Information technology - Automatic identification and data capture techniques - Data carrier identif...
This document specifies the preamble message generated by the reader and interpretable by the receiving system, which indicates the bar code symbology or other origin of transmitted data, together with details of certain specified optional processing features associated with the data message.
This document applies to automatic identification device communication conventions and standardizes the…
Information security, cybersecurity and privacy protection - Security requirements for cryptographic...
This document specifies the security requirements for a cryptographic module utilized within a security system protecting sensitive information in Information and Communication Technologies (ICT). It defines four security levels for cryptographic modules to provide for a wide spectrum of data sensitivity and a diversity of application environments. This document specifies up to four security…
Sécurité de l’information, cybersécurité et protection de la vie privée - Exigences de sécurité pour...
Le présent document spécifie les exigences de sécurité pour un module cryptographique utilisé dans un système de sécurité qui protège les informations sensibles dans les technologies de l’information et de la communication (TIC). Il définit quatre niveaux de sécurité pour les modules cryptographiques afin de couvrir un large éventail de sensibilités des données et une diversité d’environnements d…
Sécurité de l’information, cybersécurité et protection de la vie privée — Exigences de sécurité pour...
Le présent document spécifie les exigences de sécurité pour un module cryptographique utilisé dans un système de sécurité qui protège les informations sensibles dans les technologies de l’information et de la communication (TIC). Il définit quatre niveaux de sécurité pour les modules cryptographiques afin de couvrir un large éventail de sensibilités des données et une diversité d’environnements d…
Information security, cybersecurity and privacy protection — Security requirements for cryptographic...
This document specifies the security requirements for a cryptographic module utilized within a security system protecting sensitive information in Information and Communication Technologies (ICT). It defines four security levels for cryptographic modules to provide for a wide spectrum of data sensitivity and a diversity of application environments. This document specifies up to four security…
Information security, cybersecurity and privacy protection — Test requirements for cryptographic mod...
This document specifies the methods to be used by testing laboratories to test whether the cryptographic module conforms to the requirements specified in ISO/IEC 19790:2025. The methods are developed to provide a high degree of objectivity during the testing process and to ensure consistency across the testing laboratories.
This document also specifies the information that vendors are required to…
Information security, cybersecurity and privacy protection - Test requirements for cryptographic mod...
This document specifies the methods to be used by testing laboratories to test whether the cryptographic module conforms to the requirements specified in ISO/IEC 19790:2025. The methods are developed to provide a high degree of objectivity during the testing process and to ensure consistency across the testing laboratories.
This document also specifies the information that vendors are required to…