ISO ISO/IEC 18367 Information technology - Security techniques - Cryptographic algorithms and security mechanisms conformance testing - First Edition
Данный раздел/документ содержится в продуктах:
- Техэксперт: Машиностроительный комплекс
- Картотека зарубежных и международных стандартов
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- 35
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- 35.040
- BSI BS ISO/IEC 27036-3 Information technology — Security techniques — Information security for supplier relationships Part 3: Guidelines for information and communication technology supply chain security
- ISO ISO/IEC 27004 Information technology - Security techniques - Information security management - Measurement - First Edition
- BSI BS EN ISO/IEC 27043 Information technology — Security techniques — Incident investigation principles and processes - CORR: September 30, 2016
- ISO ISO/IEC 27004 Information technology - Security techniques - Information security management - Measurement - First Edition
- BSI BS ISO/IEC 27036-3 Information technology — Security techniques — Information security for supplier relationships Part 3: Guidelines for information and communication technology supply chain security
- ISO ISO/IEC 27004 Information technology - Security techniques - Information security management - Measurement - First Edition
- BSI BS EN ISO/IEC 27043 Information technology — Security techniques — Incident investigation principles and processes - CORR: September 30, 2016
- ISO ISO/IEC 27004 Information technology - Security techniques - Information security management - Measurement - First Edition
- ISO ISO/IEC 27004 Information technology - Security techniques - Information security management - Measurement - First Edition
- BSI BS EN ISO/IEC 27043 Information technology — Security techniques — Incident investigation principles and processes - CORR: September 30, 2016
- BSI BS EN ISO/IEC 27043 Information technology — Security techniques — Incident investigation principles and processes - CORR: September 30, 2016
- ISO ISO/IEC 27038 Information technology - Security techniques - Specification for digital redaction - First Edition
- BSI BS ISO/IEC 27043 Information technology — Security techniques — Incident investigation principles and processes
- ISO ISO/IEC 27040 Information technology - Security techniques - Storage security - First Edition
- ISO ISO/IEC 24759 Information technology - Security techniques - Test requirements for cryptographic modules - Second Edition; Incorporated Corrigendum 1: 10/1/2015
- Картотека зарубежных и международных стандартов
International Organization for Standardization
Information technology - Security techniques - Cryptographic algorithms and security mechanisms conformance testing - First Edition
N ISO/IEC 18367
Annotation
This document gives guidelines for cryptographic algorithms and security mechanisms conformance testing methods.
Conformance testing assures that an implementation of a cryptographic algorithm or security mechanism is correct whether implemented in hardware, software or firmware. It also confirms that it runs correctly in a specific operating environment. Testing can consist of known-answer or Monte Carlo testing, or a combination of test methods. Testing can be performed on the actual implementation or modelled in a simulation environment.
This document does not include the efficiency of the algorithms or security mechanisms nor the intrinsic performance. This document focuses on the correctness of the implementation.
Автоматический перевод:
Информационные технологии - методы безопасности - Криптографические алгоритмы и проверка на соответствие стандарту механизмов защиты - Первый Выпуск
Этот документ дает инструкции для криптографических алгоритмов и методы проверки на соответствие стандарту механизмов защиты.
Проверка на соответствие стандарту гарантирует, что реализация криптографического алгоритма или механизма защиты корректна, реализованный ли в аппаратных средствах, программном обеспечении или встроенном программном обеспечении. Это также подтверждает, что работает правильно в определенной операционной среде. Тестирование может состоять из знать-ответа или тестирования Монте-Карло или комбинации методов тестирования. Тестирование может быть выполнено на фактической реализации или смоделировано в среде моделирования.



