Name of tests and (or) characteristics (parameters) to be determined | Designation of normative documents on test methods |
1.1 implementation of digital signature production and verification procedures based on asymmetric cryptographic algorithm; 1.2 implementation of hash functions; 1.3 implementation of key establishment algorithms based on elliptic curves; 1.4 implementation of encryption algorithms based on password information; 1.5 implementation of key protection algorithms; 1.6 implementation of information integrity verification algorithms; 1.7 implementation of message authentication algorithms. Measurement of physical quantities on the basis of which special indicators of information security against leakage through technical channels are calculated: 1.8 intensity of the electric component of the electromagnetic field; 1.9 intensity of the magnetic component of the electromagnetic field; 1.10 voltage levels of electromagnetic inductions in power supply lines; 1.11 current levels of electromagnetic inductions in power supply lines; 1.12 current levels of electromagnetic inductions in grounding lines. |
DSTU GOST 28147:2009 DSTU ISO/IEC 19790 GOST 34.310-95 DSTU 4145-2002 GOST 34.311-95 DSTU ISO/IEC 10118-3:2005 DSTU ISO/IEC 15946-1:2006 DSTU ISO/IEC 15946-3:2006 DSTU GOST 30428:2004 PKCS#1 v2.1: The RSA Cryptography Standard FIPS PUB 186-4:2013 – “FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION. Digital Signature Standard (DSS)” Advanced Encryption Standard (AES) (FIPS PUB 197) „Information technology – Security techniques – Encryption algorithms – Part 3: Block ciphers ISO/IEC 18033-3:2005" (DES, TDEA, AES) "Information technology – Security techniques – Modes of operation for an n-bit block cipherISO/IEC 10116:2006" (DES, TDEA, AES, RC2) IETF RFC 2268 "RC2(r) Encryption Algorithm" RFC 2898 "Password-Based Cryptography Specification (PKCS#5)", September 2000 IETF RFC 3394 "Advanced Encryption Standard (AES) Key Wrap Algorithm"RFC 2630 "Cryptographic Message Syntax". Triple-DES and RC2 Key Wrap Algorithms RFC 2104:1997 - HMAC: Keyed-Hashing for Message Authentication - February 1997» (MD5, SHA1, SHA224, SHA256, SHA512) NIST Special Publication 800-38B – “Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication" (TDEA, AES) ND TZI 2.3-023-2015 Special issl. ACS, computer - M., MRP, 1977; Actvn ZSHT PEMIN - MRP of the USSR, 17.03.83; Sb Mtd RECH - M., MPSS, 1978; VrMt VChN, MPSS, 1978 |