BS ISO IEC 18367-2016 Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing《信息技术 安全技术 密码算法和安全机制一致性测试》.pdf
《BS ISO IEC 18367-2016 Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing《信息技术 安全技术 密码算法和安全机制一致性测试》.pdf》由会员分享,可在线阅读,更多相关《BS ISO IEC 18367-2016 Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing《信息技术 安全技术 密码算法和安全机制一致性测试》.pdf(80页珍藏版)》请在麦多课文档分享上搜索。
1、BS ISO/IEC 18367:2016 Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing BSI Standards Publication WB11885_BSI_StandardCovs_2013_AW.indd 1 15/05/2013 15:06BS ISO/IEC 18367:2016 BRITISH STANDARD National foreword This British Standard is th
2、e UK implementation of ISO/IEC 18367:2016. The UK participation in its preparation was entrusted to Technical Committee IST/33/3, Security Evaluation, Testing and Specification. A list of organizations represented on this committee can be obtained on request to its secretary. This publication does n
3、ot purport to include all the necessary provisions of a contract. Users are responsible for its correct application. The British Standards Institution 2016. Published by BSI Standards Limited 2016 ISBN 978 0 580 82187 5 ICS 35.030 Compliance with a British Standard cannot confer immunity from legal
4、obligations. This British Standard was published under the authority of the Standards Policy and Strategy Committee on 31 December 2016. Amendments/corrigenda issued since publication Date T e x t a f f e c t e dBS ISO/IEC 18367:2016 Information technology Security techniques Cryptographic algorithm
5、s and security mechanisms conformance testing Technologie de linformation Techniques de scurit Essais de conformit des algorithmes cryptographiques et des mcanismes de scurit INTERNATIONAL STANDARD ISO/IEC 18367 Reference number ISO/IEC 18367:2016(E) First edition 2016-12-15 ISO/IEC 2016 BS ISO/IEC
6、18367:2016ii ISO/IEC 2016 All rights reserved COPYRIGHT PROTECTED DOCUMENT ISO/IEC 2016, Published in Switzerland All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including phot
7、ocopying, or posting on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below or ISOs member body in the country of the requester. ISO copyright office Ch. de Blandonnet 8 CP 401 CH-1214 Vernier, Geneva, Switzerland Tel. +41 2
8、2 749 01 11 Fax +41 22 749 09 47 copyrightiso.org www.iso.org ISO/IEC 18367:2016(E)BS ISO/IEC 18367:2016ISO/IEC 18367:2016(E)Foreword v Introduction vi 1 Scope . 1 2 Normative references 1 3 T erms and definitions . 1 4 Symbols and abbreviated terms . 6 5 Objectives . 7 6 Types of cryptographic algo
9、rithms and security mechanisms from a conformance testing perspective . 8 6.1 General . 8 6.2 Asymmetric key algorithms . 8 6.3 Digital signature . 8 6.4 Digital signature with message recovery . 8 6.5 Hashing algorithms . 8 6.6 Key establishment mechanisms . 8 6.7 Lightweight cryptography . 9 6.8 M
10、essage authentication algorithms 9 6.9 Random bit generator algorithms 9 6.9.1 Deterministic random bit generator algorithms 9 6.9.2 Non-deterministic random bit generator algorithms 9 6.10 Symmetric key algorithms .10 6.10.1 Block cipher symmetric key algorithms .10 6.10.2 Stream cipher symmetric k
11、ey algorithms .10 7 Conformance testing methodologies 10 7.1 Overview .10 7.2 Black box testing.11 7.2.1 General.11 7.2.2 Known-answer test vectors .11 7.2.3 Multi-block message testing .11 7.2.4 Monte Carlo or statistical testing 11 7.3 Glass box or white box testing 11 7.3.1 Source code inspection
12、 11 7.3.2 Binary analysis11 8 Levels of conformance testing .12 8.1 Introduction .12 8.2 Level of basic conformance testing 12 8.3 Level of moderate conformance 12 9 Conformance testing guidelines 12 9.1 General guidelines.12 9.1.1 Identification 12 9.1.2 Guidelines for black box testing .13 9.1.3 G
13、uidelines for white box testing 13 9.2 Guidelines specific to encryption algorithms 16 9.2.1 Identification of encryption algorithms 16 9.2.2 Selecting a set of conformance test items .17 9.2.3 Guidelines for each conformance test item18 9.3 Guidelines specific to digital signature algorithms 29 9.3
14、.1 Identification of digital signature algorithms 29 9.3.2 Selecting a set of conformance test items .29 9.3.3 Guidelines for each conformance test item29 9.4 Guidelines specific to hashing algorithms 30 ISO/IEC 2016 All rights reserved iii Contents PageBS ISO/IEC 18367:2016ISO/IEC 18367:2016(E)9.4.
