ISO/IEC 9594-12:2025
(Main)Information technology - Open systems interconnection - Part 12: The Directory: Key management and public-key infrastructure establishment and maintenance
Information technology - Open systems interconnection - Part 12: The Directory: Key management and public-key infrastructure establishment and maintenance
This Recommendation | International Standard supplements Rec. ITU-T X.509 | ISO/IEC 9594-8 and Rec. ITU-T X.510 | ISO/IEC 9594-11 by providing an extended description of cryptographic algorithms and guidance in establishment and maintenance of a public-key infrastructure (PKI). It is outside the scope of this Recommendation | International Standard to define new cryptographic algorithms, but it is within scope to discuss already-defined cryptographic algorithms that provide optimal protection, including future protection against attacks using powerful quantum computers. This Recommendation | International Standard specifies how public-key infrastructure (PKI) may be adapted to support machine-to-machine (M2M) communication, e.g., smart grid and Internet of things (IoT), to allow interworking. This Recommendation | International Standard specifies the procedures for establishment and maintenance of a PKI supporting new areas, such as intelligent electricity network (smart grid) and industrial Internet of things.
Technologies de l'information — Interconnexion de systèmes ouverts (OSI) — Partie 12: Titre manque
General Information
- Status
- Published
- Publication Date
- 15-May-2025
- Current Stage
- 6060 - International Standard published
- Start Date
- 16-May-2025
- Due Date
- 05-Aug-2025
- Completion Date
- 16-May-2025
Relations
- Effective Date
- 06-Jun-2022
Overview
ISO/IEC 9594-12:2025 (Recommendation ITU‑T X.508) extends the Directory series by providing guidance on key management and the establishment and maintenance of public‑key infrastructure (PKI). It supplements ISO/IEC 9594‑8 (X.509) and ISO/IEC 9594‑11 (X.510) with an extended description of already‑defined cryptographic algorithms, best‑practice procedures for PKI lifecycle management, and considerations for migration to post‑quantum algorithms. The document explicitly does not define new cryptographic algorithms but discusses algorithm selection, security strength, and future‑proofing (crypto agility).
Key technical topics and requirements
- Cryptographic algorithm overview: formal specification practices, security properties, strength metrics, one‑way functions, and entropy/random number generation.
- Symmetric and hash algorithms: requirements for encryption modes, authenticated encryption with associated data (AEAD), and hashing considerations.
- Public‑key and signature algorithms: guidance on public‑key cryptography, asymmetric ciphers, digital signatures, and key establishment.
- Post‑quantum considerations: migration strategies, crypto agility principles, and high‑level discussion of quantum‑threat models.
- Integrity and key establishment: integrity check value (ICV) algorithms and secure key establishment mechanisms.
- Hardware Security Modules (HSMs): recommended roles and protections for key storage and cryptographic operations.
- PKI establishment & maintenance: best practices for certificate policy, certification authority (CA) roles, certificate content and extensions (e.g., key usage, subjectAltName, authority info), revocation handling, and certificate chaining.
- M2M, IoT and smart grid adaptation: procedures and interoperability recommendations for machine‑to‑machine (M2M), industrial IoT and intelligent electricity networks.
Practical applications
- Designing and operating enterprise PKI, including CA deployment, certificate lifecycle, and revocation processes.
- Securing IoT and smart grid deployments where constrained devices and large M2M ecosystems require tailored PKI procedures.
- Guiding migration plans toward post‑quantum cryptography while preserving interoperability.
- Informing procurement and implementation of HSMs, RNG sources, and crypto libraries used in critical infrastructure.
- Supporting auditors, compliance teams, and security architects in aligning implementations with international PKI best practices.
Who should use this standard
- PKI architects and security engineers
- Certificate Authorities (CAs) and registration authorities (RAs)
- IoT and smart grid system designers
- HSM vendors and integrators
- Standards and compliance officers
Related standards
- ISO/IEC 9594‑8 (ITU‑T X.509) - Public‑key certificate framework
- ISO/IEC 9594‑11 (ITU‑T X.510) - Directory services
- ISO/IEC 9594 series - The Directory family
ISO/IEC 9594‑12:2025 is essential reading for anyone designing interoperable, future‑resistant PKI for modern M2M, IoT and critical infrastructure environments.
