Information technology - Security techniques - Security requirements for cryptographic modules (ISO/IEC 19790:2012, including corrected version 2015-12)

EN-ISO/IEC 19790 is a companion document to the “Evaluation criteria for IT security”, ISO/IEC 15408. This International Standard defines the minimum actions to be performed by an evaluator in order to conduct an ISO/IEC 15408 evaluation, using the criteria and evaluation evidence defined in ISO/IEC 15408. This International Standard does not define evaluator actions for certain high assurance ISO/IEC 15408 components, where there is as yet no generally agreed guidance.

Informationstechnik - Sicherheitstechniken - Sicherheitsanforderungen für kryptografische Module (ISO/IEC 19790:2012, einschließlich korrigierte Fassung 2015-12)

Diese Internationale Norm legt die Sicherheitsanforderungen für ein Krypto-Modul fest, das in einem Sicherheitssystem zum Schutz sensibler Informationen in Computer- und Telekommunikationssystemen genutzt wird. Diese Internationale Norm definiert vier Sicherheitsstufen für Krypto-Module, um ein breites Spektrum an Datensensibilität (z. B. Verwaltungsdaten von geringem Wert, Geldtransfers in Millionenhöhe, Lebensschutzdaten, Identitätsdaten von Personen und sensible Informationen, die von Regierungen verwendet werden) und eine Vielzahl von Anwendungsumgebungen (z. B. eine bewachte Einrichtung, ein Büro, Wechselmedien und ein völlig ungeschützter Standort) abzudecken. Diese Internationale Norm legt vier Sicherheitsstufen für jeden der elf Anforderungsbereiche fest, wobei jede Sicherheitsstufe eine höhere Sicherheit als die vorhergehende bietet.
Diese Internationale Norm legt Sicherheitsanforderungen fest, um die Sicherheit eines Krypto-Moduls aufrechtzuerhalten. Die Einhaltung dieser Internationalen Norm reicht nicht aus, um sicherzustellen, dass ein bestimmtes Modul sicher ist oder dass die vom Modul gebotene Sicherheit für den Eigentümer der zu schützenden Informationen ausreichend und annehmbar ist.

Technologies de l'information - Techniques de sécurité - Exigences de sécurité pour les modules cryptographiques (ISO/IEC 19790:2012, y compris version corrigée 2015-12)

La présente Norme internationale spécifie les exigences de sécurité pour un module cryptographique utilisé dans un système de sécurité qui protège les informations sensibles contenues dans les systèmes informatiques et de télécommunications. La présente Norme internationale définit quatre niveaux de sécurité pour les modules cryptographiques afin de couvrir un large éventail de sensibilités des données (par exemple: données administratives de faible valeur, virements bancaires de plusieurs millions de dollars, données qui protègent la vie, informations d'identité personnelles et informations sensibles utilisées par le gouvernement) et une variété d'environnements d'application (par exemple: des installations gardées, un bureau, des supports amovibles, et un emplacement totalement non protégé). La présente Norme internationale spécifie quatre niveaux de sécurité pour chacun des 11 domaines d'exigences, chaque niveau de sécurité offrant une augmentation de la sécurité par rapport au niveau précédent.
La présente Norme internationale spécifie les exigences de sécurité destinées à maintenir à jour la sécurité assurée par un module cryptographique. La conformité à la présente Norme internationale n'est pas suffisante pour garantir qu'un module donné est sûr ou que la sécurité offerte par le module est suffisante et acceptable pour le propriétaire des informations qui sont protégées.

Informacijska tehnologija - Varnostne tehnike - Varnostne zahteve za kriptografske module (ISO/IEC 19790:2012, vključno s popravljeno različico 2015-12)

General Information

Status
Published
Public Enquiry End Date
29-Jan-2020
Publication Date
15-Apr-2020
Technical Committee
Current Stage
6060 - National Implementation/Publication (Adopted Project)
Start Date
03-Apr-2020
Due Date
08-Jun-2020
Completion Date
16-Apr-2020

Buy Standard

Standard
EN ISO/IEC 19790:2020 - BARVE
English language
83 pages
sale 10% off
Preview
sale 10% off
Preview
e-Library read for
1 day
Standard
EN ISO/IEC 19790:2020 - Tekst v barvah
English language
83 pages
sale 10% off
Preview
sale 10% off
Preview
e-Library read for
1 day
Draft
prEN ISO/IEC 19790:2020 - BARVE
English language
80 pages
sale 10% off
Preview
sale 10% off
Preview
e-Library read for
1 day

Standards Content (Sample)

SLOVENSKI STANDARD
SIST EN ISO/IEC 19790:2020
01-maj-2020
Informacijska tehnologija - Varnostne tehnike - Varnostne zahteve za kriptografske
module (ISO/IEC 19790:2012, vključno s popravljeno različico 2015-12)
Information technology - Security techniques - Security requirements for cryptographic
modules (ISO/IEC 19790:2012, including corrected version 2015-12)
Informationstechnik - Sicherheitstechniken - Sicherheitsanforderungen für
kryptografische Module (ISO/IEC 19790:2012, einschließlich korrigierte Fassung 2015-
12)
Technologies de l'information - Techniques de sécurité - Exigences de sécurité pour les
modules cryptographiques (ISO/IEC 19790:2012, y compris version corrigée 2015-12)
Ta slovenski standard je istoveten z: EN ISO/IEC 19790:2020
ICS:
35.030 Informacijska varnost IT Security
SIST EN ISO/IEC 19790:2020 en
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

---------------------- Page: 1 ----------------------
SIST EN ISO/IEC 19790:2020

---------------------- Page: 2 ----------------------
SIST EN ISO/IEC 19790:2020


EUROPEAN STANDARD EN ISO/IEC 19790

NORME EUROPÉENNE

EUROPÄISCHE NORM
March 2020
ICS 35.030

English version

Information technology - Security techniques - Security
requirements for cryptographic modules (ISO/IEC
19790:2012, including corrected version 2015-12)
Technologies de l'information - Techniques de sécurité Informationstechnik - Sicherheitstechniken -
- Exigences de sécurité pour les modules Sicherheitsanforderungen für kryptografische Module
cryptographiques (ISO/IEC 19790:2012, y compris (ISO/IEC 19790:2012, einschließlich korrigierte
version corrigée 2015-11) Fassung 2015-12)
This European Standard was approved by CEN on 2 March 2020.

