ISO/IEC 24759:2017
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
View Superseded by
Information technology — Security techniques — Test requirements for cryptographic modules
Hardcopy , PDF
English
04-04-2017
09-04-2025
ISO/IEC 24759:2017 specifies the methods to be used by testing laboratories to test whether the cryptographic module conforms to the requirements specified in ISO/IEC 19790:2012. The methods are developed to provide a high degree of objectivity during the testing process and to ensure consistency across the testing laboratories.
This document also specifies the requirements for information that vendors provide to testing laboratories as supporting evidence to demonstrate their cryptographic modules' conformity to the requirements specified in ISO/IEC 19790:2012.
Vendors can use this document as guidance in trying to verify whether their cryptographic modules satisfy the requirements specified in ISO/IEC 19790:2012 before they apply to the testing laboratory for testing.
| Committee |
ISO/IEC JTC 1/SC 27
|
| DocumentType |
Standard
|
| Pages |
135
|
| PublisherName |
International Organization for Standardization
|
| Status |
Withdrawn
|
| SupersededBy | |
| Supersedes | |
| UnderRevision |
| Standards | Relationship |
| JIS X 24759:2023 | Identical |
| NEN ISO/IEC 24759 : 2014 + COR 2015 | Identical |
| BS ISO/IEC 24759:2017 | Identical |
| DS ISO/IEC 24759 : 2017 | Identical |
| INCITS/ISO/IEC 24759:2017(R2023) | Identical |
| INCITS/ISO/IEC 24759 : 2014 | Identical |
| BS ISO/IEC 19896-1:2018 | IT security techniques. Competence requirements for information security testers and evaluators Introduction, concepts and general requirements |
| I.S. EN ISO/IEC 27040:2016 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015) |
| 14/30249803 DC : 0 | BS ISO/IEC 27040 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
| 14/30259616 DC : 0 | BS ISO/IEC 17825 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUE - TESTING METHODS FOR THE MTIGATION OF NON-INVASIVE ATTACK CLASSES AGAINST CRYPTOGRAPHIC MODULES |
| PD ISO/TS 12812-2:2017 | Core banking. Mobile financial services Security and data protection for mobile financial services |
| BS ISO/IEC 18367:2016 | Information technology. Security techniques. Cryptographic algorithms and security mechanisms conformance testing |
| ISO/IEC TS 20540:2018 | Information technology — Security techniques — Testing cryptographic modules in their operational environment |
| ISO/TS 12812-2:2017 | Core banking — Mobile financial services — Part 2: Security and data protection for mobile financial services |
| DIN EN ISO/IEC 27040:2016-04 (Draft) | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015) |
| ISO/IEC 18367:2016 | Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing |
| PD ISO/IEC TS 30104:2015 | Information Technology. Security Techniques. Physical Security Attacks, Mitigation Techniques and Security Requirements |
| 17/30354862 DC : 0 | BS ISO/IEC 19896-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY TESTERS AND EVALUATORS - PART 2: KNOWLEDGE, SKILLS AND EFFECTIVENESS REQUIREMENTS FOR ISO/IEC 19790 TESTERS |
| ISO/IEC 20248:2018 | Information technology — Automatic identification and data capture techniques — Data structures — Digital signature meta structure |
| 15/30279582 DC : 0 | BS ISO/IEC 18367 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC ALGORITHMS AND SECURITY MECHANISMS CONFORMANCE TESTING |
| ISO/IEC TS 30104:2015 | Information Technology — Security Techniques — Physical Security Attacks, Mitigation Techniques and Security Requirements |
| BS ISO/IEC 27040 : 2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
| BS EN ISO/IEC 27040:2016 | Information technology. Security techniques. Storage security |
| ISO/IEC 27040:2015 | Information technology — Security techniques — Storage security |
| EN ISO/IEC 27040:2016 | Information technology - Security techniques - Storage security (ISO/IEC 27040:2015) |
| 18/30356051 DC : DRAFT APR 2018 | BS ISO/IEC 20543 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TEST AND ANALYSIS METHODS FOR RANDOM BIT GENERATORS WITHIN ISO/IEC 19790 AND ISO/IEC 15408 |
| BS ISO/IEC 17825:2016 | Information technology. Security techniques. Testing methods for the mitigation of non-invasive attack classes against cryptographic modules |
| 17/30351732 DC : 0 | BS ISO/IEC 19896-1 - INFORMATION TECHNOLOGY - IT SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY TESTERS AND EVALUATORS - PART 1: INTRODUCTION, CONCEPTS AND GENERAL REQUIREMENTS |
| INCITS/ISO/IEC 27040 : 2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
| ISO/IEC 19896-1:2018 | IT security techniques — Competence requirements for information security testers and evaluators — Part 1: Introduction, concepts and general requirements |
| ISO/IEC 17825:2016 | Information technology — Security techniques — Testing methods for the mitigation of non-invasive attack classes against cryptographic modules |
| CEI EN ISO/IEC 19896-1:2023 | IT security techniques - Competence requirements for information security testers and evaluators Part 1: Introduction, concepts and general requirements |
| INCITS/ISO/IEC 19896-1:2018(2019) | IT security techniques — Competence requirements for information security testers and evaluators — Part 1: Introduction, concepts and general requirements<br> |
| ISO/IEC 19790:2012 | Information technology — Security techniques — Security requirements for cryptographic modules |
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.