CAN/CSA-ISO/IEC 17825:18
Current
The latest, up-to-date edition.
Information technology — Security techniques — Testing methods for the mitigation of non-invasive attack classes against cryptographic modules (Adopted ISO/IEC 17825:2016, first edition, 2016-01-15)
Hardcopy , PDF
English
01-01-2018
Foreword
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 Document organization
6 Non-invasive attack methods
7 Associated Security Functions
8 Non-invasive Attack Test Methods
9 Side-Channel Analysis of Symmetric-Key Cryptosystems
10 ASCA on Asymmetric Cryptography
11 Non-invasive attack mitigation pass/fail test metrics
Annex A (normative) - Requirements for measurement apparatus
Annex B (informative) - Emerging attacks
Annex C (informative) - Quality criteria for measurement setups
Annex D (informative) - Chosen-input method to accelerate
leakage analysis
Bibliography
Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the SCC Mirror Committee (SMC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T). Scope This International Standard specifies the non-invasive attack mitigation test metrics for determining conformance to the requirements specified in ISO/IEC 19790 for Security Levels 3 and 4. The test metrics are associated with the security functions specified in ISO/IEC 19790. Testing will be conducted at the defined boundary of the cryptographic module and I/O available at its defined boundary. The test methods used by testing laboratories to test whether the cryptographic module conforms to the requirements specified in ISO/IEC 19790 and the test metrics specified in this International Standard for each of the associated security functions specified in ISO/IEC 19790 are specified in ISO/IEC 24759. The test approach employed in this International Standard is an efficient \"push-button\" approach: the tests are technically sound, repeatable and have moderate costs.
DocumentType |
Standard
|
ISBN |
978-1-4883-1022-5
|
Pages |
0
|
PublisherName |
Canadian Standards Association
|
Status |
Current
|
Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the SCC Mirror Committee (SMC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T). Scope This International Standard specifies the non-invasive attack mitigation test metrics for determining conformance to the requirements specified in ISO/IEC 19790 for Security Levels 3 and 4. The test metrics are associated with the security functions specified in ISO/IEC 19790. Testing will be conducted at the defined boundary of the cryptographic module and I/O available at its defined boundary. The test methods used by testing laboratories to test whether the cryptographic module conforms to the requirements specified in ISO/IEC 19790 and the test metrics specified in this International Standard for each of the associated security functions specified in ISO/IEC 19790 are specified in ISO/IEC 24759. The test approach employed in this International Standard is an efficient \"push-button\" approach: the tests are technically sound, repeatable and have moderate costs.
Standards | Relationship |
ISO/IEC 17825:2016 | Identical |
ISO/IEC 19790:2012 | Information technology — Security techniques — Security requirements for cryptographic modules |
ISO/IEC 24759:2017 | Information technology Security techniques Test requirements for cryptographic modules |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.