This European Standard was corrected and reissued by the CEN-CENELEC Management Centre on 09 December 2020.

CEN and CENELEC members are bound to comply with the CEN/CENELEC Internal Regulations which stipulate the conditions for
giving this European Standard the status of a national standard without any alteration. Up-to-date lists and bibliographical
references concerning such national standards may be obtained on application to the CEN-CENELEC Management Centre or to
any CEN and CENELEC member.

This European Standard exists in three official versions (English, French, German). A version in any other language made by
translation under the responsibility of a CEN and CENELEC member into its own language and notified to the CEN-CENELEC
Management Centre has the same status as the official versions.

CEN and CENELEC members are the national standards bodies and national electrotechnical committees of Austria, Belgium,
Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy,
Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Republic of North Macedonia, Romania, Serbia,
Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and United Kingdom.

















CEN-CENELEC Management Centre:
Rue de la Science 23, B-1040 Brussels
© 2020 CEN/CENELEC All rights of exploitation in any form and by any means Ref. No. EN ISO/IEC 19790:2020 E
reserved worldwide for CEN national Members and for
CENELEC Members.

---------------------- Page: 3 ----------------------
SIST EN ISO/IEC 19790:2020
EN ISO/IEC 19790:2020 (E)
Contents Page
European foreword . 3

2

---------------------- Page: 4 ----------------------
SIST EN ISO/IEC 19790:2020
EN ISO/IEC 19790:2020 (E)
European foreword
The text of ISO/IEC 19790:2012, including corrected version 2015-12 has been prepared by Technical
Committee ISO/IEC JTC 1 "Information technology” of the International Organization for
Standardization (ISO) and has been taken over as EN ISO/IEC 19790:2020 by Technical Committee
CEN/CLC/JTC 13 “Cybersecurity and Data Protection” the secretariat of which is held by DIN.
This European Standard shall be given the status of a national standard, either by publication of an
identical text or by endorsement, at the latest by September 2020, and conflicting national standards
shall be withdrawn at the latest by September 2020.
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. CEN shall not be held responsible for identifying any or all such patent rights.
According to the CEN-CENELEC Internal Regulations, the national standards organizations of the
following countries are bound to implement this European Standard: Austria, Belgium, Bulgaria,
Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland,
Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Republic of
North Macedonia, Romania, Serbia, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and the
United Kingdom.
Endorsement notice
The text of ISO/IEC 19790:2012, including corrected version 2015-12 has been approved by CEN as
EN ISO/IEC 19790:2020 without any modification.


3

---------------------- Page: 5 ----------------------
SIST EN ISO/IEC 19790:2020

---------------------- Page: 6 ----------------------
SIST EN ISO/IEC 19790:2020
INTERNATIONAL ISO/IEC
STANDARD 19790
Second edition
2012-08-15
Corrected version
2015-12-15
Information technology — Security
techniques — Security requirements
for cryptographic modules
Technologies de l’information — Techniques de sécurité — Exigences
de sécurité pour les modules cryptographiques
Reference number
ISO/IEC 19790:2012(E)
©
ISO/IEC 2012

---------------------- Page: 7 ----------------------
SIST EN ISO/IEC 19790:2020
ISO/IEC 19790:2012(E)

COPYRIGHT PROTECTED DOCUMENT
© ISO/IEC 2012, Published in Switzerland
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized otherwise in any form
or by any means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior
written permission. Permission can be requested from either ISO at the address below or ISO’s member body in the country of
the requester.
ISO copyright office
Ch. de Blandonnet 8 • CP 401
CH-1214 Vernier, Geneva, Switzerland
Tel. +41 22 749 01 11
Fax +41 22 749 09 47
copyright@iso.org
www.iso.org
ii © ISO/IEC 2012 – All rights reserved

---------------------- Page: 8 ----------------------
SIST EN ISO/IEC 19790:2020
ISO/IEC 19790:2012(E)
Contents Page
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
4 Abbreviated terms .15
5 Cryptographic module security levels .15
5.1 Security Level 1 .15
5.2 Security Level 2 .16
5.3 Security Level 3 .16
5.4 Security Level 4 .17
6 Functional security objectives .17
7 Security requirements .18
7.1 General .18
7.2 Cryptographic module specification .20
7.2.1 Cryptographic module specification general requirements .20
7.2.2 Types of cryptographic modules .20
7.2.3 Cryptographic boundary .21
7.2.4 Modes of operations .22
7.3 Cryptographic module interfaces .23
7.3.1 Cryptographic module interfaces general requirements .23
7.3.2 Types of interfaces .24
7.3.3 Definition of interfaces .24
7.3.4 Trusted channel .25
7.4 Roles, services, and authentication .25
7.4.1 Roles, services, and authentication general requirements .25
7.4.2 Roles .26
7.4.3 Services .26
7.4.4 Authentication .28
7.5 Software/Firmware security .29
7.6 Operational environment .31
7.6.1 Operational environment general requirements .31
7.6.2 Operating system requirements for limited or non-modifiable operational environments .33
7.6.3 Operating system requirements for modifiable operational environments .33
7.7 Physical security .35
7.7.1 Physical security embodiments .35
7.7.2 Physical security general requirements .37
7.7.3 Physical security requirements for each physical security embodiment .39
7.7.4 Environmental failure protection/testing .42
7.8 Non-invasive security .43
7.9 Sensitive security parameter management .44
7.9.1 Sensitive security parameter management general requirements.44
7.9.2 Random bit generators .44
7.9.3 Sensitive security parameter generation .44
7.9.4 Sensitive security parameter establishment .45
7.9.5 Sensitive security parameter entry and output .45
7.9.6 Sensitive security parameter storage .46
© ISO/IEC 2012 – All rights reserved iii

