BS ISO IEC 18367-2016 Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing《信息技术 安全技术 密码算法和安全机制一致性测试》.pdf

上传人:arrownail386 文档编号:396463 上传时间:2018-10-18 格式:PDF 页数:80 大小:3.99MB
下载 相关 举报
BS ISO IEC 18367-2016 Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing《信息技术 安全技术 密码算法和安全机制一致性测试》.pdf_第1页
第1页 / 共80页
BS ISO IEC 18367-2016 Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing《信息技术 安全技术 密码算法和安全机制一致性测试》.pdf_第2页
第2页 / 共80页
BS ISO IEC 18367-2016 Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing《信息技术 安全技术 密码算法和安全机制一致性测试》.pdf_第3页
第3页 / 共80页
BS ISO IEC 18367-2016 Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing《信息技术 安全技术 密码算法和安全机制一致性测试》.pdf_第4页
第4页 / 共80页
BS ISO IEC 18367-2016 Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing《信息技术 安全技术 密码算法和安全机制一致性测试》.pdf_第5页
第5页 / 共80页
亲,该文档总共80页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述

1、BS ISO/IEC 18367:2016 Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing BSI Standards Publication WB11885_BSI_StandardCovs_2013_AW.indd 1 15/05/2013 15:06BS ISO/IEC 18367:2016 BRITISH STANDARD National foreword This British Standard is th

2、e UK implementation of ISO/IEC 18367:2016. The UK participation in its preparation was entrusted to Technical Committee IST/33/3, Security Evaluation, Testing and Specification. A list of organizations represented on this committee can be obtained on request to its secretary. This publication does n

3、ot purport to include all the necessary provisions of a contract. Users are responsible for its correct application. The British Standards Institution 2016. Published by BSI Standards Limited 2016 ISBN 978 0 580 82187 5 ICS 35.030 Compliance with a British Standard cannot confer immunity from legal

4、obligations. This British Standard was published under the authority of the Standards Policy and Strategy Committee on 31 December 2016. Amendments/corrigenda issued since publication Date T e x t a f f e c t e dBS ISO/IEC 18367:2016 Information technology Security techniques Cryptographic algorithm

5、s and security mechanisms conformance testing Technologie de linformation Techniques de scurit Essais de conformit des algorithmes cryptographiques et des mcanismes de scurit INTERNATIONAL STANDARD ISO/IEC 18367 Reference number ISO/IEC 18367:2016(E) First edition 2016-12-15 ISO/IEC 2016 BS ISO/IEC

6、18367:2016ii ISO/IEC 2016 All rights reserved COPYRIGHT PROTECTED DOCUMENT ISO/IEC 2016, Published in Switzerland All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including phot

7、ocopying, or posting on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below or ISOs member body in the country of the requester. ISO copyright office Ch. de Blandonnet 8 CP 401 CH-1214 Vernier, Geneva, Switzerland Tel. +41 2

8、2 749 01 11 Fax +41 22 749 09 47 copyrightiso.org www.iso.org ISO/IEC 18367:2016(E)BS ISO/IEC 18367:2016ISO/IEC 18367:2016(E)Foreword v Introduction vi 1 Scope . 1 2 Normative references 1 3 T erms and definitions . 1 4 Symbols and abbreviated terms . 6 5 Objectives . 7 6 Types of cryptographic algo

9、rithms and security mechanisms from a conformance testing perspective . 8 6.1 General . 8 6.2 Asymmetric key algorithms . 8 6.3 Digital signature . 8 6.4 Digital signature with message recovery . 8 6.5 Hashing algorithms . 8 6.6 Key establishment mechanisms . 8 6.7 Lightweight cryptography . 9 6.8 M

10、essage authentication algorithms 9 6.9 Random bit generator algorithms 9 6.9.1 Deterministic random bit generator algorithms 9 6.9.2 Non-deterministic random bit generator algorithms 9 6.10 Symmetric key algorithms .10 6.10.1 Block cipher symmetric key algorithms .10 6.10.2 Stream cipher symmetric k

11、ey algorithms .10 7 Conformance testing methodologies 10 7.1 Overview .10 7.2 Black box testing.11 7.2.1 General.11 7.2.2 Known-answer test vectors .11 7.2.3 Multi-block message testing .11 7.2.4 Monte Carlo or statistical testing 11 7.3 Glass box or white box testing 11 7.3.1 Source code inspection

12、 11 7.3.2 Binary analysis11 8 Levels of conformance testing .12 8.1 Introduction .12 8.2 Level of basic conformance testing 12 8.3 Level of moderate conformance 12 9 Conformance testing guidelines 12 9.1 General guidelines.12 9.1.1 Identification 12 9.1.2 Guidelines for black box testing .13 9.1.3 G