Frequently Asked Questions
ISO/IEC 9594-12:2025 is a standard published by the International Organization for Standardization (ISO). Its full title is "Information technology - Open systems interconnection - Part 12: The Directory: Key management and public-key infrastructure establishment and maintenance". This standard covers: This Recommendation | International Standard supplements Rec. ITU-T X.509 | ISO/IEC 9594-8 and Rec. ITU-T X.510 | ISO/IEC 9594-11 by providing an extended description of cryptographic algorithms and guidance in establishment and maintenance of a public-key infrastructure (PKI). It is outside the scope of this Recommendation | International Standard to define new cryptographic algorithms, but it is within scope to discuss already-defined cryptographic algorithms that provide optimal protection, including future protection against attacks using powerful quantum computers. This Recommendation | International Standard specifies how public-key infrastructure (PKI) may be adapted to support machine-to-machine (M2M) communication, e.g., smart grid and Internet of things (IoT), to allow interworking. This Recommendation | International Standard specifies the procedures for establishment and maintenance of a PKI supporting new areas, such as intelligent electricity network (smart grid) and industrial Internet of things.
This Recommendation | International Standard supplements Rec. ITU-T X.509 | ISO/IEC 9594-8 and Rec. ITU-T X.510 | ISO/IEC 9594-11 by providing an extended description of cryptographic algorithms and guidance in establishment and maintenance of a public-key infrastructure (PKI). It is outside the scope of this Recommendation | International Standard to define new cryptographic algorithms, but it is within scope to discuss already-defined cryptographic algorithms that provide optimal protection, including future protection against attacks using powerful quantum computers. This Recommendation | International Standard specifies how public-key infrastructure (PKI) may be adapted to support machine-to-machine (M2M) communication, e.g., smart grid and Internet of things (IoT), to allow interworking. This Recommendation | International Standard specifies the procedures for establishment and maintenance of a PKI supporting new areas, such as intelligent electricity network (smart grid) and industrial Internet of things.
ISO/IEC 9594-12:2025 is classified under the following ICS (International Classification for Standards) categories: 35.100.70 - Application layer. The ICS classification helps identify the subject area and facilitates finding related standards.
ISO/IEC 9594-12:2025 has the following relationships with other standards: It is inter standard links to ISO/IEC 9594-11:2020. Understanding these relationships helps ensure you are using the most current and applicable version of the standard.
You can purchase ISO/IEC 9594-12:2025 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of ISO standards.
Standards Content (Sample)
International
Standard
ISO/IEC 9594-12
First edition
Information technology — Open
2025-05
systems interconnection —
Part 12:
The Directory: Key management
and public-key infrastructure
establishment and maintenance
Reference number
© ISO/IEC 2025
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on
the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below
or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
© ISO/IEC 2025 – All rights reserved
ii
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are members
of ISO or IEC participate in the development of International Standards through technical committees
established by the respective organization to deal with particular fields of technical activity. ISO and IEC
technical committees collaborate in fields of mutual interest. Other international organizations, governmental
and non-governmental, in liaison with ISO and IEC, also take part in the work.
The procedures used to develop this document and those intended for its further maintenance are described
in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed for the different types of
document should be noted.
ISO and IEC draw attention to the possibility that the implementation of this document may involve the use of
(a) patent(s). ISO and IEC take no position concerning the evidence, validity or applicability of any claimed
patent rights in respect thereof. As of the date of publication of this document, ISO and IEC had not received
notice of (a) patent(s) which may be required to implement this document. However, implementers are
cautioned that this may not represent the latest information, which may be obtained from the patent database
available at www.iso.org/patents and https://patents.iec.ch. ISO and IEC shall not be held responsible for
identifying any or all such patent rights.
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and expressions
related to conformity assessment, as well as information about ISO's adherence to the World Trade
Organization (WTO) principles in the Technical Barriers to Trade (TBT) see www.iso.org/iso/foreword.html.
In the IEC, see www.iec.ch/understanding-standards.
This document was prepared by ITU-T as ITU-T X.508 (10/2024) and drafted in accordance with its editorial
rules, in collaboration with Joint Technical Committee ISO/IEC JTC 1, Information technology, Subcommittee
SC 6, Telecommunications and information exchange between systems.
A list of all parts in the ISO/IEC 9594 series can be found on the ISO and IEC websites.
Any feedback or questions on this document should be directed to the user’s national standards body. A
complete listing of these bodies can be found at www.iso.org/members.html and www.iec.ch/national-
committees.
© ISO/IEC 2025 – All rights reserved
iii
INTERNATIONAL STANDARD ISO/IEC 9594-12
RECOMMENDATION ITU-T X.508
Information technology – Open Systems Interconnection – The Directory: Key management
and public-key infrastructure establishment and maintenance
Summary
Recommendation ITU-T X.508 | ISO/IEC 9594-12 is intended to fill the gap between Recommendation ITU-T X.509 |
ISO/IEC 9594-8 and Recommendation ITU-T X.510 | ISO/IEC 9594-11 by giving a description of selected cryptographic
algorithms with references to more detailed specifications. To establish the theory behind the cryptographic algorithm, an
informative annex gives in introduction to the supporting mathematics. Also, some considerations on migration to post
quantum algorithm are included.
