BS ISO IEC 24759-2017 Information technology Security techniques Test requirements for cryptographic modules《信息技术 安全技术 密码模块试验要求》.pdf
《BS ISO IEC 24759-2017 Information technology Security techniques Test requirements for cryptographic modules《信息技术 安全技术 密码模块试验要求》.pdf》由会员分享,可在线阅读,更多相关《BS ISO IEC 24759-2017 Information technology Security techniques Test requirements for cryptographic modules《信息技术 安全技术 密码模块试验要求》.pdf(146页珍藏版)》请在麦多课文档分享上搜索。
1、Information technology Security techniques Test requirements for cryptographic modules BS ISO/IEC 24759:2017 BSI Standards Publication WB11885_BSI_StandardCovs_2013_AW.indd 1 15/05/2013 15:06Information technology Security techniques Test requirements for cryptographic modules Technologies de linfor
2、mation Techniques de scurit Exigences dessai pour modules cryptographiques INTERNATIONAL STANDARD ISO/IEC 24759 Reference number ISO/IEC 24759:2017(E) Third edition 2017-03 ISO/IEC 2017 National foreword This British Standard is the UK implementation of ISO/IEC 24759:2017. It supersedes BS ISO/IEC 2
3、4759:2014 which is withdrawn. The UK participation in its preparation was entrusted by Technical Committee IST/33, IT - Security techniques, to Subcommittee IST/33/3, Security Evaluation, Testing and Specification. A list of organizations represented on this committee can be obtained on request to i
4、ts secretary. This publication does not purport to include all the necessary provisions of a contract. Users are responsible for its correct application. The British Standards Institution 2017 Published by BSI Standards Limited 2017 ISBN 978 0 580 96250 9 ICS 35.030 Compliance with a British Standar
5、d cannot confer immunity from legal obligations. This British Standard was published under the authority of the Standards Policy and Strategy Committee on 30 June 2017. Amendments/corrigenda issued since publication Date Text affected BRITISH STANDARD BS ISO/IEC 24759:2017Information technology Secu
6、rity techniques Test requirements for cryptographic modules Technologies de linformation Techniques de scurit Exigences dessai pour modules cryptographiques INTERNATIONAL STANDARD ISO/IEC 24759 Reference number ISO/IEC 24759:2017(E) Third edition 2017-03 ISO/IEC 2017 BS ISO/IEC 24759:2017 ii ISO/IEC
7、 2017 All rights reserved COPYRIGHT PROTECTED DOCUMENT ISO/IEC 2017, Published in Switzerland All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting
8、 on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below or ISOs member body in the country of the requester. ISO copyright office Ch. de Blandonnet 8 CP 401 CH-1214 Vernier, Geneva, Switzerland Tel. +41 22 749 01 11 Fax +41
9、22 749 09 47 copyrightiso.org www.iso.org ISO/IEC 24759:2017(E) BS ISO/IEC 24759:2017 ii ISO/IEC 2017 All rights reserved COPYRIGHT PROTECTED DOCUMENT ISO/IEC 2017, Published in Switzerland All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized oth
10、erwise in any form or by any means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below or ISOs member body in the country of the requester. ISO copyright offic
11、e Ch. de Blandonnet 8 CP 401 CH-1214 Vernier, Geneva, Switzerland Tel. +41 22 749 01 11 Fax +41 22 749 09 47 copyrightiso.org www.iso.org ISO/IEC 24759:2017(E)ISO/IEC 24759:2017(E)Foreword v 1 Scope . 1 2 Normative references 1 3 T erms and definitions . 1 4 Symbols and abbreviated terms . 1 5 Docum
12、ent organization . 1 5.1 General . 1 5.2 Assertions and security requirements . 2 6 Security requirements 2 6.1 General . 2 6.2 Cryptographic module specification 3 6.2.1 Cryptographic module specification general requirements . 3 6.2.2 Types of cryptographic modules 3 6.2.3 Cryptographic boundary .
