The American National Standard (ANS) X9.124, Format Preserving Encryption, defines a collection of methods for encrypting data strings so that the length and the character set for the ciphertext is the same as those of the plaintext. This is called format-preserving encryption (FPE). These methods...
This Recommendation describes a security-related misbehaviour detection mechanism for connected vehicles. The mechanism includes the following steps. a) Data capture. Specification of the types of data and information that can be captured from different sources, including automotive,...
This Recommendation specifies basic models and procedures for securely updating the firmware or software (FW/SW) of IoT devices. It also describes requirements and capabilities for IoT FW/SW updates. This Recommendation focuses on updating FW, but it is applicable to updating any other SW of IoT...
This Recommendation proposes guidelines for applying threat intelligence in telecommunication network operation after an overview analysis.
This standard provides specifications for identifying an eligible security, financial instrument, or other investment media referred to hereinafter as an issue. It uniquely identifies the issuer, and with a few exceptions for high-volume fixed income programs, the issue as well. It shall serve as...
This Recommendation specifies a framework of software-defined security in software-defined networks (SDNs) and the network functions virtualization (NFV) networks. This Recommendation provides the following: - analysis of the main security challenges including technical and operational aspects in...
The ANS X9.124 standard defines a collection of methods for encrypting data strings so that the length and the character set for the ciphertext is the same as those of the plaintext. This is called format-preserving encryption (FPE). These methods are useful in situations where fixed-format data,...
This Recommendation provides information security management processes for telecommunication organizations to support the implementation of [ITU-T X.1051]. This Recommendation is based on a process approach to describe a set of security management areas which give guidelines to...
This Recommendation is the first in a series on the security of quantum key distribution (QKD) and provides a security framework for other related Recommendations. In particular, this Recommendation addresses the following items: - security aspects for quantum key distribution networks (QKDNs); -...
This Recommendation establishes guidelines for an intrusion detection system (IDS) for in-vehicle networks (IVNs). This Recommendation identifies threats to IVNs such as a controller area network (CAN), which is widely used in modern vehicles. This Recommendation mainly focuses on aspects of...
This Recommendation classifies potential use cases of security services provided by operators, analyses their specific requirements and specifies guidelines for operators to safeguard and improve their security services.
This Recommendation contains a baseline set of terms and definitions for distributed ledger technology (DLT). The definition of each term provides a basic characterization of the term, and where appropriate, a note is included to provide additional clarity.
This Recommendation defines three levels of security assurance for the distributed ledger technology (DLT). It further defines ten security assurance components encompassing security assurance and specifies criteria and guidelines for achieving each of the three levels of a security assurance...
This Recommendation describes key combination methods for quantum key distribution network (QKDN) and specifies security requirements for both the key combination and the key supply from QKDN to cryptographic applications. In particular, this Recommendation addresses the following points: - the...
This Recommendation analyses security threats to connected vehicles in two parts: threats against interfaces which are used to communicate between a vehicle and its external devices, and threats against external devices which communicate with the vehicle. This Recommendation specifies security...
This Recommendation analyses threats related to unknown malwares and specifies requirements of unknown malware detection based on dynamic behaviour analysis. This Recommendation covers: - Analysis of threat scenarios related to unknown malwares, such as targeted/customized malwares; and -...
This Standard defines methods for digital signature (signature) generation and verification for the protection of messages and data using the Elliptic Curve Digital Signature Algorithm (ECDSA). The ECDSA shall be used in conjunction with an Approved hash function, as specified in the ASC X9...