Lightweight Directory Access Protocol (LDAP): Schema for User Applications“.
- RFC 4523 „Lightweight Directory Access Protocol (LDAP) Schema Definitions for X.509 Certificates“.
- RFC 421 Internet X.509 „Public Key Infrastructure Certificate Request Message Format (CRMF)“.
- RFC 5652 „Cryptographic Message Syntax (CMS)“.
- RFC 2560 „Internet X.509 Public Key Infrastructure Online Certificate Status Protocol — OCSP“.
- RFC 2631 „Diffie-Hellman Key Agreement Method“, June 1999».
- RFC 3161 «Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)».
- RFC 3370 «Cryptographic Message Syntax (CMS) Algorithms», August 2002".
- RFC 3852 «Cryptographic Message Syntax (CMS)», July 2004".
- PKCS #5 «Password-Based Cryptography Standard».
- PKCS #8 «Private-Key Information Syntax Standard».
- PKCS #10 «Certification Request Syntax Specification».
- PKCS #11 «Cryptographic Token Interface (Cryptoki)».
- PKCS #12 «Personal Information Exchange Syntax Standard»
- PKCS #15 «Cryptographic Token Information Format Standard».
- W3C Recommendation 10 June 2008 XML «Signature Syntax and Processing (Second Edition)».
- ISO/IEC 27000:2013 «Information technology — Security techniques — Information security management systems — Overview and vocabulary».
- ISO/IEC 27001:2013 «Information technology — Security techniques — Information security management systems — Requirements».
- ISO/IEC 27002:2013 «Information technology — Security techniques — Code of practice for information security controls».
- ITAF, 3d Edition «A Professional Practices Framework for IS Audit/Assurance».
- ISO/IEC 27005:2011 «Information technology — Security techniques — Information security risk management».
- ISO/IEC 27006:2007 «Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems».
- ISO/IEC 27007:2011 «Information technology — Security techniques — Guidelines for information security management systems auditing».
- ISO/IEC TR 27008:2011 «Information technology — Security techniques — Guidelines for auditors on information security management systems controls».
- ISO/IEC 27010:2012 «Information technology — Security techniques — Information security management for inter-sector and inter-organizational communications».
- ISO/IEC 27031:2011 «Information technology — Security techniques — Guidelines for information and communication technology readiness for business continuity».
- ISO/IEC 27033-1:2009 «Information technology — Security techniques — Network security — Part 1: Overview and concepts».
- ISO/IEC 27033-2:2012 «Information technology — Security techniques — Network security — Part 2: Guidelines for the design and implementation of network security».
- ISO/IEC 27033-3:2010 «Information technology — Security techniques — Network security — Part 3: Reference networking scenarios — Threats, design techniques and control issues».
- ISO/IEC 27033-4:2013 Information technology — Security techniques — Network security — Part 4: Securing communications between networks using security gateways
- ISO/IEC 27033-5:2013 «Information technology — Security techniques — Network security — Part 5: Securing communications across networks using Virtual Private Network (VPNs)».
- ISO/IEC27035:2011 «Information technology — Security techniques — Information security incident management».
- ↑ zakon4.rada.gov.ua/laws/show/v2170323-14