Section 3 provides a best practice guideline for establishing and maintaining a public-key infrastructure (PKI) with
emphasis on environments outside the traditional PKI environments, such as guidance for establishing a PKI for networks
of Internet of things (IoT) and smart grid.
*
History
Edition Recommendation Approval Study Group Unique ID
1.0 ITU-T X.508 2024-10-29 17 11.1002/1000/16196
Keywords
Authenticated encryption, authentication, block cipher, confidentiality, cryptography, encryption, information security,
mode of operation.
____________________
*
To access the Recommendation, type the URL https://handle.itu.int/ in the address field of your web browser, followed by the
Recommendation's unique ID.
Rec. ITU-T X.508 (10/2024)
© ISO/IEC 2025 – All rights reserved
iv
FOREWORD
The International Telecommunication Union (ITU) is the United Nations specialized agency in the field of
telecommunications, and information and communication technologies (ICTs). The ITU Telecommunication
Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical,
operating and tariff questions and issuing Recommendations on them with a view to standardizing
telecommunications on a worldwide basis.
The World Telecommunication Standardization Assembly (WTSA), which meets every four years, establishes
the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these topics.
The approval of ITU-T Recommendations is covered by the procedure laid down in WTSA Resolution 1.
In some areas of information technology which fall within ITU-T's purview, the necessary standards are
prepared on a collaborative basis with ISO and IEC.
NOTE
In this Recommendation, the expression "Administration" is used for conciseness to indicate both a
telecommunication administration and a recognized operating agency.
Compliance with this Recommendation is voluntary. However, the Recommendation may contain certain
mandatory provisions (to ensure, e.g., interoperability or applicability) and compliance with the
Recommendation is achieved when all of these mandatory provisions are met. The words "shall" or some other
obligatory language such as "must" and the negative equivalents are used to express requirements. The use of
such words does not suggest that compliance with the Recommendation is required of any party.
INTELLECTUAL PROPERTY RIGHTS
ITU draws attention to the possibility that the practice or implementation of this Recommendation may involve
the use of a claimed Intellectual Property Right. ITU takes no position concerning the evidence, validity or
applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others outside of
the Recommendation development process.
As of the date of approval of this Recommendation, ITU had not received notice of intellectual property,
protected by patents/software copyrights, which may be required to implement this Recommendation.
However, implementers are cautioned that this may not represent the latest information and are therefore
strongly urged to consult the appropriate ITU-T databases available via the ITU-T website at
https://www.itu.int/ITU-T/ipr/.
ITU 2025
All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior
written permission of ITU.
Rec. ITU-T X.508 (10/2024)
© ISO/IEC 2025 – All rights reserved
v
CONTENTS
Page
1 Scope . 1
2 Normative references . 1
2.1 Identical Recommendations | International Standards . 1
2.2 Paired Recommendations | International Standards equivalent in technical content . 1
2.3 Recommendations . 2
2.4 International Standards . 2
2.4 Additional references . 2
3 Definitions . 2
3.1 Terms defined elsewhere . 2
3.2 Terms defined in this Recommendation | International Standard . 3
4 Abbreviations . 4
5 Conventions . 6
6 Cybersecurity considerations for communication networks . 6
6.1 The challenge of large information and communication technology (ICT) networks . 6
6.2 Connection-mode communication . 7
6.2.1 General . 7
6.2.2 Association establishment phase . 8
6.2.3 Data transfer phase . 8
6.2.4 Association termination phase . 8
6.3 Security services . 8
7 Overview of cryptographic algorithms . 10
7.1 Introduction . 10
7.2 Formal specification of cryptographic algorithms . 10
7.3 Security properties of crypto graphic algorithms . 11
