ISO/IEC 24759:2008

Information technology — Security techniques — Test requirements for cryptographic modules

Publication date:   Jun 26, 2008

95.99 Withdrawal of Standard   Jan 31, 2014

General information

95.99 Withdrawal of Standard   Jan 31, 2014

ISO/IEC

ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection

International Standard

35.030   IT Security

Buying

  Withdrawn

PDF - €76.23

  English  



Buy

Scope

ISO/IEC 24759:2008 specifies the methods to be used by testing laboratories to test whether a cryptographic module conforms to the requirements specified in ISO/IEC 19790:2006. The methods are developed to provide a high degree of objectivity during the testing process and to ensure consistency across the testing laboratories. Within each subclause of the security requirements clause of ISO/IEC 24759:2008, the corresponding security requirements from ISO/IEC 19790:2006 are divided into a set of assertions (i.e. statements that have to be true for the module to satisfy the requirement of a given area at a given level). All of the assertions are direct quotations from ISO/IEC 19790:2006.
Following each assertion is a set of requirements levied on the vendor. These specify the types of documentation or explicit information that the vendor is required to provide in order for the tester to verify conformance to the given assertion.
Also following each assertion and the requirements levied on the vendor is a set of requirements levied on the tester of the cryptographic module. These specify what the tester needs to do in order to test the cryptographic module with respect to the given assertion.
Vendors can use ISO/IEC 24759:2008 as guidance in trying to verify whether their cryptographic modules satisfy the requirements specified in ISO/IEC 19790:2006 before they apply to the testing laboratory for testing.

Life cycle

NOW

WITHDRAWN
ISO/IEC 24759:2008
95.99 Withdrawal of Standard
Jan 31, 2014

REVISED BY

WITHDRAWN
ISO/IEC 24759:2014