Please select and order
€185.23
excl. VAT
CONFIGURE NOW
Norm

ÖVE/ÖNORM EN ISO/IEC 19790

Issue date: 2020 08 01

Information technology - Security techniques - Security requirements for cryptographic modules (ISO/IEC 19790:2012, Corrected version 2015-12)

This International Standard specifies the security requirements for a cryptographic module utilised within a security system protecting sensitive information in computer...
Read more
Valid
This International Standard specifies the security requirements for a cryptographic module utilised within a security system protecting sensitive information in computer and telecommunication systems. This International Standard defines four security levels for cryptographic modules to provide for a wide spectrum of data sensitivity (e.g. low value administrative data, million dollar funds transfers, life protecting data, personal identity information, and sensitive information used by government) and a diversity of application environments (e.g. a guarded facility, an office, removable media, and a completely unprotected location). This International Standard specifies four security levels for each of 11 requirement areas with each security level increasing security over the preceding level. This International Standard specifies security requirements specified intended to maintain the security provided by a cryptographic module and compliance to this International Standard is not sufficient to ensure that a particular module is secure or that the security provided by the module is sufficient and acceptable to the owner of the information that is being protected.
ÖVE/ÖNORM EN ISO/IEC 19790
2020 08 01
Information technology - Security techniques - Security requirements for cryptographic modules (ISO/...
Norm
Norm
ISO/IEC 18033-3:2010
Issue date : 2010 12 14
Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers
Norm
ISO/IEC 18033-4:2011
Issue date : 2011 12 16
Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers
Norm
ISO/IEC 9796-3:2006
Issue date : 2006 09 12
Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms (Corrected version 2013-09)
Norm
ISO/IEC 18033-2:2006
Issue date : 2006 05 08
Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
Norm
ISO/IEC 9797-2:2021
Issue date : 2021 06 23
Information security — Message authentication codes (MACs) — Part 2: Mechanisms using a dedicated hash-function
Norm
ISO/IEC 10118-3
Issue date : 1998 06 01
Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash-functions
Norm
ISO/IEC 10118-4:1998
Issue date : 1998 12 20
Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic
Norm
ISO/IEC 9798-5:2009
Issue date : 2009 12 11
Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques
Norm
ISO/IEC 9798-6:2010
Issue date : 2010 11 17
Information technology — Security techniques — Entity authentication — Part 6: Mechanisms using manual data transfer
Norm
ISO/IEC 11770-2:2018
Issue date : 2018 09 28
IT Security techniques — Key management — Part 2: Mechanisms using symmetric techniques
Norm
ISO/IEC 11770-3:2015
Issue date : 2015 08 04
Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques
Norm
ISO/IEC 11770-4:2017
Issue date : 2017 11 17
Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets
Norm
ISO/IEC 18031:2011
Issue date : 2011 11 08
Information technology — Security techniques — Random bit generation
Norm
ISO/IEC 19790:2012
Issue date : 2012 08 09
Information technology — Security techniques — Security requirements for cryptographic modules (Corrected version 2015-11)