7.4 Security strength . 11
7.5 One-way functions . 12
7.6 Random number generation and entropy . 12
8 Symmetric-key algorithms . 13
8.1 General . 13
8.2 Symmetric key encryption . 13
8.3 Authenticated encryption with associated data (AEAD) . 13
8.4 Symmetric key requirements . 14
9 Hash algorithms . 14
10 Public key and asymmetric cipher . 15
10.1 Public-key cryptography . 15
10.2 Asymmetric cipher . 15
11 Public key and digital signature algorithms . 16
11.1 General . 16
12 Key establishment algorithms . 17
13 Integrity check value (ICV) algorithms . 17
14 Post-quantum cryptography considerations . 17
14.1 General considerations. 17
14.2 Crypto agility . 18
14.3 Quantum computers and cryptographic algorithm migration . 18
14.4 Possible attacks by use of quantum computers . 18
14.4.1 Symmetric cryptographic algorithms . 18
14.4.2 Asymmetric cryptographic algorithms . 18
14.5 Mathematic behind post-quantum cryptography . 19
15 Hardware security modules . 19
16 Public-key infrastructure establishment . 21
Rec. ITU-T X.508 (10/2024)
© ISO/IEC 2025 – All rights reserved
vi
17 Public-key certificates . 21
17.1 General . 21
17.2 The identity and role of the certification authority . 21
17.3 Distinguished name considerations . 21
17.4 Content of the basic structure of a public-key certificate . 22
17.4.1 General . 22
17.4.2 Version component . 23
17.4.3 Serial number component . 23
17.4.4 Signature component . 23
17.4.5 Issuer component . 23
17.4.6 Validity component . 23
17.4.7 Subject component . 24
17.4.8 Subject public-key information . 24
17.4.9 Issuer unique ID and subject unique ID . 25
17.5 Extensions for public-key certificates . 25
17.5.1 Some considerations on extensions to public-key certificates and other data types . 25
17.5.2 Basic constraints extension . 25
17.5.3 Key usage extension . 25
17.5.4 Subject alternative name extension . 26
17.5.5 Authority information access extension . 26
17.5.6 Authority key identifier extension . 26
17.5.7 Subject key identifier extension . 26
17.5.8 No revocation information available extension . 26
17.5.9 Subject alternative public-key info extension . 26
17.5.10 Alternative signature algorithm extension . 27
17.5.11 Alternative signature value extension . 27
17.5.12 Subject directory attribute extension type . 27
17.7 Chaining of public-key certificates . 27
17.7.1 Name chaining . 27
17.7.2 Key identifier chaining . 28
18 Certificate life-cycle management . 29
18.1 General . 29
18.2 Validity of certificates to be installed or reviewed . 29
18.3 Local policy with respect to invalid certificates . 29
19 Machine identity and machine-to-machine communication . 30
20 Trust establishment . 30
20.1 General . 30
20.2 Single public-key infrastructure domain . 30
20.3 Trust establishment between two public-key infrastructure domains . 31
20.4 A worldwide federated public-key infrastructure . 32
20.5 Trust anchor compromise . 32
21 PKI configurations . 33
21.1 Introduction . 33
21.2 Public-key infrastructure (PKI) components . 33
22 PKI establishment . 34
22.1 Human resources . 34
22.1.1 Public-key infrastructure knowledge . 34
22.1.2 Cryptographic algorithm knowledge. 34
22.2 IETF public-key infrastructure specifications . 34
22.2.1 Enrolment over Secure Transport (EST) . 34
22.2.2 Internet X.509 PKI Certificate Management Protocol (CMP) . 34
22.2.3 Certificate Management over CMS (CMC) . 35
23 Revocation of public-key certificates . 35
23.1 Certificate revocation lists (CRLs) . 35
23.2 Online certificate status protocol (OCSP). 35
Annex A Cryptographic primitives . 36
A.1 Block cipher algorithms . 36
A.1.1 Block cipher functions and block cipher operation modes . 36
Rec. ITU-T X.508 (10/2024)
© ISO/IEC 2025 – All rights reserved
vii
A.1.2 Feistel cipher structure . 36
A.1.3 Advanced encryption standard . 38
A.1.4 ShāngMi 4 (SM4) block cipher algorithm . 43
A.1.5 Operation modes for block cipher symmetric-key algorithms . 46
A.2 Authenticated encryption with associated data (AEAD) algorithms . 51
A.2.1 General . 51
A.2.2 Galois/counter mode (GCM) . 51
A.2.3 Counter with CBC-MAC (CCM) . 53
A.3 Cryptographic hash algorithms . 55
A.3.1 General . 55
A.3.2 Merkle-Damgaard construction . 56
A.3.3 The SHA-2 series of hash algorithms . 58
