Iso/iec 24759:2025 Today
Aliya grabbed a red pen and flipped to the back of the 24759:2025 standard—the section no one reads: Informative Annex M – Case Studies of Test Failures . She wrote in the margin:
By 2028, every cryptographic module submitted for validation had to include a “24759:2025 conformance pedigree.” The Kalshira name became a verb in security audits: “Don’t Kalshira your RNG testing.” iso/iec 24759:2025
Now, a state actor had weaponized that drift. Aliya grabbed a red pen and flipped to
2027
Dr. Aliya Voss, the GCA’s chief validation architect, stared at the logs. The modules in question were certified against the 2022 version of ISO/IEC 24759. At the time, they were gold standard. But the new 2025 revision—published just six months ago—had warned of exactly this vulnerability: a class of side-channel timing attacks that exploited speculative execution in post-quantum key encapsulation mechanisms. Aliya Voss, the GCA’s chief validation architect, stared
The breached modules? They used an older RNG test. They’d passed 24759:2017. They failed 24759:2025’s extended entropy continuity test—a test that simulated 10⁹ power cycles and looked for drift in noise sources.
