• Shopping Cart
    There are no items in your cart

ISO/IEC 24759:2017

Withdrawn

Withdrawn

A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

View Superseded by

Information technology — Security techniques — Test requirements for cryptographic modules

Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

04-04-2017

Withdrawn date

09-04-2025

Superseded by

ISO/IEC 24759:2025

€63.00
Excluding VAT

ISO/IEC 24759:2017 specifies the methods to be used by testing laboratories to test whether the cryptographic module conforms to the requirements specified in ISO/IEC 19790:2012. The methods are developed to provide a high degree of objectivity during the testing process and to ensure consistency across the testing laboratories.

This document also specifies the requirements for information that vendors provide to testing laboratories as supporting evidence to demonstrate their cryptographic modules' conformity to the requirements specified in ISO/IEC 19790:2012.

Vendors can use this document as guidance in trying to verify whether their cryptographic modules satisfy the requirements specified in ISO/IEC 19790:2012 before they apply to the testing laboratory for testing.

Committee
ISO/IEC JTC 1/SC 27
DocumentType
Standard
Pages
135
PublisherName
International Organization for Standardization
Status
Withdrawn
SupersededBy
Supersedes
UnderRevision

BS ISO/IEC 19896-1:2018 IT security techniques. Competence requirements for information security testers and evaluators Introduction, concepts and general requirements
I.S. EN ISO/IEC 27040:2016 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015)
14/30249803 DC : 0 BS ISO/IEC 27040 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY
14/30259616 DC : 0 BS ISO/IEC 17825 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUE - TESTING METHODS FOR THE MTIGATION OF NON-INVASIVE ATTACK CLASSES AGAINST CRYPTOGRAPHIC MODULES
PD ISO/TS 12812-2:2017 Core banking. Mobile financial services Security and data protection for mobile financial services
BS ISO/IEC 18367:2016 Information technology. Security techniques. Cryptographic algorithms and security mechanisms conformance testing
ISO/IEC TS 20540:2018 Information technology — Security techniques — Testing cryptographic modules in their operational environment
ISO/TS 12812-2:2017 Core banking — Mobile financial services — Part 2: Security and data protection for mobile financial services
DIN EN ISO/IEC 27040:2016-04 (Draft) INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015)
ISO/IEC 18367:2016 Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing
PD ISO/IEC TS 30104:2015 Information Technology. Security Techniques. Physical Security Attacks, Mitigation Techniques and Security Requirements
17/30354862 DC : 0 BS ISO/IEC 19896-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY TESTERS AND EVALUATORS - PART 2: KNOWLEDGE, SKILLS AND EFFECTIVENESS REQUIREMENTS FOR ISO/IEC 19790 TESTERS
ISO/IEC 20248:2018 Information technology — Automatic identification and data capture techniques — Data structures — Digital signature meta structure
15/30279582 DC : 0 BS ISO/IEC 18367 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC ALGORITHMS AND SECURITY MECHANISMS CONFORMANCE TESTING
ISO/IEC TS 30104:2015 Information Technology — Security Techniques — Physical Security Attacks, Mitigation Techniques and Security Requirements
BS ISO/IEC 27040 : 2015 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY
BS EN ISO/IEC 27040:2016 Information technology. Security techniques. Storage security
ISO/IEC 27040:2015 Information technology — Security techniques — Storage security
EN ISO/IEC 27040:2016 Information technology - Security techniques - Storage security (ISO/IEC 27040:2015)
18/30356051 DC : DRAFT APR 2018 BS ISO/IEC 20543 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TEST AND ANALYSIS METHODS FOR RANDOM BIT GENERATORS WITHIN ISO/IEC 19790 AND ISO/IEC 15408
BS ISO/IEC 17825:2016 Information technology. Security techniques. Testing methods for the mitigation of non-invasive attack classes against cryptographic modules
17/30351732 DC : 0 BS ISO/IEC 19896-1 - INFORMATION TECHNOLOGY - IT SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY TESTERS AND EVALUATORS - PART 1: INTRODUCTION, CONCEPTS AND GENERAL REQUIREMENTS
INCITS/ISO/IEC 27040 : 2017 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY
ISO/IEC 19896-1:2018 IT security techniques — Competence requirements for information security testers and evaluators — Part 1: Introduction, concepts and general requirements
ISO/IEC 17825:2016 Information technology — Security techniques — Testing methods for the mitigation of non-invasive attack classes against cryptographic modules
CEI EN ISO/IEC 19896-1:2023 IT security techniques - Competence requirements for information security testers and evaluators Part 1: Introduction, concepts and general requirements
INCITS/ISO/IEC 19896-1:2018(2019) IT security techniques — Competence requirements for information security testers and evaluators — Part 1: Introduction, concepts and general requirements<br>

ISO/IEC 19790:2012 Information technology — Security techniques — Security requirements for cryptographic modules

Access your standards online with a subscription

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.

€63.00
Excluding VAT