Cryptography

Get Started. It's Free
or sign up with your email address
Cryptography by Mind Map: Cryptography

1. ioXt Alliance

1.1. Mobile Application Profile

1.1.1. 4.3. Proven Cryptography PC1

1.1.2. 4.3. Proven Cryptography PC2

1.1.3. 4.3. Proven Cryptography PC103

1.1.4. 4.5. Verified Software VS3

1.1.5. 4.7. Secured Interfaces SI101

1.1.6. 4.7. Secured Interfaces SI104

2. US National Institute of Standards and Technology (NIST)

2.1. NIST Special Publication 800-163 Revision 1

2.1.1. 2.2 Organization-Specific Requirements Digital Signature

2.2. NIST Special Publication 800-190

2.2.1. 4.1.4 Embedded clear text secrets

3. Open Web Application Security Project (OWASP)

3.1. Mobile Application Security Verification Standard (MASVS)

3.1.1. 3.1 MSTG-CRYPTO-1

3.1.2. 3.2 MSTG-CRYPTO-2

3.1.3. 3.3 MSTG-CRYPTO-3

3.1.4. 3.4 MSTG-CRYPTO-4

3.1.5. 3.5 MSTG-CRYPTO-5

3.1.6. 3.6 MSTG-CRYPTO-6

3.1.7. 5.2 MSTG-NETWORK-2

3.1.8. 7.1 MSTG-CODE-1

3.2. Application Security Verification Standard 4.0.3 (ASVS)

3.2.1. V1.6 Cryptographic Architecture

3.2.2. V2.8 One Time Verifier

3.2.3. V2.9 Cryptographic Verifier

3.2.4. V3.2 Session Binding

3.2.5. V6.2 Algorithms

3.2.6. V6.3 Random Values

3.2.7. V6.4 Secret Management

3.2.8. V8.3 Sensitive Private Data

3.2.9. V9.1 Client Communication Security

3.2.10. V9.2 Server Communication Security

4. APPLE

4.1. Developer Security

4.1.1. Secure Data Preventing Insecure Network Connections Overview

4.1.2. Cryptography Complying with Encryption Export Regulations Overview

4.1.3. Cryptography Complying with Encryption Export Regulations Declare Your App’s Use of Encryption

4.1.4. Cryptography Complying with Encryption Export Regulations Provide Compliance Documentation

4.1.5. Cryptography Certificate, Key, and Trust Services Overview

4.1.6. Cryptography Cryptographic Message Syntax Services Overview

4.1.7. Cryptography Randomization Services Overview

4.1.8. Cryptography Security Transforms Overview

4.1.9. Cryptography Security Transforms Overview

4.1.10. Legacy Interfaces Secure Transport Overview

5. GOOGLE

5.1. Core app quality

5.1.1. SC-N1

5.1.2. SC-C1

6. National Information Assurance Partnership (NIAP)

6.1. Requirements for Vetting Mobile Apps from the Protection Profile for Application Software

6.1.1. Random Bit Generation Services FCS_RBG_EXT.1.1

6.1.2. Integrity for Installation and Update FPT_TUD_EXT.1.6

6.1.3. Random Bit Generation from Application FCS_RBG_EXT.2.1

6.1.4. Random Bit Generation from Application FCS_RBG_EXT.2.2

6.1.5. Cryptographic Key Generation Services FCS_CKM_EXT.1.1

6.1.6. Cryptographic Asymmetric Key Generation FCS_CKM.1.1(1)

6.1.7. Cryptographic Key Establishment FCS_CKM.2.1

6.1.8. Cryptographic Operation - Encryption/Decryption FCS_COP.1.1(1)

6.1.9. Cryptographic Operation - Hashing FCS_COP.1.1(2)

6.1.10. Cryptographic Operation - Signing FCS_COP.1.1(3)

6.1.11. Cryptographic Operation - Keyed-Hash Message Authentication FCS_COP.1.1(4)

6.1.12. TLS Client Protocol FCS_TLSC_EXT.1.1

6.1.13. TLS Client Protocol FCS_TLSC_EXT.1.2

6.1.14. TLS Client Protocol FCS_TLSC_EXT.1.3

6.1.15. TLS Client Protocol FCS_TLSC_EXT.4.1

6.1.16. TLS Server Protocol FCS_TLSS_EXT.1.1

6.1.17. TLS Server Protocol FCS_TLSS_EXT.1.2

6.1.18. TLS Server Protocol FCS_TLSS_EXT.1.3

6.1.19. TLS Server Protocol FCS_TLSS_EXT.1.4

6.1.20. TLS Server Protocol FCS_TLSS_EXT.1.5

6.1.21. DTLS Implementation FCS_DTLS_EXT.1.1

6.1.22. DTLS Implementation FCS_DTLS_EXT.1.2

6.1.23. DTLS Implementation FCS_DTLS_EXT.1.3

6.1.24. HTTPS Protocol FCS_HTTPS_EXT.1.2

6.1.25. X.509 Certificate Validation FIA_X509_EXT.1.1

6.1.26. X.509 Certificate Validation FIA_X509_EXT.1.2

6.1.27. X.509 Certificate Authentication FIA_X509_EXT.2.1

6.1.28. X.509 Certificate Authentication FIA_X509_EXT.2.2

6.1.29. TLS Client Protocol FCS_TLSC_EXT.3.1

6.1.30. Cryptographic Symmetric Key Generation FCS_CKM.1.1(2)

6.1.31. TLS Client Protocol FCS_TLSC_EXT.2.1

7. UK National Cyber Security Centre (NCSC)

7.1. Application development Recommendations

7.1.1. Secure data handling Cryptography