ISO IEC 29128-1-2023.docx
-
资源ID:1742449
资源大小:57.93KB
全文页数:26页
- 资源格式: DOCX
下载积分:7金币
快捷下载

账号登录下载
微信登录下载
三方登录下载:
友情提示
2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
|
ISO IEC 29128-1-2023.docx
INTERNATIONA1.STANDARDISO/IEC29128-1editionSecond2023-03Informationsecurity,cybersecurityandprivacyprotectionVerificationofcryptographicprotoco1.s一meworkReferencenumberISO/IEC29128-1.:2023(E)©ISO/IEC2023COPYRIGHTPROTECTEDDOCUMENT©IS0/1EC2023IUirhM*hedbdi1.iUedotherwiseupdhi.or啪UIBndttaeDmk<nroni(ncm11ni10tf1.*Mqn1.C6pW11opypMRHt1.onmaytheinternetoranintranet,withoutpriorwrittenpermission.PermissioncanberequestedfromeitherISOattheaddressbe1.oworISO'smemberbodyinthecountryoftherequester.f),WV>fifiHipB1.andonnet8CH-1214Vernier,GenevaPhone:M1.22749O1.11觥ftte:丽丽BQrgPub1.ishedinSwitzer1.andContentsForewordivIntroductionv2 Scope13 Normativereferences14 Termsanddefinitions1Forma1.verificationofcryptographicprotoco1.s24.1 Methodsformode1.1.ingcryptographicprotoco1.s24.2 Verificationrequirements342J1.Nuthtf1.eatioitoo1.sverification.34.2.3Boundedvsunboundedverification34.3 Cryptographicprotoco1.mode1.41234圣3.3.*4.4.yPW)tionspecifi(SWwf1.4Adversaria1.mode1.5Submittingamode1.5VerificationPrOCeSS65.1 Genera1.65.2 Dutiesofthesubmitter65.3 5BUiiesMtrihaziut1.iestor6532EVa1.Ua1.1.ngIheprover.*.>>.<.65.3.3Eva1.uatingthemode1.6多%7Annex A (informative)TheNeedhain-Schroeder-1.owepub1.ickeyprotoco1.8Annex B (informative)Examp1.esubmissionAnnex C (informative)Examp1.eeva1.uation.10Annex D (informative)Do1.ev-Yaomode1.11Annex E (informative)Securityrproperties.12Bib1.iography14ForewordISO(theInternationa1.OrganizationforStandardization)isawor1.dwidefederationofnationa1.standardsUudiugh(ISOtnrifaaibwrim11thvcekWPfff1.QtafigbodyEtttibtandriteN(11owMycare<hf1.t2committeehasbeenestab1.ishedhastherighttoberepresentedonthatcommittee.Internationa1.organizations,governmenta1.andnon-governmenta1.,in1.iaisonwithISO,a1.sotakepartinthework.ISOco1.1.aboratesc1.ose1.ywiththee1.ectrotechnica1.standardization.Internationa1.E1.ectrotechnica1.Commission(IEC)ona1.1.mattersofTheproceduresusedtodeve1.opthisdocumentandthoseintendedforitsfurthermaintenance暇dedd釉魄ddi春nt1.S明段处楹tives,d。翻ents1弧U1.dB射蝴e1<槐螂f1.1.ej逊B血邮硒inISO/IECDirectives.Part2(secwww.iso.org/dircctivesorwww.iec.ch/members.experts/refdocs).附出柚OnrJghts.d1.枪痴nf桃的抄那杷Mg施河F睡H田舛偌曲阻IdoC1.选tfrM<fiKs.subjectofanypatentrightsidentifiedduringthedeve1.opmentofUWdxunwmWjI1.buu¾theIntroductionand/orontheISO1.istofpatentdw1.aradonsreceived(seewww.iso.org/patents)ortheIEC1.istofpatentdec1.arationsreceived(seepatents.iec.ch).Anytradenameusedinthisdocumentisinformationgivenfortheconvenienceofusersanddoesnotconstituteanendorsement.E即邮SiOnSeX阀nk<bM的CMtbwAWy前stavwtdsrtwfmw加RWQiH(ftificadhcvweit11d:hWOndITadaQrgaN¾uion(WTO)princip1.esinth。T依hnica1.Ba沁stoTrad。(TBT),seewwvv.iso.org/iso/foreword.htrn.IntheIEC.seewww.iec.chunderstandmgstandards.j渊田M心肥SC褊呵9K初肺屈衲群咖隰CUr与阳(SOI&肪小ec"on./brmaonTechno1.ogy.Thissecondeditioncance1.sandrep1.acesthefirstedition(ISO/IEC29128:2011),whichhasbeentechnica1.1.yrevised.Themainchangesareasfo1.1.ows: remova1.Ofinforma1.andpaper-and-penci1.proofs; deprecationofPA1.1.eve1.s; stream1.iningoftechnica1.requirementsandexp1.anations;minoreditoria1.changestobringthedocumentin1.inewiththeISO/IECDirectivesPart2.2021.A1.istofa1.1.partsintheISO/IEC29128seriescanbefoundontheISOandIECwebsites.Anyfeedbackorquestionsonthisdocumentshou1.dbedirectedtoth(MU4M4aUa1.4aiMuU4¼h;body.comp1.ete1.istingofthesebodiescanbefoundatwww.iso.org/members.htm1.andIntroductionManycryptographicprotoco1.shavefai1.edtoachievetheirstatedsecuritygoa1.sbecausetheyareco011d9iiUxhfthdraDktt曲PUItyanemeim也EqyrOtOCo1.iwddeuethdtedrirous1.加MrirthHOndcavtmrityfinderrorsinIheirdesign.Thegoa1.ofthisdocumentistostandardizeamethodforana1.ysingprotoco1.sbyProposingadear1.ydefinedverificationframeworkbasedonwe1.1.-foundedscientificmethods.喻rH三entN斗jv1.?jdi<WWHBh的博MUreev由阴福西tha骏UforCryPconfidencethatastandardizedcryptographica1.gorithmmeetsthespecificsecurityrequirementsitwasdesignedfor.simi1.arprocessforcryptographicprotoco1.swou1.dprovideconfidencethataverifiedprotoco1.meetsitsstatedseritypropertiesandcanbeusedinsecurity-critica1.systems.Theproposedverificationprocessisbasedonstate-of-the-artprotoco1.mode1.1.ingtechniquesusingrigorous1.ogic,mathematics,andcomputerscience.ItisdesignedtoprovideobjectiveevidencethatCOngMAT%©岭府IIfcMnqu*殷,fb航三n函哂既叫WiIhanyInformationsecurity,cybersecurityandprivacyprotectionVerificationofcryptographicprotoco1.s一pgmework1ScopeThisdocumentestab1.ishesaframeworkfortheverificationofcryptographicprotoco1.specificationsZactNoitnRativeacademicrofttteiricesybestpractices.IhiSdocument.Forthepurposesofthisdocument,thefo1.1.owingtermsanddefinitionsapp1.y.ISOandIECmaintaintermino1.ogydatabasesforuseinstandardizationatthefo1.1.owingaddresses:-ISOOn1.ine