
ISO 20897:2022
ISO 20897:2022 Information security, cybersecurity and privacy protection – Physically unclonable functions – Part 2: Test and evaluation methods
CDN $273.00
Description
This document specifies the test and evaluation methods for physically unclonable functions (PUFs). The test and evaluation methods consist of inspection of the design rationale of the PUF and comparison between statistical analyses of the responses from a batch of PUFs or a unique PUF versus specified thresholds.
This document is related to ISO/IEC 19790 which specifies security requirements for cryptographic modules. In those modules, critical security parameters (key) and public security parameters (product serial number, identification code, etc.) are the assets to protect. PUF is one solution to avoid storing security parameters, thereby increasing the overall security of a cryptographic module.
Edition
1
Published Date
2022-05-25
Status
PUBLISHED
Pages
27
Format 
Secure PDF
Secure – PDF details
- Save your file locally or view it via a web viewer
- Viewing permissions are restricted exclusively to the purchaser
- Device limits - 3
- Printing – Enabled only to print (1) copy
See more about our Environmental Commitment
Abstract
This document specifies the test and evaluation methods for physically unclonable functions (PUFs). The test and evaluation methods consist of inspection of the design rationale of the PUF and comparison between statistical analyses of the responses from a batch of PUFs or a unique PUF versus specified thresholds.
This document is related to ISO/IEC 19790 which specifies security requirements for cryptographic modules. In those modules, critical security parameters (key) and public security parameters (product serial number, identification code, etc.) are the assets to protect. PUF is one solution to avoid storing security parameters, thereby increasing the overall security of a cryptographic module.
Previous Editions
Can’t find what you are looking for?
Please contact us at:
Related Documents
-

ISO 20008:2024 Information security – Anonymous digital signatures – Part 3: Mechanisms using multiple public keys
CDN $233.00 Add to cart -

ISO 27006:2024 Information security, cybersecurity and privacy protection – Requirements for bodies providing audit and certification of information security management systems – Part 1: General
CDN $312.00 Add to cart -

ISO 20243:2023 Information technology – Open Trusted Technology ProviderTM Standard (O-TTPS) – Part 1: Requirements and recommendations for mitigating maliciously tainted and counterfeit products
CDN $273.00 Add to cart -

ISO 27007:2020 Information security, cybersecurity and privacy protection – Guidelines for information security management systems auditing
CDN $312.00 Add to cart







