BS EN 419221-5:2018 pdf free

05-02-2021 comment

BS EN 419221-5:2018 pdf free.Protection Profiles for TSP Cryptographic Modules Cryptographic Module for Trust Services.
BS EN 419221-5 This part of EN 419221 specifies a Protection Profile for cryptographic modules which is intended to besuitable for use by trust service providers supporting electronic signature and electronic sealingoperations,certificate issuance and revocation, time stamp operations, and authentication services, asidentified by the (EU) No 910/2014 regulation of the European Parliament and of the Council onelectronic identification and trust services for electronic transactions in the internal market(Regulation(EU) No 910/2014 eIDAS) in[10]. The Protection Profile also includes optional support for protectedbackup of keys. The document follows the rules and conventions laid out in Common Criteria Part 1 [CC1],Annex B”Specification of Protection Profiles”.
The following documents are referred to in the text in such a way that some or all of their contentconstitutes requirements of this document. For dated references, only the edition cited applies. Forundated references, the latest edition of the referenced document (including any amendments) applies.ISO/IEC 19790:2012,Information technology -Security techniques — Security requirements forcryptographic modules
Common Criteria for Information Technology Security Evaluation, Part 1: Introduction and generalmodel (Version 3.1 Revision 4,September 2012),CCMB-2012-09-001[CC1]
Common Criteria for Information Technology Security Evaluation,Part 2: Security functionalrequirements, (Version 3.1 Revision 4, September 2012), CCMB-2012-09-002 [CC2]
Common Criteria for Information Technology Security Evaluation,Part 3: Security assurancerequirements, (Version 3.1 Revision 4, September 2012), CCMB-2012-09-003[CC3]
Authorization Data data, including data particular to the user, which is used to control access to (and thus use of) a key.Data particular to the user may include data derived from a secret known only by the user, data derivedfrom a device held by the user and/or data derived from biometric features of the user. Other parts ofthe authorization data may include data held within the cryptographic module,data held byadministrator(s) or data provided by the application
electronic seal data in electronic form which is attached to or logically associated with other data in electronic form toensure the latter’s origin and integrity.
electronic timestamp data in electronic form which binds other data in electronic form to a particular time establishingevidence that the latter data existed at that time.
secret key either a secret key used in symmetric cryptographic functions,or a private key used in asymmetriccryptographic functions.BS EN 419221-5 pdf download.

Download infomation Go to download
Note: Can you help me share this website on your Facebook or others? Many thanks!
BS ISO 7425-1:2021 pdf free Free BS Standards

BS ISO 7425-1:2021 pdf free

BS ISO 7425-1:2021 pdf free.Hydraulic fluid power cylinders一Dimensions and tolerances of housings for elastomer- energized, plastic-faced seals Part 1: Piston seal housings. 5.2 Axial length For axial lengths for the nominal piston diameters, see Iable3. If the...
Get More
BS EN ISO 8407-2021 pdf free download Free BS Standards

BS EN ISO 8407-2021 pdf free download

BS EN ISO 8407-2021 pdf free download.Corrosion of metals and alloys一Removal of corrosion products from corrosion test specimens. 4.1.6 The true mass of the specimen, after removal of the corrosion products, will be a value between the...
Get More

LEAVE A REPLY

Anonymous netizen Fill in information