ISO/IEC 24759 Revised
ISO/IEC 24759:2014
Information technology - Security techniques - Test requirements for cryptographic modules
ISO/IEC 24759:2014 specifies the methods to be used by testing laboratories to test whether the cryptographic module conforms to the requirements specified in ISO/IEC 19790:2012/Cor.1:2015. The methods are developed to provide a high degree of objectivity during the testing process and to ensure consistency across the testing laboratories.
ISO/IEC 24759:2014 also specifies the requirements for information that vendors provide to testing laboratories as supporting evidence to demonstrate their cryptographic modules' conformity to the requirements specified in ISO/IEC 19790:2012/Cor.1:2015.
Vendors can use this International Standard as guidance in trying to verify whether their cryptographic modules satisfy the requirements specified in ISO/IEC 19790:2012/Cor.1:2015 before they apply to the testing laboratory for testing.
ISO/IEC 24759:2014 also specifies the requirements for information that vendors provide to testing laboratories as supporting evidence to demonstrate their cryptographic modules' conformity to the requirements specified in ISO/IEC 19790:2012/Cor.1:2015.
Vendors can use this International Standard as guidance in trying to verify whether their cryptographic modules satisfy the requirements specified in ISO/IEC 19790:2012/Cor.1:2015 before they apply to the testing laboratory for testing.
CHFÂ 65.-
A more recent version of this publication exists:
ISO/IEC 24759:2025
Technical committee
ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protectionKeywords
Cyber security - Smart cityPublication type | International Standard |
Publication date | 2014-01-31 |
Edition | 2.0 |
ICS | 35.030 |
Withdrawal date | 2017-04-04 |
Pages | 135 |
File size | 2.18 MB |