• BS ISO/IEC 18367:2016

    Current The latest, up-to-date edition.

    Information technology. Security techniques. Cryptographic algorithms and security mechanisms conformance testing

    Available format(s):  Hardcopy, PDF

    Language(s):  English

    Published date:  31-12-2016

    Publisher:  British Standards Institution

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Introduction
    1 Scope
    2 Normative references
    3 Terms and definitions
    4 Symbols and abbreviated terms
    5 Objectives
    6 Types of cryptographic algorithms and security
       mechanisms from a conformance testing perspective
    7 Conformance testing methodologies
    8 Levels of conformance testing
    9 Conformance testing guidelines
    10 Conformance testing
    Annex A (informative) - Common mistakes in
            cryptographic algorithm implementations
    Annex B (informative) - Examples of known-answer
            test vectors
    Bibliography

    Abstract - (Show below) - (Hide below)

    Provides guidelines for cryptographic algorithms and security mechanisms conformance testing methods.

    General Product Information - (Show below) - (Hide below)

    Committee IST/33/3
    Development Note Supersedes 15/30279582 DC. (12/2016)
    Document Type Standard
    Publisher British Standards Institution
    Status Current
    Supersedes

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
    ISO/IEC 18032:2005 Information technology Security techniques Prime number generation
    ISO/IEC 11770-5:2011 Information technology Security techniques Key management Part 5: Group key management
    ISO/IEC 14888-3:2016 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
    ISO/IEC 11770-6:2016 Information technology Security techniques Key management Part 6: Key derivation
    ISO/IEC 19790:2012 Information technology — Security techniques — Security requirements for cryptographic modules
    ISO/IEC 9796-2:2010 Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms
    FIPS PUB 186 : 0 DIGITAL SIGNATURE STANDARD (DSS)
    ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
    ISO/IEC 24759:2017 Information technology Security techniques Test requirements for cryptographic modules
    ISO/IEC 9797-2:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function
    ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
    ISO/IEC 14888-2:2008 Information technology Security techniques Digital signatures with appendix Part 2: Integer factorization based mechanisms
    ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
    ISO/IEC 18045:2008 Information technology — Security techniques — Methodology for IT security evaluation
    ANSI X9.42 : 2003(R2013) PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES: AGREEMENT OF SYMMETRIC KEYS USING DISCRETE LOGARITHM CRYPTOGRAPHY
    ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective