ISO/IEC-29128 Information technology - Security techniques - Verification of cryptographic protocols

ISO/IEC-29128 - 1ST EDITION - SUPERSEDED
Show Complete Document History

Document Center Inc. is an authorized dealer of ISO standards.
The following bibliographic material is provided to assist you with your purchasing decision:


ISO/IEC 29128:2011 establishes a technical base for the security proof of the specification of cryptographic protocols. It specifies design evaluation criteria for these protocols, as well as methods to be applied in a verification process for such protocols. It also provides definitions of different protocol assurance levels consistent with evaluation assurance components in ISO/IEC 15408.

To find similar documents by classification:

35.030 (IT Security Including encryption)

35.040 (Character sets and information coding Including coding of audio, picture, multimedia and hypermedia information, IT security techniques, encryption, bar coding, electronic signatures, etc.)

This document comes with our free Notification Service, good for the life of the document.

This document is available in either Paper or PDF format.

Document Number

ISO/IEC 29128:2011

Revision Level

1ST EDITION

Status

Superseded

Publication Date

Dec. 15, 2011

Committee Number

ISO/IEC/JTC 1/SC 27