A.3.4 The Kᴇᴄᴄᴀᴋ (sponge) algorithms . 59
A.3.5 SHA-3 series of hash algorithms . 61
A.3.6 ShāngMi 3 (SM3) hash algorithm . 62
A.4 The RSA crypto system . 63
A.4.1 General about the RSA crypto system . 63
A.4.2 Key generation . 63
A.4.3 Security considerations . 64
A.5 Asymmetric encryption . 64
A.5.1 General . 64
A.5.2 RSA asymmetric cipher . 64
A.6 Public-key algorithms including digital signature algorithms . 65
A.6.1 General . 65
A.6.2 The RSA digital signature system . 66
A.6.3 The DSA public-key algorithm . 67
A.6.4 The elliptic curve digital signature algorithms (ECDSA) . 67
A.6.5 SM2 algorithm . 70
A.6.6 The Edwards-curve digital signature algorithms . 70
A.7 Key establishment algorithms . 72
A.7.1 Introduction . 72
A.7.2 RSA symmetric key encapsulation . 73
A.7.3 The Diffie-Hellman key agreement method. 73
A.7.4 Key derivation function . 75
A.8 Integrity check value (ICV) algorithms . 76
A.8.1 Introduction . 76
A.8.2 Keyed-hash message authentication code (HMAC) . 76
A.8.3 Cipher-based message authentication code (CMAC) . 76
A.8.4 Kᴇᴄᴄᴀᴋ message authentication code (KMAC) . 77
A.8.5 Galois message authentication code (GMAC) algorithm . 78
Annex B Basic mathematic concepts for cryptographic algorithms . 80
B.1 Introduction to basic mathematic . 80
B.1.1 Scope of annex . 80
B.1.2 The prime number, the semiprime and the coprime number concepts . 80
B.1.3 Greatest common divisor . 80
B.1.4 The logarithm concept . 80
B.1.5 Operations on matrices . 80
B.1.6 Least common multiple . 81
B.1.7 Bitwise logical operations . 81
B.1.8 Bit masking . 82
B.2 Modular arithmetic . 82
B.3 Group theory . 83
B.3.1 Introduction . 83
B.3.2 Notation . 84
B.3.3 Additive group of integers . 84
B.3.4 Multiplicative group of integers . 84
B.3.5 Cyclic groups . 85
B.3.6 The discrete logarithm problem . 85
B.3.7 Generalized discrete logarithm problem . 86
B.3.8 Subgroup . 86
B.3.9 Order of group and order of element. 86
Rec. ITU-T X.508 (10/2024)
© ISO/IEC 2025 – All rights reserved
viii
B.3.10 Ways to resolve or attack the discrete logarithm problem . 86
B.4 Finite fields (Galois field) . 87
B.4.1 General . 87
B.4.2 Prime fields . 87
B.4.3 Binary fields GF(2ᵐ) . 88
B.5 Overview of Elliptic curve cryptography . 89
B.5.1 Reasons for using elliptic curve cryptography . 89
B.5.2 Overview of polynomial forms for defining elliptic curves . 90
B.5.3 Variants of the Weierstrass form . 90
B.5.4 The Montgomery form . 90
B.5.5 The twisted Edwards curves . 90
B.6 Elliptic curve cryptography for short-Weierstrass form . 90
B.6.1 Definition of curves based on the Weierstrass form . 90
B.6.2 Defining group over elliptic curve . 92
B.7 Montgomery elliptic curve cryptography . 95
B.7.1 Introduction . 95
B.7.2 Curve25519 and Ed25519 . 95
B.7.3 Curve448 and Ed448 . 95
B.7.4 The Montgomery curves . 95
B.7.5 The Edwards curves . 96
B.8 Conversion techniques . 96
B.8.1 General . 96
B.8.2 Bit string-to-integer conversion and binary length of integer . 96
B.8.3 Integer-to-bit string conversion . 96
B.8.4 Octet string to integer conversion . 96
B.8.5 Integer-to-octet string conversion . 96
B.8.6 Bitstring-to-octet string conversion . 96
B.9 Miscellaneous formulae . 97
B.9.1 Introductions . 97
B.9.2 The Euclidean algorithm . 97
B.9.3 The extended Euclidean algorithm. 97
B.9.3 Fermat's little theorem. 98
B.9.4 Lagrange's theorem . 98
B.9.5 Euler's phi function . 98
B.10 Endianness (big endian vs. little endian) . 98
B.11 Selected attacks on cryptographic algorithms . 98
B.11.1 Side-channel attack . 98
B.11.2 Square root attack . 99
Annex C Alphabetical list of cryptographic concepts and definitions . 100
Bibliography . 101
Rec. ITU-T X.508 (10/2024)
© ISO/IEC 2025 – All rights reserved
ix
INTERNATIONAL STANDARD
ITU-T RECOMMENDATION
Information technology – Open Systems Interconnection – The Directory: Key management
and public-key infrastructure establishment and maintenance
SECTION 1 – GENERAL
1 Scope
This Recommendation | International Standard supplements Rec. ITU-T X.509 | ISO/IEC 9594-8 and Rec. ITU-T X.510
| ISO/IEC 9594-11 by providing an extended description of cryptographic algorithms and guidance in establishment and
maintenance of a public-key infrastructure (PKI).
