Your cart is currently empty!

ISO 9798:1999
ISO 9798:1999 Information technology – Security techniques – Entity authentication – Part 4: Mechanisms using a cryptographic check function
CDN $115.00
Description
This part of ISO/IEC 9798 specifies entity authentication mechanisms using a cryptographic check function. Two
mechanisms are concerned with the authentication of a single entity (unilateral authentication), while the remaining
are mechanisms for mutual authentication of two entities.
The mechanisms specified in this part of ISO/IEC 9798 use time variant parameters such as time stamps,
sequence numbers, or random numbers, to prevent valid authentication information from being accepted at a later
time or more than once.
If a time stamp or sequence number is used, one pass is needed for unilateral authentication, while two passes are
needed to achieve mutual authentication. If a challenge and response method employing random numbers is
used, two passes are needed for unilateral authentication, while three passes are required to achieve mutual
authentication.
Examples of cryptographic check functions are given in ISO/IEC 9797.
Edition
2
Published Date
1999-12-16
Status
PUBLISHED
Pages
7
Format 
Secure PDF
Secure – PDF details
- Save your file locally or view it via a web viewer
- Viewing permissions are restricted exclusively to the purchaser
- Device limits - 3
- Printing – Enabled only to print (1) copy
See more about our Environmental Commitment

Abstract
This part of ISO/IEC 9798 specifies entity authentication mechanisms using a cryptographic check function. Two
mechanisms are concerned with the authentication of a single entity (unilateral authentication), while the remaining
are mechanisms for mutual authentication of two entities.
The mechanisms specified in this part of ISO/IEC 9798 use time variant parameters such as time stamps,
sequence numbers, or random numbers, to prevent valid authentication information from being accepted at a later
time or more than once.
If a time stamp or sequence number is used, one pass is needed for unilateral authentication, while two passes are
needed to achieve mutual authentication. If a challenge and response method employing random numbers is
used, two passes are needed for unilateral authentication, while three passes are required to achieve mutual
authentication.
Examples of cryptographic check functions are given in ISO/IEC 9797.
Previous Editions
Can’t find what you are looking for?
Please contact us at:
Related Documents
-
ISO 27022:2021 Information technology – Guidance on information security management system processes
0 out of 5CDN $312.00 Add to cart -
ISO 27010:2015 Information technology – Security techniques – Information security management for inter-sector and inter-organizational communications
0 out of 5CDN $273.00 Add to cart -
ISO 27001:2022 Information security, cybersecurity and privacy protection – Information security management systems – Requirements
0 out of 5CDN $233.00 Add to cart -
ISO 20648:2024 Information technology – TLS specification for storage systems
0 out of 5CDN $173.00 Add to cart