IT-säkerhet

Ämnesområden: IT-säkerhet
Kommittébeteckning: SIS/TK 611 (Systemintegration för unika enheters identifiering och dess attribut)
Källa: ISO
Svarsdatum: den 26 dec 2018
Se merSe mindre
 

This part of ISO/IEC 19823 describes methods for determining conformance to the security crypto suite defined in ISO/IEC 29167-21.

This part of ISO/IEC 19823 contains conformance tests for all mandatory functions.

The conformance parameters are the following:

— parameters that apply directly affecting system functionality and inter-operability

— protocol including commands and replies

— nominal values and tolerances

Unless otherwise specified, the tests in this part of ISO/IEC 19823 are to be applied exclusively to RFID tags and interrogators defined in the ISO/IEC 18000- series using ISO/IEC 29167-21.

Ämnesområden: IT-säkerhet
Kommittébeteckning: SIS/TK 611 (Systemintegration för unika enheters identifiering och dess attribut)
Källa: ISO
Svarsdatum: den 26 dec 2018
Se merSe mindre
 

This part of ISO/IEC 19823 describes methods for determining conformance to the security crypto suite defined in ISO/IEC 29167-22.

This part of ISO/IEC 19823 contains conformance tests for all mandatory functions.

The conformance parameters are the following:

— parameters that apply directly affecting system functionality and inter-operability

— protocol including commands and replies

— nominal values and tolerances

Unless otherwise specified, the tests in this part of ISO/IEC 19823 are to be applied exclusively to RFID tags and interrogators defined in the ISO/IEC 18000- series using ISO/IEC 29167-22.

Ämnesområden: IT-säkerhet
Kommittébeteckning: SIS/TK 318 (Informationssäkerhet)
Källa: ISO
Svarsdatum: den 8 jan 2019
Se merSe mindre
 

This document provides specifications for non-invasive attack test tools and provides information about how to operate such tools. The purpose of the test tools are the collection of signals (i.e. side-channel leakage) and their analysis as a non-invasive attack on a cryptographic module Implementation Under Test (IUT).

Se merSe mindre
 

This document gives guidelines for how to process and resolve potential vulnerability information in a product or service.

This document is applicable to vendors involved in handling vulnerabilities.

Ämnesområden: IT-säkerhet
Kommittébeteckning: SIS/TK 318 (Informationssäkerhet)
Källa: ISO
Svarsdatum: den 4 feb 2019
Se merSe mindre
 

This part of ISO/IEC 29192 specifies three block ciphers suitable for applications requiring lightweight cryptographic implementations:
― LEA: a lightweight block cipher with a block size of 128 bits and a key size of 128, 192 or 256 bits.