---------------------- Page: 9 ----------------------
SIST EN ISO/IEC 19790:2020
ISO/IEC 19790:2012(E)
7.9.7 Sensitive security parameter zeroisation .46
7.10 Self-tests .47
7.10.1 Self-test general requirements .47
7.10.2 Pre-operational self-tests .47
7.10.3 Conditional self-tests .48
7.11 Life-cycle assurance .50
7.11.1 Life-cycle assurance general requirements .50
7.11.2 Configuration management .51
7.11.3 Design .51
7.11.4 Finite state model .51
7.11.5 Development .52
7.11.6 Vendor testing .53
7.11.7 Delivery and operation .54
7.11.8 End of life .54
7.11.9 Guidance documents .54
7.12 Mitigation of other attacks .55
Annex A (normative) Documentation requirements .56
A.1 Purpose .56
A.2 Items .56
A.2.1 General .56
A.2.2 Cryptographic module specification .56
A.2.3 Cryptographic module interfaces .57
A.2.4 Roles, services, and authentication .57
A.2.5 Software/Firmware security .57
A.2.6 Operational environment .58
A.2.7 Physical security .58
A.2.8 Non-invasive security .58
A.2.9 Sensitive security parameter management .58
A.2.10 Self-tests .59
A.2.11 Life-cycle assurance .60
A.2.12 Mitigation of other attacks .61
Annex B (normative) Cryptographic module security policy .62
B.1 General .62
B.2 Items .62
B.2.1 General .62
B.2.2 Cryptographic module specification .62
B.2.3 Cryptographic module interfaces .63
B.2.4 Roles, services, and authentication .63
B.2.5 Software/Firmware security .64
B.2.6 Operational environment .64
B.2.7 Physical security .64
B.2.8 Non-invasive security .65
B.2.9 Sensitive security parameters management .65
B.2.10 Self-tests .66
B.2.11 Life-cycle assurance .66
B.2.12 Mitigation of other attacks .66
Annex C (normative) Approved security functions .67
C.1 Purpose .67
C.1.1 Block ciphers .67
C.1.2 Stream ciphers .67
C.1.3 Asymmetric algorithms and techniques .67
C.1.4 Message authentication codes.67
C.1.5 Hash functions .67
C.1.6 Entity authentication .68
iv © ISO/IEC 2012 – All rights reserved

---------------------- Page: 10 ----------------------
SIST EN ISO/IEC 19790:2020
ISO/IEC 19790:2012(E)
C.1.7 Key management .68
C.1.8 Random bit generation .68
Annex D (normative) Approved sensitive security parameter generation and establishment methods69
D.1 Purpose .69
D.1.1 Sensitive security parameter generation .69
D.1.2 Sensitive security parameter establishment methods .69
Annex E (normative) Approved authentication mechanisms .70
E.1 Purpose .70
E.1.1 Authentication mechanisms .70
Annex F (normative) Approved non-invasive attack mitigation test metrics .71
F.1 Purpose .71
F.1.1 Non-invasive attack mitigation test metrics .71

© ISO/IEC 2012 – All rights reserved v

---------------------- Page: 11 ----------------------
SIST EN ISO/IEC 19790:2020
ISO/IEC 19790:2012(E)
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) form
the specialized system for worldwide standardization. National bodies that are members of ISO or IEC participate in the
development of International Standards through technical committees established by the respective organization to deal
with particular fields of technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other
international organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the work.
In the field of information technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1.
The procedures used to develop this document and those intended for its further maintenance are described in the
ISO/IEC Directives, Part 1. In particular the different approval criteria needed for the different types of document should
be noted. This document was drafted in accordance with the editorial rules of the ISO/IEC Directives, Part 2
(see www.iso.org/directives).
Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. ISO
and IEC shall not be held responsible for identifying any or all such patent rights. Details of any patent rights identified
during the development of the document will be in the Introduction and/or on the ISO list of patent declarations received
(see www.iso.org/patents).
Any trade name used in this document is information given for the convenience of users and does not constitute an
endorsement.
For an explanation on the meaning of ISO specific terms and expressions related to conformity assessment, as well as
information about ISO's adherence to the WTO principles in the Technical Barriers to Trade (TBT) see the following
URL: Foreword - Supplementary information
Technical corrigendum 1 to ISO/IEC 19790:2012 was prepared by Joint Technical Committee ISO/IEC JTC 1,
Information technology, Subcommittee SC 27, Security techniques.
This corrected version of Technical corrigendum 1 to ISO/IEC 19790:2012 cancels and replaces the first edition
(ISO/IEC 19790:2012/Cor 1:2015), incorporating the same technical revisions and miscellaneous editorial corrections
showing in red text instead of black underlining:
 3.21: The term "cryptographic boundary" is corrected;
 3.80: The term "non-security relevant" is corrected;
 3.108: The term "self-test" is corrected;
 7.2.2: The requirements [02.04], [02.05] and [02.06] are corrected;
 7.2.4.3: The requirement [02.31] is corrected;
 7.3.3: The requirement [03.14] is corrected;
 7.5: The requirements [05.06] and [05.07] are added. The requirements [05.08], [05.13] and [05.17] through
[05.23] are corrected;
 7.6.3: The requirement [06.06] is corrected;
vi © ISO/IEC 2012 – All rights reserved

---------------------- Page: 12 ----------------------
SIST EN ISO/IEC 19790:2020
ISO/IEC 19790:2012(E)
 7.8: The requirement [08.04] is corrected;
 7.9.1: The requirement [09.04] is corrected;
 7.9.7: The requirement [09.37] is corrected;
 7.10.2.2: The requirement [10.17] is corrected;
 7.11.5: The requirement [11.26] is corrected;
 7.11.7: The requirement [11.35] is corrected;
 7.11.9: The requirement [11.38] is corrected;
st nd
 A.2.5: The requirements of the 1 and 2 bullets are corrected;
 A.2.7: The requirement of the 3rd bullet is corrected;
 A.2.10: The requirement of the 4th bullet is corrected;
th
 B.2.4: The requirement of the 9 bullet is corrected;
st
 B.2.5: The requirement of the 1 bullet is corrected;
 B.2.7: The requirement of the 2nd level 6th bullet is corrected;
 D.1: Duplicate text is removed;
 D.1.2: The reference to ISO/IEC 15946-3 is removed;
 E.1: Duplicate text is removed; and
 F.1: Duplicate text is removed.
© ISO/IEC 2012 – All rights reserved vii

---------------------- Page: 13 ----------------------
SIST EN ISO/IEC 19790:2020
ISO/IEC 19790:2012(E)
Introduction
In Information Technology there is an ever-increasing need to use cryptographic mechanisms such as the protection of
data against unauthorised disclosure or manipulation, for entity authentication and for non-repudiation. The security and
reliability of such mechanisms are directly dependent on the cryptographic modules in which they are implemented.
This International Standard provides for four increasing, qualitative levels of security requirements intended to cover a
wide range of potential applications and environments. The cryptographic techniques are identical over the four security
levels. The security requirements cover areas relative to the design and implementation of a cryptographic module.
These areas include cryptographic module specification; cryptographic module interfaces; roles, services, and
authentication; software/firmware security; operational environment; physical security; non-invasive security; sensitive
security parameter management; self-tests; life-cycle assurance; and mitigation of other attacks.