13、uidelines for white box testing 13 9.2 Guidelines specific to encryption algorithms 16 9.2.1 Identification of encryption algorithms 16 9.2.2 Selecting a set of conformance test items .17 9.2.3 Guidelines for each conformance test item18 9.3 Guidelines specific to digital signature algorithms 29 9.3

14、.1 Identification of digital signature algorithms 29 9.3.2 Selecting a set of conformance test items .29 9.3.3 Guidelines for each conformance test item29 9.4 Guidelines specific to hashing algorithms 30 ISO/IEC 2016 All rights reserved iii Contents PageBS ISO/IEC 18367:2016ISO/IEC 18367:2016(E)9.4.

15、1 Identification of hashing algorithms .30 9.4.2 Selecting a set of conformance test items .31 9.4.3 Guidelines for each conformance test item31 9.5 Guidelines specific to MAC algorithms 33 9.5.1 Identification of MAC algorithms 33 9.5.2 Selecting a set of conformance test items .34 9.5.3 Guidelines

16、 for each conformance test item34 9.6 Guidelines specific to RBG algorithms .35 9.6.1 Identification of RBG algorithms 35 9.6.2 Selecting a set of conformance test items .35 9.6.3 Guidelines for each conformance test item35 9.7 Guidelines specific to key establishment mechanisms .36 9.7.1 Identifica

17、tion of key establishment mechanisms .36 9.7.2 Selecting a set of conformance test items .36 9.7.3 Guidelines for each conformance test item37 9.8 Guidelines specific to key derivation function 39 9.8.1 Identification of key derivation function .39 9.8.2 Selecting a set of conformance test items .39

18、 9.8.3 Guidelines for each conformance test item39 9.9 Guidelines specific to prime number generation .40 9.9.1 Identification of prime number generation .40 9.9.2 Selecting a set of conformance test items .40 9.9.3 Guidelines for each conformance test item41 10 Conformance testing 41 10.1 Level of

19、conformance testing .41 10.2 Symmetric key cryptographic algorithms 42 10.2.1 n-bit block cipher .42 10.3 Asymmetric key cryptographic algorithms .43 10.3.1 Digital Signature Algorithm (DSA) 43 10.3.2 RSA 47 10.3.3 Elliptic Curve Digital Signature Algorithm (ECDSA) 49 10.4 Dedicated hashing algorith

20、ms 51 10.4.1 General.51 10.4.2 Black box testing .51 10.4.3 White box testing 51 10.5 Message Authentication Codes (MAC) .51 10.5.1 Black box testing .51 10.5.2 White box testing 52 10.6 Authenticated encryption .53 10.6.1 Black box testing .53 10.6.2 White box testing 54 10.7 Deterministic Random B

21、it Generation algorithms .54 10.7.1 DRBG based on ISO/IEC 18031 54 10.8 Key agreement 58 10.8.1 Black box testing .58 10.8.2 White box testing 61 10.9 Key Derivation Functions (KDF) .62 10.9.1 Black box testing .62 10.9.2 White box testing 63 Annex A (informative) Common mistakes in cryptographic al

22、gorithm implementations 64 Annex B (informative) Examples of known-answer test vectors 65 Bibliography .66 iv ISO/IEC 2016 All rights reservedBS ISO/IEC 18367:2016ISO/IEC 18367:2016(E) Foreword ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commi

23、ssion) form the specialized system for worldwide standardization. National bodies that are members of ISO or IEC participate in the development of International Standards through technical committees established by the respective organization to deal with particular fields of technical activity. ISO

24、 and IEC technical committees collaborate in fields of mutual interest. Other international organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information technology, ISO and IEC have established a joint technical committee, ISO

25、/IEC JTC 1. The procedures used to develop this document and those intended for its further maintenance are described in the ISO/IEC Directives, Part 1. In particular the different approval criteria needed for the different types of document should be noted. This document was drafted in accordance w

26、ith the editorial rules of the ISO/IEC Directives, Part 2 (see www.iso.org/directives). Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights. Detai

27、ls of any patent rights identified during the development of the document will be in the Introduction and/or on the ISO list of patent declarations received (see www.iso.org/patents). Any trade name used in this document is information given for the convenience of users and does not constitute an en

28、dorsement. For an explanation on the meaning of ISO specific terms and expressions related to conformity assessment, as well as information about ISOs adherence to the WTO principles in the Technical Barriers to Trade (TBT) see the following URL: Foreword - Supplementary information The committee re

