Machines for data processing: - hardware and software-hardware cryptosystems and means of cryptographic protection of information

Name of tests and (or) characteristics (parameters) to be determined Designation of normative documents on test methods

1.1 implementation of digital signature production and verification procedures based on asymmetric cryptographic algorithm;

1.2 implementation of hash functions;

1.3 implementation of key establishment algorithms based on elliptic curves;

1.4 implementation of encryption algorithms based on password information;

1.5 implementation of key protection algorithms;

1.6 implementation of information integrity verification algorithms;

1.7 implementation of message authentication algorithms.

Measurement of physical quantities on the basis of which special indicators of information security against leakage through technical channels are calculated:

1.8 intensity of the electric component of the electromagnetic field;

1.9 intensity of the magnetic component of the electromagnetic field;

1.10 voltage levels of electromagnetic inductions in power supply lines;

1.11 current levels of electromagnetic inductions in power supply lines;

1.12 current levels of electromagnetic inductions in grounding lines.

DSTU GOST 28147:2009


GOST 34.310-95

DSTU 4145-2002

GOST 34.311-95

DSTU ISO/IEC 10118-3:2005

DSTU ISO/IEC 15946-1:2006

DSTU ISO/IEC 15946-3:2006

DSTU GOST 30428:2004

PKCS#1 v2.1: The RSA Cryptography Standard


Digital Signature Standard (DSS)”

Advanced Encryption Standard (AES) (FIPS PUB 197)

„Information technology – Security techniques – Encryption algorithms – Part 3:

Block ciphers ISO/IEC 18033-3:2005" (DES, TDEA, AES)

 "Information technology – Security techniques – Modes of operation for an n-bit block cipher
ISO/IEC 10116:2006" (DES, TDEA, AES, RC2)
IETF RFC 2268 "RC2(r) Encryption Algorithm"

RFC 2898 "Password-Based Cryptography Specification (PKCS#5)", September 2000

IETF RFC 3394 "Advanced Encryption Standard (AES) Key Wrap Algorithm"
RFC 2630 "Cryptographic Message Syntax". Triple-DES and RC2 Key Wrap Algorithms
RFC 2104:1997 - HMAC: Keyed-Hashing for Message Authentication - February 1997»
(MD5, SHA1, SHA224, SHA256, SHA512)

NIST Special Publication 800-38B – “Recommendation for Block Cipher Modes of Operation:

The CMAC Mode for Authentication" (TDEA, AES)

ND TZI 2.3-023-2015

Special issl. ACS, computer - M., MRP, 1977;

Actvn ZSHT PEMIN - MRP of the USSR, 17.03.83;

Sb Mtd RECH - M., MPSS, 1978;

VrMt VChN, MPSS, 1978