• Shopping Cart
    There are no items in your cart

CAN/CSA-ISO/IEC 17825:18

Current

Current

The latest, up-to-date edition.

Information technology — Security techniques — Testing methods for the mitigation of non-invasive attack classes against cryptographic modules (Adopted ISO/IEC 17825:2016, first edition, 2016-01-15)

Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

01-01-2018

€160.62
Excluding VAT

Foreword
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 Document organization
6 Non-invasive attack methods
7 Associated Security Functions
8 Non-invasive Attack Test Methods
9 Side-Channel Analysis of Symmetric-Key Cryptosystems
10 ASCA on Asymmetric Cryptography
11 Non-invasive attack mitigation pass/fail test metrics
Annex A (normative) - Requirements for measurement apparatus
Annex B (informative) - Emerging attacks
Annex C (informative) - Quality criteria for measurement setups
Annex D (informative) - Chosen-input method to accelerate
                        leakage analysis
Bibliography

Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the SCC Mirror Committee (SMC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T). Scope This International Standard specifies the non-invasive attack mitigation test metrics for determining conformance to the requirements specified in ISO/IEC 19790 for Security Levels 3 and 4. The test metrics are associated with the security functions specified in ISO/IEC 19790. Testing will be conducted at the defined boundary of the cryptographic module and I/O available at its defined boundary. The test methods used by testing laboratories to test whether the cryptographic module conforms to the requirements specified in ISO/IEC 19790 and the test metrics specified in this International Standard for each of the associated security functions specified in ISO/IEC 19790 are specified in ISO/IEC 24759. The test approach employed in this International Standard is an efficient \"push-button\" approach: the tests are technically sound, repeatable and have moderate costs.

DocumentType
Standard
ISBN
978-1-4883-1022-5
Pages
0
PublisherName
Canadian Standards Association
Status
Current

Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the SCC Mirror Committee (SMC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T). Scope This International Standard specifies the non-invasive attack mitigation test metrics for determining conformance to the requirements specified in ISO/IEC 19790 for Security Levels 3 and 4. The test metrics are associated with the security functions specified in ISO/IEC 19790. Testing will be conducted at the defined boundary of the cryptographic module and I/O available at its defined boundary. The test methods used by testing laboratories to test whether the cryptographic module conforms to the requirements specified in ISO/IEC 19790 and the test metrics specified in this International Standard for each of the associated security functions specified in ISO/IEC 19790 are specified in ISO/IEC 24759. The test approach employed in this International Standard is an efficient \"push-button\" approach: the tests are technically sound, repeatable and have moderate costs.

Standards Relationship
ISO/IEC 17825:2016 Identical

ISO/IEC 19790:2012 Information technology — Security techniques — Security requirements for cryptographic modules
ISO/IEC 24759:2017 Information technology Security techniques Test requirements for cryptographic modules

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.