ISO/IEC 17825:2016
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
Information technology — Security techniques — Testing methods for the mitigation of non-invasive attack classes against cryptographic modules
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
19-01-2024
English
04-01-2016
ISO/IEC 17825:2016 specifies the non-invasive attack mitigation test metrics for determining conformance to the requirements specified in ISO/IEC 19790 for Security Levels 3 and 4. The test metrics are associated with the security functions specified in ISO/IEC 19790. Testing will be conducted at the defined boundary of the cryptographic module and I/O available at its defined boundary.
The test methods used by testing laboratories to test whether the cryptographic module conforms to the requirements specified in ISO/IEC 19790 and the test metrics specified in this International Standard for each of the associated security functions specified in ISO/IEC 19790 are specified in ISO/IEC 24759. The test approach employed in this International Standard is an efficient "push-button" approach: the tests are technically sound, repeatable and have moderate costs.
Committee |
ISO/IEC JTC 1/SC 27
|
DocumentType |
Standard
|
Pages |
46
|
PublisherName |
International Organization for Standardization
|
Status |
Superseded
|
SupersededBy | |
UnderRevision |
Standards | Relationship |
NEN ISO/IEC 17825 : 2016 | Identical |
BS ISO/IEC 17825:2016 | Identical |
DS ISO/IEC 17825 : 2016 | Identical |
CAN/CSA-ISO/IEC 17825:18 | Identical |
INCITS/ISO/IEC 17825:2016(R2023) | Identical |
ISO/IEC TS 20540:2018 | Information technology — Security techniques — Testing cryptographic modules in their operational environment |
17/30354862 DC : 0 | BS ISO/IEC 19896-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY TESTERS AND EVALUATORS - PART 2: KNOWLEDGE, SKILLS AND EFFECTIVENESS REQUIREMENTS FOR ISO/IEC 19790 TESTERS |
18/30356051 DC : DRAFT APR 2018 | BS ISO/IEC 20543 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TEST AND ANALYSIS METHODS FOR RANDOM BIT GENERATORS WITHIN ISO/IEC 19790 AND ISO/IEC 15408 |
ISO/IEC 19790:2012 | Information technology — Security techniques — Security requirements for cryptographic modules |
AS 2828.2:2019 | Health records Digitized health records |
ISO/IEC 24759:2017 | Information technology Security techniques Test requirements for cryptographic modules |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.