13、 5 6.2.4 Modes of operations 13 6.3 Cryptographic module interfaces 17 6.3.1 Cryptographic module interfaces general requirements .17 6.3.2 Types of interfaces 20 6.3.3 Definition of interfaces 20 6.3.4 Trusted channel .30 6.4 Roles, services, and authentication 32 6.4.1 Roles, services, and authent
14、ication general requirements 32 6.4.2 Roles 33 6.4.3 Services .34 6.4.4 Authentication 42 6.5 Software/Firmware security .49 6.6 Operational environment .57 6.6.1 Operational environment general requirements 57 6.6.2 Operating system requirements for limited or non-modifiable operational environment
15、s 57 6.6.3 Operating system requirements for modifiable operational environments .58 6.7 Physical security .68 6.7.1 Physical security embodiments .68 6.7.2 Physical security general requirements .69 6.7.3 Physical security requirements for each physical security embodiment 75 6.7.4 Environmental fa
16、ilure protection/testing 86 6.8 Non-invasive security .89 6.9 Sensitive security parameter management .91 6.9.1 Sensitive security parameter management general requirements .91 6.9.2 Random bit generators 92 6.9.3 Sensitive security parameter generation .93 6.9.4 Sensitive security parameter establi
17、shment 94 6.9.5 Sensitive security parameter entry and output .94 6.9.6 Sensitive security parameter storage .98 6.9.7 Sensitive security parameter zeroisation 99 6.10 Self-tests .102 6.10.1 Self-test general requirements 102 6.10.2 Pre-operational self-tests .105 6.10.3 Conditional self-tests109 6.
18、11 Life-cycle assurance 119 6.11.1 Life-cycle assurance general requirements 119 6.11.2 Configuration management 119 ISO/IEC 2017 All rights reserved iii Contents Page BS ISO/IEC 24759:2017 ISO/IEC 24759:2017(E)6.11.3 Design 121 6.11.4 Finite state model121 6.11.5 Development .125 6.11.6 Vendor test
19、ing 129 6.11.7 Delivery and operation .130 6.11.8 End of life 131 6.11.9 Guidance documents 132 6.12 Mitigation of other attacks 133 6.13 Documentation requirements134 6.14 Cryptographic module security policy .134 6.15 Approved security functions .135 6.16 Approved sensitive security parameter gene
20、ration and establishment methods 135 6.17 Approved authentication mechanisms 135 6.18 Approved non-invasive attack mitigation test metrics 135 iv ISO/IEC 2017 All rights reserved BS ISO/IEC 24759:2017 ISO/IEC 24759:2017(E)6.11.3 Design 121 6.11.4 Finite state model121 6.11.5 Development .125 6.11.6
21、Vendor testing 129 6.11.7 Delivery and operation .130 6.11.8 End of life 131 6.11.9 Guidance documents 132 6.12 Mitigation of other attacks 133 6.13 Documentation requirements134 6.14 Cryptographic module security policy .134 6.15 Approved security functions .135 6.16 Approved sensitive security par
22、ameter generation and establishment methods 135 6.17 Approved authentication mechanisms 135 6.18 Approved non-invasive attack mitigation test metrics 135 iv ISO/IEC 2017 All rights reserved ISO/IEC 24759:2017(E) Foreword ISO (the International Organization for Standardization) and IEC (the Internati
23、onal Electrotechnical Commission) form the specialized system for worldwide standardization. National bodies that are members of ISO or IEC participate in the development of International Standards through technical committees established by the respective organization to deal with particular fields
24、 of technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information technology, ISO and IEC have established a joi
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- BSISOIEC247592017INFORMATIONTECHNOLOGYSECURITYTECHNIQUESTESTREQUIREMENTSFORCRYPTOGRAPHICMODULES 信息技术

链接地址:http://www.mydoc123.com/p-396617.html