The overall security rating of a cryptographic module must be chosen to provide a level of security appropriate for the
security requirements of the application and environment in which the module is to be utilised and for the security
services that the module is to provide. The responsible authority in each organization should ensure that their computer
and telecommunication systems that utilise cryptographic modules provide an acceptable level of security for the given
application and environment. Since each authority is responsible for selecting which approved security functions are
appropriate for a given application, compliance with this International Standard does not imply either full interoperability
or mutual acceptance of compliant products. The importance of security awareness and of making information security a
management priority should be communicated to all concerned.
Information security requirements vary for different applications; organizations should identify their information resources
and determine the sensitivity to and the potential impact of a loss by implementing appropriate controls. Controls
include, but are not limited to:
 physical and environmental controls;
 access controls;
 software deve
...

SLOVENSKI STANDARD
SIST EN ISO/IEC 19790:2020
01-maj-2020
Informacijska tehnologija - Varnostne tehnike - Varnostne zahteve za kriptografske
module (ISO/IEC 19790:2012)
Information technology - Security techniques - Security requirements for cryptographic
modules (ISO/IEC 19790:2012)
Informationstechnik - Sicherheitstechniken - Sicherheitsanforderungen für
kryptografische Module (ISO/IEC 19790:2012)
Technologies de l'information - Techniques de sécurité - Exigences de sécurité pour les
modules cryptographiques (ISO/IEC 19790:2012)
Ta slovenski standard je istoveten z: EN ISO/IEC 19790:2020
ICS:
35.030 Informacijska varnost IT Security
SIST EN ISO/IEC 19790:2020 en
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

---------------------- Page: 1 ----------------------
SIST EN ISO/IEC 19790:2020

---------------------- Page: 2 ----------------------
SIST EN ISO/IEC 19790:2020


EUROPEAN STANDARD
EN ISO/IEC 19790

NORME EUROPÉENNE

EUROPÄISCHE NORM
March 2020
ICS 35.030

English version

Information technology - Security techniques - Security
requirements for cryptographic modules (ISO/IEC
19790:2012)
Technologies de l'information - Techniques de sécurité Informationstechnik - Sicherheitstechniken -
- Exigences de sécurité pour les modules Sicherheitsanforderungen für kryptografische Module
cryptographiques (ISO/IEC 19790:2012) (ISO/IEC 19790:2012)
This European Standard was approved by CEN on 2 March 2020.

CEN and CENELEC members are bound to comply with the CEN/CENELEC Internal Regulations which stipulate the conditions for
giving this European Standard the status of a national standard without any alteration. Up-to-date lists and bibliographical
references concerning such national standards may be obtained on application to the CEN-CENELEC Management Centre or to
any CEN and CENELEC member.

This European Standard exists in three official versions (English, French, German). A version in any other language made by
translation under the responsibility of a CEN and CENELEC member into its own language and notified to the CEN-CENELEC
Management Centre has the same status as the official versions.

CEN and CENELEC members are the national standards bodies and national electrotechnical committees of Austria, Belgium,
Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy,
Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Republic of North Macedonia, Romania, Serbia,
Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and United Kingdom.




















CEN-CENELEC Management Centre:
Rue de la Science 23, B-1040 Brussels
© 2020 CEN/CENELEC All rights of exploitation in any form and by any means Ref. No. EN ISO/IEC 19790:2020 E
reserved worldwide for CEN national Members and for
CENELEC Members.

---------------------- Page: 3 ----------------------
SIST EN ISO/IEC 19790:2020
EN ISO/IEC 19790:2020 (E)
Contents Page
European foreword . 3

2

---------------------- Page: 4 ----------------------
SIST EN ISO/IEC 19790:2020
EN ISO/IEC 19790:2020 (E)
European foreword
The text of ISO/IEC 19790:2012 has been prepared by Technical Committee ISO/IEC JTC 1 "Information
technology” of the International Organization for Standardization (ISO) and has been taken over as
EN ISO/IEC 19790:2020 by Technical Committee CEN/CLC/JTC 13 “Cybersecurity and Data Protection”
the secretariat of which is held by DIN.
This European Standard shall be given the status of a national standard, either by publication of an
identical text or by endorsement, at the latest by September 2020, and conflicting national standards
shall be withdrawn at the latest by September 2020.
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. CEN shall not be held responsible for identifying any or all such patent rights.
According to the CEN-CENELEC Internal Regulations, the national standards organizations of the
following countries are bound to implement this European Standard: Austria, Belgium, Bulgaria,
Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland,
Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Republic of
North Macedonia, Romania, Serbia, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and the
United Kingdom.
Endorsement notice
The text of ISO/IEC 19790:2012 has been approved by CEN as EN ISO/IEC 19790:2020 without any
modification.

3

---------------------- Page: 5 ----------------------
SIST EN ISO/IEC 19790:2020

---------------------- Page: 6 ----------------------
SIST EN ISO/IEC 19790:2020
INTERNATIONAL ISO/IEC
STANDARD 19790
Second edition
2012-08-15
Corrected version
2015-12-15
Information technology — Security
techniques — Security requirements
for cryptographic modules
Technologies de l’information — Techniques de sécurité — Exigences
de sécurité pour les modules cryptographiques
Reference number
ISO/IEC 19790:2012(E)
©
ISO/IEC 2012

---------------------- Page: 7 ----------------------
SIST EN ISO/IEC 19790:2020
ISO/IEC 19790:2012(E)

COPYRIGHT PROTECTED DOCUMENT
© ISO/IEC 2012, Published in Switzerland
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized otherwise in any form
or by any means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior
written permission. Permission can be requested from either ISO at the address below or ISO’s member body in the country of
the requester.
ISO copyright office
Ch. de Blandonnet 8 • CP 401
CH-1214 Vernier, Geneva, Switzerland
Tel. +41 22 749 01 11
Fax +41 22 749 09 47
copyright@iso.org
www.iso.org
ii © ISO/IEC 2012 – All rights reserved