It is outside the scope of this Recommendation | International Standard to define new cryptographic algorithms, but it is
within scope to discuss already-defined cryptographic algorithms that provide optimal protection, including future
protection against attacks using powerful quantum computers.
This Recommendation | International Standard specifies how public-key infrastructure (PKI) may be adapted to support
machine-to-machine (M2M) communication, e.g., smart grid and Internet of things (IoT), to allow interworking.
This Recommendation | International Standard specifies the procedures for establishment and maintenance of a PKI
supporting new areas, such as intelligent electricity network (smart grid) and industrial Internet of things.
2 Normative references
The following Recommendations and International Standards contain provisions which, through reference in this text,
constitute provisions of this Recommendation | International Standard. At the time of publication, the editions indicated
were valid. All Recommendations and Standards are subject to revision, and parties to agreements based on this
Recommendation | International Standard are encouraged to investigate the possibility of applying the most recent edition
of the Recommendations and Standards listed below. Members of IEC and ISO maintain registers of currently valid
International Standards. The Telecommunication Standardization Bureau of the ITU maintains a list of currently valid
ITU-T Recommendations.
2.1 Identical Recommendations | International Standards
– Recommendation ITU-T X.501 (2019) | ISO/IEC 9594-2:2020, Information technology – Open Systems
Interconnection – The Directory: Models.
– Recommendation ITU-T X.509 (2019) | ISO/IEC 9594-8:2020, Information technology – Open Systems
Interconnection – The Directory: Public-key and attribute certificate frameworks.
– Recommendation ITU-T X.510 (2020) | ISO/IEC 9594-11:2020, Information technology – Open Systems
Interconnection – The Directory: Protocol specifications for secure operations.
– Recommendation ITU-T X.520 (2019) | ISO/IEC 9594-6:2020, Information technology – Open Systems
Interconnection – The Directory: Selected attribute types.
– Recommendation ITU-T X.680 (2021) | ISO/IEC 8824-1:2021, Information technology – Abstract Syntax
Notation One (ASN.1): Specification of basic notation.
– Recommendation ITU-T X.681 (2021) | ISO/IEC 8824-2:2021, Information technology – Abstract Syntax
Notation One (ASN.1): Information object specification.
– Recommendation ITU-T X.682 (2021) | ISO/IEC 8824-3:2021, Information technology – Abstract Syntax
Notation One (ASN.1): Constraint specification.
– Recommendation ITU-T X.683 (2021) | ISO/IEC 8824-4:2021, Information technology – Abstract Syntax
Notation One (ASN.1): Parameterization of ASN.1 specifications.
2.2 Paired Recommendations | International Standards equivalent in technical content
– Recommendation ITU-T X.800 (1991), Security architecture for Open Systems Interconnection for CCITT
applications.
ISO 7498-2:1989, Information processing systems – Open Systems Interconnection – Basic Reference
Model. Part 2: Security Architecture.
Rec. ITU-T X.508 (10/2024)
© ISO/IEC 2025 – All rights reserved
2.3 Recommendations
– Recommendation ITU-T X.1252 (2021), Baseline identity management terms and definitions.
2.4 International Standards
– ISO/IEC 9797-2:2021, Information security – Message authentication codes (MACs) – Part 2:
Mechanisms using a dedicated hash-function.
– ISO/IEC 10116:2017, Information technology – Security techniques – Modes of operation for a n-bit block
cipher.
– ISO/IEC 10118-3:2018, IT Security techniques – Hash-functions – Part 3: Dedicated hash-functions.
– ISO/IEC 11770-6:2016, Information technology – Security techniques – Key Management – Part 6: Key
derivation.
– ISO/IEC 14888-3:2018, IT Security techniques – Digital signatures with appendix – Part 3: Discrete
logarithm based mechanisms.
– ISO/IEC 18033-3:2010/Amd.1:2021, Information technology – Security techniques – Encryption
algorithms – Part 3: Block ciphers, Amendment 1: SM4.
– ISO/IEC 19790:2012, Information technology – Security techniques – Security requirements for
cryptographic modules.
2.4 Additional references
– IETF RFC 4210 (2005), Internet X.509 Public Key Infrastructure, Certificate Management Protocol
(CMP).
– IETF RFC 5280 (2008), Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation
List (CRL) Profile.
– IETF RFC 5905 (2010), Network Time Protocol Version 4: Protocol and Algorithms Specification.
