Abstract
ISO/IEC FDIS 29128-2 Information security, cybersecurity and privacy protection — Verification of Cryptographic Protocols Part 2: Evaluation Methods and Activities for Cryptographic Protocols
This document defines the evaluation methods and activities to assess the artefacts defined in Part 1 for the verification of the correctness and security of a cryptographic protocol specification using the framework from ISO/IEC 15408-4.
ICT rolling plan topic
Cybersecurity/Network and Information security
SDO
ISO/IEC
Involved fellows
Standard/Working group
Standard
Latest published version
Final text received or FDIS registered for formal approval [50.00]