---------------------- Page: 8 ----------------------
SIST EN ISO/IEC 19790:2020
ISO/IEC 19790:2012(E)
Contents Page
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
4 Abbreviated terms .15
5 Cryptographic module security levels .15
5.1 Security Level 1 .15
5.2 Security Level 2 .16
5.3 Security Level 3 .16
5.4 Security Level 4 .17
6 Functional security objectives .17
7 Security requirements .18
7.1 General .18
7.2 Cryptographic module specification .20
7.2.1 Cryptographic module specification general requirements .20
7.2.2 Types of cryptographic modules .20
7.2.3 Cryptographic boundary .21
7.2.4 Modes of operations .22
7.3 Cryptographic module interfaces .23
7.3.1 Cryptographic module interfaces general requirements .23
7.3.2 Types of interfaces .24
7.3.3 Definition of interfaces .24
7.3.4 Trusted channel .25
7.4 Roles, services, and authentication .25
7.4.1 Roles, services, and authentication general requirements .25
7.4.2 Roles .26
7.4.3 Services .26
7.4.4 Authentication .28
7.5 Software/Firmware security .29
7.6 Operational environment .31
7.6.1 Operational environment general requirements .31
7.6.2 Operating system requirements for limited or non-modifiable operational environments .33
7.6.3 Operating system requirements for modifiable operational environments .33
7.7 Physical security .35
7.7.1 Physical security embodiments .35
7.7.2 Physical security general requirements .37
7.7.3 Physical security requirements for each physical security embodiment .39
7.7.4 Environmental failure protection/testing .42
7.8 Non-invasive security .43
7.9 Sensitive security parameter management .44
7.9.1 Sensitive security parameter management general requirements.44
7.9.2 Random bit generators .44
7.9.3 Sensitive security parameter generation .44
7.9.4 Sensitive security parameter establishment .45
7.9.5 Sensitive security parameter entry and output .45
7.9.6 Sensitive security parameter storage .46
© ISO/IEC 2012 – All rights reserved iii

---------------------- Page: 9 ----------------------
SIST EN ISO/IEC 19790:2020
ISO/IEC 19790:2012(E)
7.9.7 Sensitive security parameter zeroisation .46
7.10 Self-tests .47
7.10.1 Self-test general requirements .47
7.10.2 Pre-operational self-tests .47
7.10.3 Conditional self-tests .48
7.11 Life-cycle assurance .50
7.11.1 Life-cycle assurance general requirements .50
7.11.2 Configuration management .51
7.11.3 Design .51
7.11.4 Finite state model .51
7.11.5 Development .52
7.11.6 Vendor testing .53
7.11.7 Delivery and operation .54
7.11.8 End of life .54
7.11.9 Guidance documents .54
7.12 Mitigation of other attacks .55
Annex A (normative) Documentation requirements .56
A.1 Purpose .56
A.2 Items .56
A.2.1 General .56
A.2.2 Cryptographic module specification .56
A.2.3 Cryptographic module interfaces .57
A.2.4 Roles, services, and authentication .57
A.2.5 Software/Firmware security .57
A.2.6 Operational environment .58
A.2.7 Physical security .58
A.2.8 Non-invasive security .58
A.2.9 Sensitive security parameter management .58
A.2.10 Self-tests .59
A.2.11 Life-cycle assurance .60
A.2.12 Mitigation of other attacks .61
Annex B (normative) Cryptographic module security policy .62
B.1 General .62
B.2 Items .62
B.2.1 General .62
B.2.2 Cryptographic module specification .62
B.2.3 Cryptographic module interfaces .63
B.2.4 Roles, services, and authentication .63
B.2.5 Software/Firmware security .64
B.2.6 Operational environment .64
B.2.7 Physical security .64
B.2.8 Non-invasive security .65
B.2.9 Sensitive security parameters management .65
B.2.10 Self-tests .66
B.2.11 Life-cycle assurance .66
B.2.12 Mitigation of other attacks .66
Annex C (normative) Approved security functions .67
C.1 Purpose .67
C.1.1 Block ciphers .67
C.1.2 Stream ciphers .67
C.1.3 Asymmetric algorithms and techniques .67
C.1.4 Message authentication codes.67
C.1.5 Hash functions .67
C.1.6 Entity authentication .68
iv © ISO/IEC 2012 – All rights reserved

---------------------- Page: 10 ----------------------
SIST EN ISO/IEC 19790:2020
ISO/IEC 19790:2012(E)
C.1.7 Key management .68
C.1.8 Random bit generation .68
Annex D (normative) Approved sensitive security parameter generation and establishment methods69
D.1 Purpose .69
D.1.1 Sensitive security parameter generation .69
D.1.2 Sensitive security parameter establishment methods .69
Annex E (normative) Approved authentication mechanisms .70
E.1 Purpose .70
E.1.1 Authentication mechanisms .70
Annex F (normative) Approved non-invasive attack mitigation test metrics .71
F.1 Purpose .71
F.1.1 Non-invasive attack mitigation test metrics .71

© ISO/IEC 2012 – All rights reserved v

---------------------- Page: 11 ----------------------
SIST EN ISO/IEC 19790:2020
ISO/IEC 19790:2012(E)
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) form
the specialized system for worldwide standardization. National bodies that are members of ISO or IEC participate in the
development of International Standards through technical committees established by the respective organization to deal
with particular fields of technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other
international organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the work.
In the field of information technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1.
The procedures used to develop this document and those intended for its further maintenance are described in the
ISO/IEC Directives, Part 1. In particular the different approval criteria needed for the different types of document should
be noted. This document was drafted in accordance with the editorial rules of the ISO/IEC Directives, Part 2
(see www.iso.org/directives).
Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. ISO
and IEC shall not be held responsible for identifying any or all such patent rights. Details of any patent rights identified
during the development of the document will be in the Introduction and/or on the ISO list of patent declarations received
(see www.iso.org/patents).
Any trade name used in this document is information given for the convenience of users and does not constitute an
endorsement.
For an explanation on the meaning of ISO specific terms and expressions related to conformity assessment, as well as
information about ISO's adherence to the WTO principles in the Technical Barriers to Trade (TBT) see the following
URL: Foreword - Supplementary information
Technical corrigendum 1 to ISO/IEC 19790:2012 was prepared by Joint Technical Committee ISO/IEC JTC 1,
Information technology, Subcommittee SC 27, Security techniques.
This corrected version of Technical corrigendum 1 to ISO/IEC 19790:2012 cancels and replaces the first edition
(ISO/IEC 19790:2012/Cor 1:2015), incorporating the same technical revisions and miscellaneous editorial corrections
showing in red text instead of black underlining:
 3.21: The term "cryptographic boundary" is corrected;
 3.80: The term "non-security relevant" is corrected;
 3.108: The term "self-test" is corrected;
 7.2.2: The requirements [02.04], [02.05] and [02.06] are corrected;
 7.2.4.3: The requirement [02.31] is corrected;
 7.3.3: The requirement [03.14] is corrected;
 7.5: The requirements [05.06] and [05.07] are added. The requirements [05.08], [05.13] and [05.17] through
[05.23] are corrected;
 7.6.3: The requirement [06.06] is corrected;
vi © ISO/IEC 2012 – All rights reserved