29、sponsible for this document is ISO/IEC JTC 1, Information technology, SC 27, IT Security techniques. ISO/IEC 2016 All rights reserved vBS ISO/IEC 18367:2016ISO/IEC 18367:2016(E) Introduction This document describes cryptographic algorithms and security mechanisms conformance testing methods. The pur

30、pose of this document is to address conformance testing methods of cryptographic algorithms and security mechanisms implemented in a cryptographic module. This will allow a complete security evaluation of both the cryptographic module and the implemented cryptographic algorithms and security mechani

31、sms. This document is related to ISO/IEC 19790 and ISO/IEC 24759. ISO/IEC 19790 specifies the security requirements for cryptographic modules. At a minimum, a cryptographic module implements at least one approved security function (i.e., cryptographic algorithm or security mechanism). ISO/IEC 24759

32、addresses the test requirements for each of the security requirements in ISO/IEC 19790. However, ISO/IEC 24759 does not address test methods for cryptographic algorithms and security mechanisms conformance testing.vi ISO/IEC 2016 All rights reservedBS ISO/IEC 18367:2016Information technology Securit

33、y techniques Cryptographic algorithms and security mechanisms conformance testing 1 Scope This document gives guidelines for cryptographic algorithms and security mechanisms conformance testing methods. Conformance testing assures that an implementation of a cryptographic algorithm or security mecha

34、nism is correct whether implemented in hardware, software or firmware. It also confirms that it runs correctly in a specific operating environment. Testing can consist of known-answer or Monte Carlo testing, or a combination of test methods. Testing can be performed on the actual implementation or m

35、odelled in a simulation environment. This document does not include the efficiency of the algorithms or security mechanisms nor the intrinsic performance. This document focuses on the correctness of the implementation. 2 Normative references The following documents are referred to in the text in suc

36、h a way that some or all of their content constitutes requirements of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. ISO/IEC 14888-3:2016, Information technology Security t

37、echniques Digital signatures with appendix ISO/IEC 19790:2012, Information technology Security techniques Security requirements for cryptographic modules 3 T erms a nd definiti ons For the purposes of this document, the terms and definitions given in ISO/IEC 19790 and the following apply. ISO and IE

38、C maintain terminological databases for use in standardization at the following addresses: IEC Electropedia: available at http:/ /www.electropedia.org/ ISO Online browsing platform: available at http:/ /www.iso.org/obp 3.1 approval authority any national or international organisation/authority manda

39、ted to approve and/or evaluate security functions Note 1 to entry: An approval authority in the context of this definition evaluates and approves security functions based on their cryptographic or mathematical merits but is not the testing entity which would test for conformance to this document. SO

40、URCE: ISO/IEC 19790:2012, 3.4 INTERNATIONAL ST ANDARD ISO/IEC 18367:2016(E) ISO/IEC 2016 All rights reserved 1BS ISO/IEC 18367:2016ISO/IEC 18367:2016(E) 3.2 approved mode of operation set of services which includes non-security relevant services and at least one service that utilizes an approved sec

41、urity function or process Note 1 to entry: Not to be confused with a specific mode of an approved security function, e.g. Cipher Block Chaining (CBC) mode. Note 2 to entry: Non-approved security functions or processes are excluded. SOURCE: ISO/IEC 19790:2012, 3.7 3.3 approved security function secur

42、ity function (e.g. cryptographic algorithm) approved by an approval authority 3.4 black box idealized mechanism that accepts inputs and produces outputs, but is designed such that an observer cannot see inside the box or determine exactly what is happening inside that box Note 1 to entry: This term

43、can be contrasted with glass box (3.12). SOURCE: ISO/IEC 18031:2011, 3.6 3.5 critical security parameter CSP security-related information whose disclosure or modification can compromise the security of a cryptographic module EXAMPLE Secret and private cryptographic keys, authentication data such as

44、passwords, PINs, certificates or other trust anchors. SOURCE: ISO/IEC 19790:2012, 3.18, modified 3.6 cryptographic algorithm well-defined computational procedure that takes variable inputs, which may include cryptographic keys, and produces an output SOURCE: ISO/IEC 19790:2012, 3.20 3.7 cryptographi

45、c algorithm boundary boundary encompassing the complete cryptographic algorithm implementation 3.8 cryptographic boundary explicitly defined continuous perimeter that establishes the physical and/or logical bounds of a cryptographic module and contains all the hardware, software, and/or firmware com

46、ponents of a cryptographic module SOURCE: ISO/IEC 19790:2012, 3.21, modified 3.9 f i r mw a r e executable code of a cryptographic module that is stored in hardware within the cryptographic boundary and cannot be dynamically written or modified during execution while operating in a non- modifiable o