– IETF RFC 6712 (2012), Internet X.509 Public Key Infrastructure – HTTP Transfer for the Certificate
Management Protocol (CMP).
– IETF RFC 6960 (2013), X.509 Internet Public Key Infrastructure – Online Certificate Status Protocol –
OCSP.
– IETF RFC 7030 (2013), Enrollment over Secure Transport.
– IETF RFC 8017 (2016), PKCS #1: RSA Cryptography Specifications Version 2.2.
– IETF RFC 8032 (2017), Edwards-Curve Digital Signature Algorithm (EdDSA).
– IETF RFC 8446 (2018), The Transport Layer Security (TLS) Protocol Version 1.3.
– NIST FIPS 186-5 (2023). Digital Signature Standard (DSS).
– NIST PUB 202 (2015), Permutation-Based Hash and Extendable-Output Functions.
– NIST SP 800-38C (2004), Recommendation for Block Cipher Modes of Operation: The CCM Mode for
Authentication and Confidentiality.
– NIST SP 800-38D (2007), R
...
Die Norm ISO/IEC 9594-12:2025 bietet eine umfassende Anleitung zur Schaffung und Wartung einer öffentlichen Schlüssel-Infrastruktur (PKI) und ergänzt die bestehenden Empfehlungen ITU-T X.509 sowie ISO/IEC 9594-8 und ISO/IEC 9594-11. Der Schwerpunkt liegt auf kryptografischen Algorithmen, die bereits definiert sind, und der Unterstützung neuer Technologien, wie zum Beispiel der Machine-to-Machine (M2M) Kommunikation, was insbesondere für Anwendungen im Bereich des intelligenten Stromnetzes und des Internet der Dinge (IoT) von großer Bedeutung ist. Ein herausragendes Merkmal dieser Norm ist ihre Relevanz für die Sicherstellung eines optimalen Schutzes gegen zukünftige Angriffe, vor allem unter Berücksichtigung der potenziellen Bedrohungen durch leistungsstarke Quantencomputer. Die Norm bietet die notwendige Flexibilität, um bestehende PKI-Architekturen an die Anforderungen moderner Anwendungen anzupassen, was die Interoperabilität zwischen verschiedenen Systemen fördert. Die Anforderungen und Verfahren zur Etablierung und Wartung einer PKI, die in dieser Norm beschrieben werden, sind nicht nur praxisnah, sondern auch zukunftsorientiert. Die Norm ist essenziell für Organisationen, die eine robuste Sicherheitsarchitektur implementieren möchten, um die Datenintegrität und Vertraulichkeit in verschiedenen Kommunikationsnetzen zu gewährleisten. Zusammenfassend lässt sich sagen, dass die ISO/IEC 9594-12:2025 eine entscheidende Rolle bei der Standardisierung von Sicherheitsmaßnahmen im Bereich der Informationstechnologie spielt, indem sie klare Richtlinien für die PKI-Implementierung bereitstellt und gleichzeitig die Kompatibilität mit neuen Technologien und Sicherheitsanforderungen sicherstellt.
ISO/IEC 9594-12:2025は、情報技術のオープンシステム相互接続に関する国際標準であり、公開鍵インフラストラクチャ(PKI)の設立と維持に関する重要なガイドラインを提供しています。この標準は、ITU-T X.509およびISO/IEC 9594-8、X.510およびISO/IEC 9594-11を補完しており、暗号アルゴリズムの詳細な説明と公共鍵基盤の管理に対する指針を強化しています。 この標準の重要な強みは、既に定義された暗号アルゴリズムを討論することにより、最適な保護を提供することにあります。また、将来的に量子コンピュータによる攻撃からの保護も考慮されているため、長期的なセキュリティを確保するための基盤が組み込まれています。これにより、PKIは進化する技術的環境に対する柔軟性と適応性を持つことができ、特に機械間通信(M2M)やスマートグリッド、IoT(モノのインターネット)をサポートするための通常の手順を踏むことができる点が、非常に関連性の高い特徴となっています。 ISO/IEC 9594-12:2025は、これらの新しい分野に対してPKIを構築し、維持するための手続きを具体的に定めており、業界全体におけるセキュリティ向上を促進します。このような標準化文書は、情報技術分野における国際的な信頼性を確保し、組織が新たな技術的課題に対応できるように支援するため、今後ますます重要となるでしょう。
La norme ISO/IEC 9594-12:2025 représente une avancée significative dans le domaine de la technologie de l'information, en particulier dans la gestion des clés et l'établissement d'infrastructures à clés publiques (PKI). Le champ d'application de cette norme complète les recommandations précédentes telles que ITU-T X.509 et ITU-T X.510, en fournissant une description approfondie des algorithmes cryptographiques déjà établis, et en offrant des indications précieuses pour la mise en place et la maintenance d'une PKI. Parmi ses points forts, cette norme met l'accent sur la sécurité optimale, y compris la protection future contre des attaques utilisant des ordinateurs quantiques puissants, un sujet de préoccupation grandissant dans le contexte actuel de la cybersécurité. En fournissant des orientations sur les algorithmes cryptographiques existants, elle permet aux organisations d'implémenter des solutions qui sont non seulement sécurisées aujourd'hui, mais aussi résistantes face aux menaces émergentes. La norme ISO/IEC 9594-12:2025 est également particulièrement pertinente dans le cadre de la communication machine-à-machine (M2M), surtout dans des domaines en pleine évolution tels que les réseaux intelligents et l'Internet des objets (IoT). Les spécifications relatives à l'adaptation de l'infrastructure à clés publiques pour ces nouvelles applications garantissent une interopérabilité essentielle entre différents systèmes, facilitant ainsi le développement d'environnements connectés et sécurisés. En conclusion, ISO/IEC 9594-12:2025 constitue un document fondamental pour la standardisation des infrastructures de gestion de clés publiques, renforçant ainsi la base de la sécurité numérique tout en répondant aux exigences technologiques modernes et à venir.