---------------------- Page: 12 ----------------------
SIST EN ISO/IEC 19790:2020
ISO/IEC 19790:2012(E)
 7.8: The requirement [08.04] is corrected;
 7.9.1: The requirement [09.04] is corrected;
 7.9.7: The requirement [09.37] is corrected;
 7.10.2.2: The requirement [10.17] is corrected;
 7.11.5: The requirement [11.26] is corrected;
 7.11.7: The requirement [11.35] is corrected;
 7.11.9: The requirement [11.38] is corrected;
st nd
 A.2.5: The requirements of the 1 and 2 bullets are corrected;
 A.2.7: The requirement of the 3rd bullet is corrected;
 A.2.10: The requirement of the 4th bullet is corrected;
th
 B.2.4: The requirement of the 9 bullet is corrected;
st
 B.2.5: The requirement of the 1 bullet is corrected;
 B.2.7: The requirement of the 2nd level 6th bullet is corrected;
 D.1: Duplicate text is removed;
 D.1.2: The reference to ISO/IEC 15946-3 is removed;
 E.1: Duplicate text is removed; and
 F.1: Duplicate text is removed.
© ISO/IEC 2012 – All rights reserved vii

---------------------- Page: 13 ----------------------
SIST EN ISO/IEC 19790:2020
ISO/IEC 19790:2012(E)
Introduction
In Information Technology there is an ever-increasing need to use cryptographic mechanisms such as the protection of
data against unauthorised disclosure or manipulation, for entity authentication and for non-repudiation. The security and
reliability of such mechanisms are directly dependent on the cryptographic modules in which they are implemented.
This International Standard provides for four increasing, qualitative levels of security requirements intended to cover a
wide range of potential applications and environments. The cryptographic techniques are identical over the four security
levels. The security requirements cover areas relative to the design and implementation of a cryptographic module.
These areas include cryptographic module specification; cryptographic module interfaces; roles, services, and
authentication; software/firmware security; operational environment; physical security; non-invasive security; sensitive
security parameter management; self-tests; life-cycle assurance; and mitigation of other attacks.

The overall security rating of a cryptographic module must be chosen to provide a level of security appropriate for the
security requirements of the application and environment in which the module is to be utilised and for the security
services that the module is to provide. The responsible authority in each organization should ensure that their computer
and telecommunication systems that utilise cryptographic modules provide an acceptable level of security for the given
application and environment. Since each authority is responsible for selecting which approved security functions are
appropriate for a given application, compliance with this International Standard does not imply either full interoperability
or mutual acceptance of compliant products. The importance of security awareness and of making information security a
management priority should be communicated to all concerned.
Information security requirements vary for different applications; organizations should identify their information resources
and determine the sensitivity to and the potential impact of a loss by implementing appropriate controls. Controls
include, but are not limited to:
 physical and environmental controls;
 access controls;
 software development;
 backup and contingency plans; and
 information and data controls.
These controls are only as effective as the administration of appropriate security policies and procedures within the
operational environment.
viii © ISO/IEC 2012 – All rights reserved

---------------------- Page: 14 ----------------------
SIST EN ISO/IEC 19790:2020
INTERNATIONAL STANDARD ISO/IEC 19790:2012(E)
Information technology — Security techniques — Security
requ
...

SLOVENSKI STANDARD
oSIST prEN ISO/IEC 19790:2020
01-januar-2020
Informacijska tehnologija - Varnostne tehnike - Varnostne zahteve za kriptografske
module (ISO/IEC 19790:2012)
Information technology - Security techniques - Security requirements for cryptographic
modules (ISO/IEC 19790:2012)
Informationstechnik - Sicherheitstechniken - Sicherheitsanforderungen für
kryptografische Module (ISO/IEC 19790:2012)
Technologies de l'information - Techniques de sécurité - Exigences de sécurité pour les
modules cryptographiques (ISO/IEC 19790:2012)
Ta slovenski standard je istoveten z: prEN ISO/IEC 19790
ICS:
35.030 Informacijska varnost IT Security
oSIST prEN ISO/IEC 19790:2020 en
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

---------------------- Page: 1 ----------------------
oSIST prEN ISO/IEC 19790:2020

---------------------- Page: 2 ----------------------
oSIST prEN ISO/IEC 19790:2020
INTERNATIONAL ISO/IEC
STANDARD 19790
Second edition
2012-08-15
Corrected version
2015-12-15
Information technology — Security
techniques — Security requirements
for cryptographic modules
Technologies de l’information — Techniques de sécurité — Exigences
de sécurité pour les modules cryptographiques
Reference number
ISO/IEC 19790:2012(E)
©
ISO/IEC 2012

---------------------- Page: 3 ----------------------
oSIST prEN ISO/IEC 19790:2020
ISO/IEC 19790:2012(E)

COPYRIGHT PROTECTED DOCUMENT
© ISO/IEC 2012, Published in Switzerland
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized otherwise in any form
or by any means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior
written permission. Permission can be requested from either ISO at the address below or ISO’s member body in the country of
the requester.
ISO copyright office
Ch. de Blandonnet 8 • CP 401
CH-1214 Vernier, Geneva, Switzerland
Tel. +41 22 749 01 11
Fax +41 22 749 09 47
copyright@iso.org
www.iso.org
ii © ISO/IEC 2012 – All rights reserved