47、r limited operational environment EXAMPLE Storage hardware can include but is not limited to PROM, EEPROM, FLASH, solid state memory, hard drives, etc.2 ISO/IEC 2016 All rights reservedBS ISO/IEC 18367:2016ISO/IEC 18367:2016(E) SOURCE: ISO/IEC 19790:2012, 3.45 3.10 f u nc t ion a l s p e c i f ic at

48、 ion high-level description of the ports and interfaces visible to the operator and high-level description of the behaviour of the IUT Note 1 to entry: Here, the IUT means a cryptographic algorithm implementation (see 3.13). SOURCE: ISO/IEC 19790:2012, 3.47, modified 3.11 functional testing testing

49、of the IUT functionality as defined by the functional specification (3.10) SOURCE: ISO/IEC 19790:2012, 3.48, modified 3.12 glass box idealized mechanism that accepts inputs and produces outputs and is designed such that an observer can see inside and determine exactly what is going on Note 1 to entry: This term can be contrasted with black box (3.4). SOURCE: ISO/IEC 18031:2011, 3.14 3.13 implementation under test IUT implementation which is tested for conformance

展开阅读全文
相关资源
  • BS ISO IEC 29150-2011 Information technology Security techniques Signcryption《信息技术 安全技术 签密》.pdfBS ISO IEC 29150-2011 Information technology Security techniques Signcryption《信息技术 安全技术 签密》.pdf
  • BS ISO IEC 15408-1-2009 Information technology - Security techniques - Evaluation criteria for IT Security - Introduction and general model《信息技术 安全技术 IT安全评价准则 一.pdfBS ISO IEC 15408-1-2009 Information technology - Security techniques - Evaluation criteria for IT Security - Introduction and general model《信息技术 安全技术 IT安全评价准则 一.pdf
  • BS ISO 7295-1988+A1-2014 Tyre valves for aircraft Interchangeability dimensions《飞机轮胎汽门嘴 互换性尺寸》.pdfBS ISO 7295-1988+A1-2014 Tyre valves for aircraft Interchangeability dimensions《飞机轮胎汽门嘴 互换性尺寸》.pdf
  • BS ISO 15118-1-2013 Road vehicles Vehicle to grid communication interface General information and use-case definition《道路车辆 车辆到电力通讯接口 通用信息和使用案例定义》.pdfBS ISO 15118-1-2013 Road vehicles Vehicle to grid communication interface General information and use-case definition《道路车辆 车辆到电力通讯接口 通用信息和使用案例定义》.pdf
  • BS ISO 13765-2-2004 Refractory mortars - Determination of consistency using the reciprocating flow table method《耐熔灰浆 使用往复流动表法测定一致性》.pdfBS ISO 13765-2-2004 Refractory mortars - Determination of consistency using the reciprocating flow table method《耐熔灰浆 使用往复流动表法测定一致性》.pdf
  • BS ISO 10998-2008+A1-2014 Agricultural tractors Requirements for steering《农业拖拉机 操纵要求》.pdfBS ISO 10998-2008+A1-2014 Agricultural tractors Requirements for steering《农业拖拉机 操纵要求》.pdf
  • BS Z 9-1998 Space data and information transfer systems - Advanced orbiting systems - Networks and data links - Architectural specification《空间数据和信息传输系统 高级轨道系统 网络和数据链接 结构规范》.pdfBS Z 9-1998 Space data and information transfer systems - Advanced orbiting systems - Networks and data links - Architectural specification《空间数据和信息传输系统 高级轨道系统 网络和数据链接 结构规范》.pdf
  • BS Z 7-1998 Space data and information transfer systems - ASCII encoded English《空间数据和信息传输系统 ASCII 编码英语》.pdfBS Z 7-1998 Space data and information transfer systems - ASCII encoded English《空间数据和信息传输系统 ASCII 编码英语》.pdf
  • BS Z 5-1997 Space data and information transfer systems - Standard formatted data units - Control authority procedures《航天数据和信息发送系统 标准格式数据单元 控制授权程序》.pdfBS Z 5-1997 Space data and information transfer systems - Standard formatted data units - Control authority procedures《航天数据和信息发送系统 标准格式数据单元 控制授权程序》.pdf
  • BS Z 4-1997 Space data and information transfer systems - Standard formatted data units - Structure and construction rules《航天数据和信息传输系统 标准格式数据单元 结构和构造规则》.pdfBS Z 4-1997 Space data and information transfer systems - Standard formatted data units - Structure and construction rules《航天数据和信息传输系统 标准格式数据单元 结构和构造规则》.pdf
  • 猜你喜欢
    相关搜索

    当前位置:首页 > 标准规范 > 国际标准 > BS

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1