{"id":411527,"date":"2024-10-20T05:45:38","date_gmt":"2024-10-20T05:45:38","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-166092022-tc\/"},"modified":"2024-10-26T10:39:44","modified_gmt":"2024-10-26T10:39:44","slug":"bs-iso-166092022-tc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-166092022-tc\/","title":{"rendered":"BS ISO 16609:2022 – TC"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
1<\/td>\n | 30464805 <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | A-30401531 <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 1 \u200bScope 2 \u200bNormative references 3 \u200bTerms and definitions <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 4 \u200bPrinciples 4.1 \u200bProtection of authentication keys 4.2 \u200bMessage authentication elements <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 4.3 \u200bDetection of duplication, loss or sequence errors 5 \u200bProcedures for message authentication 5.1 \u200bMAC generation <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 5.2 \u200bMAC placement 5.3 \u200bMAC verification 5.4 \u200bApproved authentication mechanisms based on the ISO\/IEC 9797 series 5.4.1 \u200bGeneral 5.4.2 \u200bApproved message authentication mechanisms based on ISO\/IEC 9797-1 <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 5.4.3 \u200bApproved message authentication mechanisms based on ISO\/IEC 9797-2 <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 5.4.4 \u200bApproved message authentication mechanisms based on ISO\/IEC 9797-3 <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 5.4.5 Implementation recommendations <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | Annex A (informative) Protection against duplication and loss using MIDs <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | Annex B (informative) General tutorial information <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Tracked Changes. Financial services. Requirements for message authentication using symmetric techniques<\/b><\/p>\n |