---------------------- Page: 4 ----------------------
oSIST prEN ISO/IEC 19790:2020
ISO/IEC 19790:2012(E)
Contents Page
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
4 Abbreviated terms .15
5 Cryptographic module security levels .15
5.1 Security Level 1 .15
5.2 Security Level 2 .16
5.3 Security Level 3 .16
5.4 Security Level 4 .17
6 Functional security objectives .17
7 Security requirements .18
7.1 General .18
7.2 Cryptographic module specification .20
7.2.1 Cryptographic module specification general requirements .20
7.2.2 Types of cryptographic modules .20
7.2.3 Cryptographic boundary .21
7.2.4 Modes of operations .22
7.3 Cryptographic module interfaces .23
7.3.1 Cryptographic module interfaces general requirements .23
7.3.2 Types of interfaces .24
7.3.3 Definition of interfaces .24
7.3.4 Trusted channel .25
7.4 Roles, services, and authentication .25
7.4.1 Roles, services, and authentication general requirements .25
7.4.2 Roles .26
7.4.3 Services .26
7.4.4 Authentication .28
7.5 Software/Firmware security .29
7.6 Operational environment .31
7.6.1 Operational environment general requirements .31
7.6.2 Operating system requirements for limited or non-modifiable operational environments .33
7.6.3 Operating system requirements for modifiable operational environments .33
7.7 Physical security .35
7.7.1 Physical security embodiments .35
7.7.2 Physical security general requirements .37
7.7.3 Physical security requirements for each physical security embodiment .39
7.7.4 Environmental failure protection/testing .42
7.8 Non-invasive security .43
7.9 Sensitive security parameter management .44
7.9.1 Sensitive security parameter management general requirements.44
7.9.2 Random bit generators .44
7.9.3 Sensitive security parameter generation .44
7.9.4 Sensitive security parameter establishment .45
7.9.5 Sensitive security parameter entry and output .45
7.9.6 Sensitive security parameter storage .46
© ISO/IEC 2012 – All rights reserved iii

---------------------- Page: 5 ----------------------
oSIST prEN ISO/IEC 19790:2020
ISO/IEC 19790:2012(E)
7.9.7 Sensitive security parameter zeroisation .46
7.10 Self-tests .47
7.10.1 Self-test general requirements .47
7.10.2 Pre-operational self-tests .47
7.10.3 Conditional self-tests .48
7.11 Life-cycle assurance .50
7.11.1 Life-cycle assurance general requirements .50
7.11.2 Configuration management .51
7.11.3 Design .51
7.11.4 Finite state model .51
7.11.5 Development .52
7.11.6 Vendor testing .53
7.11.7 Delivery and operation .54
7.11.8 End of life .54
7.11.9 Guidance documents .54
7.12 Mitigation of other attacks .55
Annex A (normative) Documentation requirements .56
A.1 Purpose .56
A.2 Items .56
A.2.1 General .56
A.2.2 Cryptographic module specification .56
A.2.3 Cryptographic module interfaces .57
A.2.4 Roles, services, and authentication .57
A.2.5 Software/Firmware security .57
A.2.6 Operational environment .58
A.2.7 Physical security .58
A.2.8 Non-invasive security .58
A.2.9 Sensitive security parameter management .58
A.2.10 Self-tests .59
A.2.11 Life-cycle assurance .60
A.2.12 Mitigation of other attacks .61
Annex B (normative) Cryptographic module security policy .62
B.1 General .62
B.2 Items .62
B.2.1 General .62
B.2.2 Cryptographic module specification .62
B.2.3 Cryptographic module interfaces .63
B.2.4 Roles, services, and authentication .63
B.2.5 Software/Firmware security .64
B.2.6 Operational environment .64
B.2.7 Physical security .64
B.2.8 Non-invasive security .65
B.2.9 Sensitive security parameters management .65
B.2.10 Self-tests .66
B.2.11 Life-cycle assurance .66
B.2.12 Mitigation of other attacks .66
Annex C (normative) Approved security functions .67
C.1 Purpose .67
C.1.1 Block ciphers .67
C.1.2 Stream ciphers .67
C.1.3 Asymmetric algorithms and techniques .67
C.1.4 Message authentication codes.67
C.1.5 Hash functions .67
C.1.6 Entity authentication .68
iv © ISO/IEC 2012 – All rights reserved

---------------------- Page: 6 ----------------------
oSIST prEN ISO/IEC 19790:2020
ISO/IEC 19790:2012(E)
C.1.7 Key management .68
C.1.8 Random bit generation .68
Annex D (normative) Approved sensitive security parameter generation and establishment methods69
D.1 Purpose .69
D.1.1 Sensitive security parameter generation .69
D.1.2 Sensitive security parameter establishment methods .69
Annex E (normative) Approved authentication mechanisms .70
E.1 Purpose .70
E.1.1 Authentication mechanisms .70
Annex F (normative) Approved non-invasive attack mitigation test metrics .71
F.1 Purpose .71
F.1.1 Non-invasive attack mitigation test metrics .71

© ISO/IEC 2012 – All rights reserved v

---------------------- Page: 7 ----------------------
oSIST prEN ISO/IEC 19790:2020
ISO/IEC 19790:2012(E)
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) form
the specialized system for worldwide standardization. National bodies that are members of ISO or IEC participate in the
development of International Standards through technical committees established by the respective organization to deal
with particular fields of technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other
international organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the work.
In the field of information technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1.
The procedures used to develop this document and those intended for its further maintenance are described in the
ISO/IEC Directives, Part 1. In particular the different approval criteria needed for the different types of document should
be noted. This document was drafted in accordance with the editorial rules of the ISO/IEC Directives, Part 2
(see www.iso.org/directives).
Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. ISO
and IEC shall not be held responsible for identifying any or all such patent rights. Details of any patent rights identified
during the development of the document will be in the Introduction and/or on the ISO list of patent declarations received
(see www.iso.org/patents).
Any trade name used in this document is information given for the convenience of users and does not constitute an
endorsement.
For an explanation on the meaning of ISO specific terms and expressions related to conformity assessment, as well as
information about ISO's adherence to the WTO principles in the Technical Barriers to Trade (TBT) see the following
URL: Foreword - Supplementary information
Technical corrigendum 1 to ISO/IEC 19790:2012 was prepared by Joint Technical Committee ISO/IEC JTC 1,
Information technology, Subcommittee SC 27, Security techniques.
This corrected version of Technical corrigendum 1 to ISO/IEC 19790:2012 cancels and replaces the first edition
(ISO/IEC 19790:2012/Cor 1:2015), incorporating the same technical revisions and miscellaneous editorial corrections
showing in red text instead of black underlining:
 3.21: The term "cryptographic boundary" is corrected;
 3.80: The term "non-security relevant" is corrected;
 3.108: The term "self-test" is corrected;
 7.2.2: The requirements [02.04], [02.05] and [02.06] are corrected;
 7.2.4.3: The requirement [02.31] is corrected;
 7.3.3: The requirement [03.14] is corrected;
 7.5: The requirements [05.06] and [05.07] are added. The requirements [05.08], [05.13] and [05.17] through
[05.23] are corrected;
 7.6.3: The requirement [06.06] is corrected;
vi © ISO/IEC 2012 – All rights reserved

