If you have difficulty in submitting comments on draft standards you can use a commenting template and email it to admin.start@bsigroup.com. The commenting template can be found here.

We use cookies to give you the best experience and to help improve our website

Find out what cookies we use and how to disable them

BS ISO/IEC 29128-2 Information security, cybersecurity and privacy protection — Verification of Cryptographic Protocols —. Part 2: Evaluation Methods and Activities for Cryptographic Protocols

Source:
ISO/IEC
Committee:
IST/33/3 - Security Evaluation, Testing and Specification
Categories:
Comment period start date:
Comment period end date:
Number of comments:
0

Comment by:

Scope

This document specifies an extension of evaluation methods and activities for cryptographic protocols based on ISO/IEC 15408-4 that provides a framework for evaluation methods and activities. This document provides a mapping between the work items for cryptographic protocol evaluation and the associated evaluation activities or evaluation methods. Additionally, this document also provides security assurance classification based on the cryptographic assessment performed by automated provers in four different levels of increasing assurance.

Read draft and comment

Comment on proposal

Required form fields are indicated by an asterisk (*) character.


Please email further comments to: debbie.stead@bsigroup.com

Follow standard

You are now following this standard. Weekly digest emails will be sent to update you on the following activities:

You can manage your follow preferences from your Account. Please check your mailbox junk folder if you don't receive the weekly email.

Unfollow standard

You have successfully unsubscribed from weekly updates for this standard.

Error