ISO/IEC PWI 29128-2

Information security, cybersecurity and privacy protection — Verification of Cryptographic Protocols — Part 2: Evaluation Methods and Activities for Cryptographic Protocols ISO/IEC PWI 29128-2

General information

00.98 Proposal for new project abandoned   Jul 14, 2023

ISO/IEC

ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection

International Standard

Scope

This document defines the evaluation methods and activities to assess the artifacts defined in Part 1 for the verification of the correctness and security of a cryptographic protocol specification using the framework from ISO/IEC 15408-4.

Life cycle

NOW

ABANDON
ISO/IEC PWI 29128-2
00.98 Proposal for new project abandoned
Jul 14, 2023