How to Read the Information Provided Here
|
Assumed Users
|
Results of cryptographic protocol assessments shown in this portal site are results of execution of the tools in accordance with ISO/IEC 29128, which are intended mainly for people who design ICT systems and who use cryptographic protocols on ICT systems.
|
Information Provided Here
|
This portal site provides the following information about cryptographic protocols that have been assessed thus far.
- Overview of the subject cryptographic protocol
- Results of safety assessments made by using various tools
- Data input to the tools
- Data output from the tools
- Execution conditions for the assessments
- Alternative methods for cases when a possibility of attack is found
Because the information provided here include names of the tools and data that were input and output to and from the tools, reassessments by third parties are possible.
|
Points to Keep in Mind When Reading the Information
|
Even if the possibility of an attack was not found via an assessment shown on this portal site, it does not mean that there will be no attack of the protocol. The result is attributed to execution conditions and restraints of the tool.
This portal site does not guarantee the safety of cryptographic protocols as subjects of the assessments. It is aimed at showing results of assessments made by using the tools and in accordance with ISO/IEC 29128, thereby preventing ICT system designers from using cryptographic protocols that may be attacked.
|