Customer Support: 131 242

  • There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

BS ISO/IEC 29128:2011

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by

Information technology. Security techniques. Verification of cryptographic protocols

Available format(s)

Hardcopy , PDF

Superseded date

11-04-2023

Superseded by

BS ISO/IEC 29128-1:2023

Language(s)

English

Published date

31-01-2012

$618.22
Including GST where applicable

Foreword
Introduction
1 Scope
2 Terms and definitions
3 Symbols and notation
4 General
5 Specifying cryptographic protocols
6 Cryptographic protocol assurance levels
7 Security Assessment and Verification
8 Common Methodology for Cryptographic Protocols
  Security Evaluation
Annex A (informative) - Guidelines for Cryptographic
        Protocol Design
Annex B (informative) - Example of formal specification
Annex C (informative) - Verification examples
Bibliography

Specifies a technical base for the security proof of the specification of cryptographic protocols.

Committee
IST/33/3
DevelopmentNote
Supersedes 10/30192143 DC. (02/2012)
DocumentType
Standard
Pages
62
PublisherName
British Standards Institution
Status
Superseded
SupersededBy
Supersedes

This International Standard establishes a technical base for the security proof of the specification of cryptographic protocols. This International Standard specifies design evaluation criteria for these protocols, as well as methods to be applied in a verification process for such protocols. This International Standard also provides definitions of different protocol assurance levels consistent with evaluation assurance components in ISO/IEC 15408.

Standards Relationship
ISO/IEC 29128:2011 Identical

ISO/IEC 15408-2:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components
ISO/IEC 15408-3:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components
ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.

Need help?
Call us on 131 242, then click here to start a Screen Sharing session
so we can help right away! Learn more