ISO/IEC 24759:2017
Current
The latest, up-to-date edition.
Information technology Security techniques Test requirements for cryptographic modules
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
English
04-04-2017
ISO/IEC 24759:2017 specifies the methods to be used by testing laboratories to test whether the cryptographic module conforms to the requirements specified in ISO/IEC 19790:2012. The methods are developed to provide a high degree of objectivity during the testing process and to ensure consistency across the testing laboratories.
This document also specifies the requirements for information that vendors provide to testing laboratories as supporting evidence to demonstrate their cryptographic modules' conformity to the requirements specified in ISO/IEC 19790:2012.
Vendors can use this document as guidance in trying to verify whether their cryptographic modules satisfy the requirements specified in ISO/IEC 19790:2012 before they apply to the testing laboratory for testing.
DocumentType |
Standard
|
Pages |
135
|
PublisherName |
International Organization for Standardization
|
Status |
Current
|
Supersedes |
Standards | Relationship |
JIS X 24759:2023 | Identical |
NEN ISO/IEC 24759 : 2014 + COR 2015 | Identical |
BS ISO/IEC 24759:2017 | Identical |
INCITS/ISO/IEC 24759:2017(R2023) | Identical |
INCITS/ISO/IEC 24759 : 2014 | Identical |
BS ISO/IEC 19896-1:2018 | IT security techniques. Competence requirements for information security testers and evaluators Introduction, concepts and general requirements |
I.S. EN ISO/IEC 27040:2016 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015) |
14/30249803 DC : 0 | BS ISO/IEC 27040 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
14/30259616 DC : 0 | BS ISO/IEC 17825 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUE - TESTING METHODS FOR THE MTIGATION OF NON-INVASIVE ATTACK CLASSES AGAINST CRYPTOGRAPHIC MODULES |
PD ISO/TS 12812-2:2017 | Core banking. Mobile financial services Security and data protection for mobile financial services |
BS ISO/IEC 18367:2016 | Information technology. Security techniques. Cryptographic algorithms and security mechanisms conformance testing |
ISO/IEC TS 20540:2018 | Information technology — Security techniques — Testing cryptographic modules in their operational environment |
ISO/TS 12812-2:2017 | Core banking — Mobile financial services — Part 2: Security and data protection for mobile financial services |
DIN EN ISO/IEC 27040:2016-04 (Draft) | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015) |
ISO/IEC 18367:2016 | Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing |
PD ISO/IEC TS 30104:2015 | Information Technology. Security Techniques. Physical Security Attacks, Mitigation Techniques and Security Requirements |
17/30354862 DC : 0 | BS ISO/IEC 19896-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY TESTERS AND EVALUATORS - PART 2: KNOWLEDGE, SKILLS AND EFFECTIVENESS REQUIREMENTS FOR ISO/IEC 19790 TESTERS |
ISO/IEC 20248:2018 | Information technology Automatic identification and data capture techniques Data structures Digital signature meta structure |
UNI/TS 11291-10 : 2013 | GAS MEASUREMENT SYSTEMS - HOURLY BASED GAS METERING SYSTEMS - PART 10: SAFETY |
15/30279582 DC : 0 | BS ISO/IEC 18367 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC ALGORITHMS AND SECURITY MECHANISMS CONFORMANCE TESTING |
ISO/IEC TS 30104:2015 | Information Technology Security Techniques Physical Security Attacks, Mitigation Techniques and Security Requirements |
BS ISO/IEC 27040 : 2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
BS EN ISO/IEC 27040:2016 | Information technology. Security techniques. Storage security |
ISO/IEC 27040:2015 | Information technology — Security techniques — Storage security |
EN ISO/IEC 27040:2016 | Information technology - Security techniques - Storage security (ISO/IEC 27040:2015) |
18/30356051 DC : DRAFT APR 2018 | BS ISO/IEC 20543 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TEST AND ANALYSIS METHODS FOR RANDOM BIT GENERATORS WITHIN ISO/IEC 19790 AND ISO/IEC 15408 |
BS ISO/IEC 17825:2016 | Information technology. Security techniques. Testing methods for the mitigation of non-invasive attack classes against cryptographic modules |
17/30351732 DC : 0 | BS ISO/IEC 19896-1 - INFORMATION TECHNOLOGY - IT SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY TESTERS AND EVALUATORS - PART 1: INTRODUCTION, CONCEPTS AND GENERAL REQUIREMENTS |
INCITS/ISO/IEC 27040 : 2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
ISO/IEC 19896-1:2018 | IT security techniques — Competence requirements for information security testers and evaluators — Part 1: Introduction, concepts and general requirements |
ISO/IEC 17825:2016 | Information technology — Security techniques — Testing methods for the mitigation of non-invasive attack classes against cryptographic modules |
CEI EN ISO/IEC 19896-1:2023 | IT security techniques - Competence requirements for information security testers and evaluators Part 1: Introduction, concepts and general requirements |
CAN/CSA-ISO/IEC 17825:18 | Information technology — Security techniques — Testing methods for the mitigation of non-invasive attack classes against cryptographic modules (Adopted ISO/IEC 17825:2016, first edition, 2016-01-15) |
CAN/CSA-ISO/IEC 18367:18 | Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing (Adopted ISO/IEC 18367:2016, first edition, 2016-12-15) |
INCITS/ISO/IEC 19896-1:2018(2019) | IT security techniques — Competence requirements for information security testers and evaluators — Part 1: Introduction, concepts and general requirements<br> |
ISO/IEC 19790:2012 | Information technology — Security techniques — Security requirements for cryptographic modules |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.