---------------------- Page: 8 ----------------------
oSIST prEN ISO/IEC 19790:2020
ISO/IEC 19790:2012(E)
 7.8: The requirement [08.04] is corrected;
 7.9.1: The requirement [09.04] is corrected;
 7.9.7: The requirement [09.37] is corrected;
 7.10.2.2: The requirement [10.17] is corrected;
 7.11.5: The requirement [11.26] is corrected;
 7.11.7: The requirement [11.35] is corrected;
 7.11.9: The requirement [11.38] is corrected;
st nd
 A.2.5: The requirements of the 1 and 2 bullets are corrected;
 A.2.7: The requirement of the 3rd bullet is corrected;
 A.2.10: The requirement of the 4th bullet is corrected;
th
 B.2.4: The requirement of the 9 bullet is corrected;
st
 B.2.5: The requirement of the 1 bullet is corrected;
 B.2.7: The requirement of the 2nd level 6th bullet is corrected;
 D.1: Duplicate text is removed;
 D.1.2: The reference to ISO/IEC 15946-3 is removed;
 E.1: Duplicate text is removed; and
 F.1: Duplicate text is removed.
© ISO/IEC 2012 – All rights reserved vii

---------------------- Page: 9 ----------------------
oSIST prEN ISO/IEC 19790:2020
ISO/IEC 19790:2012(E)
Introduction
In Information Technology there is an ever-increasing need to use cryptographic mechanisms such as the protection of
data against unauthorised disclosure or manipulation, for entity authentication and for non-repudiation. The security and
reliability of such mechanisms are directly dependent on the cryptographic modules in which they are implemented.
This International Standard provides for four increasing, qualitative levels of security requirements intended to cover a
wide range of potential applications and environments. The cryptographic techniques are identical over the four security
levels. The security requirements cover areas relative to the design and implementation of a cryptographic module.
These areas include cryptographic module specification; cryptographic module interfaces; roles, services, and
authentication; software/firmware security; operational environment; physical security; non-invasive security; sensitive
security parameter management; self-tests; life-cycle assurance; and mitigation of other attacks.

The overall security rating of a cryptographic module must be chosen to provide a level of security appropriate for the
security requirements of the application and environment in which the module is to be utilised and for the security
services that the module is to provide. The responsible authority in each organization should ensure that their computer
and telecommunication systems that utilise cryptographic modules provide an acceptable level of security for the given
application and environment. Since each authority is responsible for selecting which approved security functions are
appropriate for a given application, compliance with this International Standard does not imply either full interoperability
or mutual acceptance of compliant products. The importance of security awareness and of making information security a
management priority should be communicated to all concerned.
Information security requirements vary for different applications; organizations should identify their information resources
and determine the sensitivity to and the potential impact of a loss by implementing appropriate controls. Controls
include, but are not limited to:
 physical and environmental controls;
 access controls;
 software development;
 backup and contingency plans; and
 information and data controls.
These controls are only as effective as the administration of appropriate security policies and procedures within the
operational environment.
viii © ISO/IEC 2012 – All rights reserved

---------------------- Page: 10 ----------------------
oSIST prEN ISO/IEC 19790:2020
INTERNATIONAL STANDARD ISO/IEC 19790:2012(E)
Information technology — Security techniques — Security
requirements for cryptographic modules
1 Scope
This International Standard specifies the security requirements for a cryptographic module utilised
within a security system protecting sensitive information in computer and telecommunication
systems. This International Standard defines four security levels for cryptographic modules to
provide for a wide spectrum of data sensitivity (e.g. low value administrative data, million dollar
funds transfers, life protecting data, personal identity information, and sensitive information used by
government) and a diversity of application environments (e.g. a guarded facility, an office,
removable media, and a completely unprotected location). This International Standard specifies four
security levels for each of 11 requirement areas with each security level increasing security over the
preceding level.
This International Standard specifies security requirements specified intended to maintain the
security provided by a cryptographic module and compliance to this International Standard is not
sufficient to ensure that a particular module is secure or that the security provided by the module is
sufficient and acceptable to the owner of the information that is being protected.
2 Normative references
The following referenced documents are indispensable for the application of this document. For
dated references, only the edition cited applies. For undated references, the latest edition of the
referenced document (including any amendments) applies.
The documents listed in ISO/IEC 19790 Annexes C, D, E and F Information technology – Security
techniques – Security requirements for cryptographic modules.
3 Terms and definitions
For the purposes of this International Standard, the following terms and definitions apply.
3.1
access control list
ACL
list of permissions to grant access to an object
3.2
administrator guidance
written material that is used by the Crypto Officer and/or other administrative roles for the correct
configuration, maintenance, and administration of the cryptographic module
3.3
automated
without manual intervention or input (e.g. electronic means such as through a computer network)
© ISO/IEC 2012 – All rights reserved 1

---------------------- Page: 11 ----------------------
oSIST prEN ISO/IEC 19790:2020
ISO/IEC 19790:2012(E)
3.4
approval authority
any national or international organisation/authority mandated to approve and/or evaluate security functions
NOTE An approval authority in the context of this definition evaluates and approves security functions based on their
cryptographic or mathematical merits but is not the testing entity which would test for conformance to this International Standard.
3.5
approved data authentication technique
approved method that may include the use of a digital signature, message authentication code or keyed hash (e.g.
HMAC)
3.6
approved integrity technique
approved hash, message authentication code or a digital signature algorithm
3.7
approved mode of operation
set of services which includes at least one service that utilises an approved security function or process and can include
non-security relevant services
NOTE 1 Not to be confused with a specific mode of an approved security function, e.g. Cipher Block Chaining (CBC) mode
NOTE 2 Non-approved security functions or processes are excluded.
3.8
approved security function
security function (e.g. cryptographic algorithm) that is referenced in Annex C
3.9
asymmetric cryptographic technique
cryptographic technique that uses two related transformations; a public transformation (defined by the public key) and a
private transformation (defined by the private key).
NOTE The two transformations have the property that, given the public transformation, it is computationally infeasible to derive
the private transformation in a given limited time and with given computational resources.
3.10
biometric
measurable, physical characteristic or personal behavioral trait used to recognise the identity, or v
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.