15、1 Identification of hashing algorithms .30 9.4.2 Selecting a set of conformance test items .31 9.4.3 Guidelines for each conformance test item31 9.5 Guidelines specific to MAC algorithms 33 9.5.1 Identification of MAC algorithms 33 9.5.2 Selecting a set of conformance test items .34 9.5.3 Guidelines
16、 for each conformance test item34 9.6 Guidelines specific to RBG algorithms .35 9.6.1 Identification of RBG algorithms 35 9.6.2 Selecting a set of conformance test items .35 9.6.3 Guidelines for each conformance test item35 9.7 Guidelines specific to key establishment mechanisms .36 9.7.1 Identifica
17、tion of key establishment mechanisms .36 9.7.2 Selecting a set of conformance test items .36 9.7.3 Guidelines for each conformance test item37 9.8 Guidelines specific to key derivation function 39 9.8.1 Identification of key derivation function .39 9.8.2 Selecting a set of conformance test items .39
18、 9.8.3 Guidelines for each conformance test item39 9.9 Guidelines specific to prime number generation .40 9.9.1 Identification of prime number generation .40 9.9.2 Selecting a set of conformance test items .40 9.9.3 Guidelines for each conformance test item41 10 Conformance testing 41 10.1 Level of
19、conformance testing .41 10.2 Symmetric key cryptographic algorithms 42 10.2.1 n-bit block cipher .42 10.3 Asymmetric key cryptographic algorithms .43 10.3.1 Digital Signature Algorithm (DSA) 43 10.3.2 RSA 47 10.3.3 Elliptic Curve Digital Signature Algorithm (ECDSA) 49 10.4 Dedicated hashing algorith
20、ms 51 10.4.1 General.51 10.4.2 Black box testing .51 10.4.3 White box testing 51 10.5 Message Authentication Codes (MAC) .51 10.5.1 Black box testing .51 10.5.2 White box testing 52 10.6 Authenticated encryption .53 10.6.1 Black box testing .53 10.6.2 White box testing 54 10.7 Deterministic Random B
21、it Generation algorithms .54 10.7.1 DRBG based on ISO/IEC 18031 54 10.8 Key agreement 58 10.8.1 Black box testing .58 10.8.2 White box testing 61 10.9 Key Derivation Functions (KDF) .62 10.9.1 Black box testing .62 10.9.2 White box testing 63 Annex A (informative) Common mistakes in cryptographic al
22、gorithm implementations 64 Annex B (informative) Examples of known-answer test vectors 65 Bibliography .66 iv ISO/IEC 2016 All rights reservedBS ISO/IEC 18367:2016ISO/IEC 18367:2016(E) Foreword ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commi
23、ssion) form the specialized system for worldwide standardization. National bodies that are members of ISO or IEC participate in the development of International Standards through technical committees established by the respective organization to deal with particular fields of technical activity. ISO
24、 and IEC technical committees collaborate in fields of mutual interest. Other international organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information technology, ISO and IEC have established a joint technical committee, ISO
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- BSISOIEC183672016INFORMATIONTECHNOLOGYSECURITYTECHNIQUESCRYPTOGRAPHICALGORITHMSANDSECURITYMECHANISMSCONFORMANCETESTING

链接地址:http://www.mydoc123.com/p-396463.html