• There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

ISO/IEC 18367:2016

Current

Current

The latest, up-to-date edition.

Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing

Available format(s)

Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users

Language(s)

English

Published date

08-12-2016

ISO/IEC 18367:2016 gives guidelines for cryptographic algorithms and security mechanisms conformance testing methods.

Conformance testing assures that an implementation of a cryptographic algorithm or security mechanism is correct whether implemented in hardware, software or firmware. It also confirms that it runs correctly in a specific operating environment. Testing can consist of known-answer or Monte Carlo testing, or a combination of test methods. Testing can be performed on the actual implementation or modelled in a simulation environment.

ISO/IEC 18367:2016 does not include the efficiency of the algorithms or security mechanisms nor the intrinsic performance. This document focuses on the correctness of the implementation.

DocumentType
Standard
Pages
68
PublisherName
International Organization for Standardization
Status
Current

Standards Relationship
CAN/CSA-ISO/IEC 18367:18 Identical
NEN ISO/IEC 18367 : 2016 Identical
BS ISO/IEC 18367:2016 Identical

17/30354862 DC : 0 BS ISO/IEC 19896-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY TESTERS AND EVALUATORS - PART 2: KNOWLEDGE, SKILLS AND EFFECTIVENESS REQUIREMENTS FOR ISO/IEC 19790 TESTERS
18/30356051 DC : DRAFT APR 2018 BS ISO/IEC 20543 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TEST AND ANALYSIS METHODS FOR RANDOM BIT GENERATORS WITHIN ISO/IEC 19790 AND ISO/IEC 15408

ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
ISO/IEC 18032:2005 Information technology Security techniques Prime number generation
ISO/IEC 11770-5:2011 Information technology Security techniques Key management Part 5: Group key management
ISO/IEC 14888-3:2016 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
ISO/IEC 11770-6:2016 Information technology Security techniques Key management Part 6: Key derivation
ISO/IEC 19790:2012 Information technology — Security techniques — Security requirements for cryptographic modules
ISO/IEC 9796-2:2010 Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms
FIPS PUB 186 : 0 DIGITAL SIGNATURE STANDARD (DSS)
ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
ISO/IEC 24759:2017 Information technology Security techniques Test requirements for cryptographic modules
ISO/IEC 9797-2:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function
ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
ISO/IEC 14888-2:2008 Information technology Security techniques Digital signatures with appendix Part 2: Integer factorization based mechanisms
ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
ISO/IEC 18045:2008 Information technology — Security techniques — Methodology for IT security evaluation
ANSI X9.42 : 2003(R2013) PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES: AGREEMENT OF SYMMETRIC KEYS USING DISCRETE LOGARITHM CRYPTOGRAPHY
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques

View more information
£178.00
Excluding VAT

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.