ISO/IEC 9594-12:2025 is a critical standard in the realm of information technology and open systems interconnection, specifically focusing on key management and the establishment and maintenance of public-key infrastructure (PKI). The standard notably supplements existing recommendations on cryptographic protocols, specifically Rec. ITU-T X.509, ISO/IEC 9594-8, and Rec. ITU-T X.510, ISO/IEC 9594-11, providing an essential expansion to the authorized framework around cryptographic practices. One of the significant strengths of this document is its extended description of cryptographic algorithms that are vital for maintaining robust security measures. While it does not introduce new cryptographic algorithms, it thoroughly discusses those that are already defined, enhancing understanding of optimal protections including resilience against the emerging threat posed by quantum computing. This proactive stance ensures that entities adhering to the standard will possess forward-looking security strategies, thereby reinforcing trust in digital communications and transactions. Furthermore, ISO/IEC 9594-12:2025 showcases its relevance by addressing the evolving landscape of technology through its specifications for adapting PKI systems to support machine-to-machine (M2M) communications. As the rise of smart grids and the Internet of Things (IoT) becomes increasingly prominent, having clear guidelines on how PKI can be effectively integrated into these technologies is indispensable. The standard effectively outlines necessary procedures for establishing and maintaining a PKI within these novel contexts, ensuring that organizations can navigate the complexities of modern digital infrastructures. In summary, ISO/IEC 9594-12:2025 provides a comprehensive framework for key management within PKI, emphasizes the significance of established cryptographic algorithms, and delineates approaches to integrate PKI in contemporary technological advancements. It stands as a vital resource for organizations looking to bolster their security measures while adapting to fast-paced technological changes.
ISO/IEC 9594-12:2025 표준은 정보 기술 분야에서 오픈 시스템 상호 연결 관련 지식 체계를 제시합니다. 이 문서는 이미 정의된 암호 알고리즘에 대한 자세한 설명과 공개 키 인프라(PKI)의 설립 및 유지 관리에 대한 지침을 제공합니다. 암호화 알고리즘의 새로운 정의를 포함하지 않으나, 최적의 보호를 제공하는 기 이미 정의된 암호 알고리즘에 대한 논의는 포함되어 있습니다. 이 표준은 미래의 양자 컴퓨터 공세로부터의 보호를 염두에 둔 암호 알고리즘의 활용 방안을 다루고 있어 현대 정보 기술 환경에서 매우 중요합니다. 또한, ISO/IEC 9594-12:2025는 기계 간 통신(M2M)을 지원하기 위한 PKI의 적응 방법을 명시하여 스마트 그리드와 사물인터넷(IoT) 등 새로운 영역에서도 상호 운용성을 보장합니다. 이 문서의 주요 강점 중 하나는 PKI의 수립 및 유지 관리 절차를 수립함으로써 스마트 전기망과 산업 IoT 같은 진화하는 기술 분야와의 통합을 도모하고 있다는 점입니다. 결과적으로, ISO/IEC 9594-12:2025 표준은 현대의 디지털 환경에 필수적인 보안 체계를 강화하는 데 기여하며, 정보 통신 기술의 발전에 따라 지속적으로 업데이트되고 있습니다.










Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.
Loading comments...