|Name of tests and (or) characteristics (parameters) to be determined||Designation of normative documents on test methods|
1.1 implementation of digital signature production and verification procedures based on asymmetric cryptographic algorithm;
1.2 implementation of hash functions;
1.3 implementation of key establishment algorithms based on elliptic curves;
1.4 implementation of encryption algorithms based on password information;
1.5 implementation of key protection algorithms;
1.6 implementation of information integrity verification algorithms;
1.7 implementation of message authentication algorithms.
Measurement of physical quantities on the basis of which special indicators of information security against leakage through technical channels are calculated:
1.8 intensity of the electric component of the electromagnetic field;
1.9 intensity of the magnetic component of the electromagnetic field;
1.10 voltage levels of electromagnetic inductions in power supply lines;
1.11 current levels of electromagnetic inductions in power supply lines;1.12 current levels of electromagnetic inductions in grounding lines.
DSTU GOST 28147:2009
DSTU ISO/IEC 19790
DSTU ISO/IEC 10118-3:2005
DSTU ISO/IEC 15946-1:2006
DSTU ISO/IEC 15946-3:2006
DSTU GOST 30428:2004
PKCS#1 v2.1: The RSA Cryptography Standard
FIPS PUB 186-4:2013 – “FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION.
Digital Signature Standard (DSS)”
Advanced Encryption Standard (AES) (FIPS PUB 197)
„Information technology – Security techniques – Encryption algorithms – Part 3:
Block ciphers ISO/IEC 18033-3:2005" (DES, TDEA, AES)"Information technology – Security techniques – Modes of operation for an n-bit block cipher
ISO/IEC 10116:2006" (DES, TDEA, AES, RC2)
IETF RFC 2268 "RC2(r) Encryption Algorithm"
RFC 2898 "Password-Based Cryptography Specification (PKCS#5)", September 2000IETF RFC 3394 "Advanced Encryption Standard (AES) Key Wrap Algorithm"
RFC 2630 "Cryptographic Message Syntax". Triple-DES and RC2 Key Wrap Algorithms
RFC 2104:1997 - HMAC: Keyed-Hashing for Message Authentication - February 1997» (MD5, SHA1, SHA224, SHA256, SHA512)
NIST Special Publication 800-38B – “Recommendation for Block Cipher Modes of Operation:
The CMAC Mode for Authentication" (TDEA, AES)
ND TZI 2.3-023-2015
Special issl. ACS, computer - M., MRP, 1977;
Actvn ZSHT PEMIN - MRP of the USSR, 17.03.83;
Sb Mtd RECH - M., MPSS, 1978;VrMt VChN, MPSS, 1978