
ISO 9798:2009
ISO 9798:2009 Information technology – Security techniques – Entity authentication – Part 5: Mechanisms using zero-knowledge techniques
CDN $351.00
SKU: 69be81a2ced1
Category: ICS:35.030
Description
ISO/IEC 9798-5:2009 specifies entity authentication mechanisms using zero-knowledge techniques:
- mechanisms based on identities and providing unilateral authentication;
- mechanisms based on integer factorization and providing unilateral authentication;
- mechanisms based on discrete logarithms with respect to numbers that are either prime or composite, and providing unilateral authentication;
- mechanisms based on asymmetric encryption systems and providing either unilateral authentication, or mutual authentication;
- mechanisms based on discrete logarithms on elliptic curves and providing unilateral authentication.
These mechanisms are constructed using the principles of zero-knowledge techniques, but they are not necessarily zero-knowledge according to the strict definition for every choice of parameters.
Edition
3
Published Date
2009-12-11
Status
PUBLISHED
Pages
53
Format 
Secure PDF
Secure – PDF details
- Save your file locally or view it via a web viewer
- Viewing permissions are restricted exclusively to the purchaser
- Device limits - 3
- Printing – Enabled only to print (1) copy
See more about our Environmental Commitment
Abstract
ISO/IEC 9798-5:2009 specifies entity authentication mechanisms using zero-knowledge techniques:
- mechanisms based on identities and providing unilateral authentication;
- mechanisms based on integer factorization and providing unilateral authentication;
- mechanisms based on discrete logarithms with respect to numbers that are either prime or composite, and providing unilateral authentication;
- mechanisms based on asymmetric encryption systems and providing either unilateral authentication, or mutual authentication;
- mechanisms based on discrete logarithms on elliptic curves and providing unilateral authentication.
These mechanisms are constructed using the principles of zero-knowledge techniques, but they are not necessarily zero-knowledge according to the strict definition for every choice of parameters.
Previous Editions
Can’t find what you are looking for?
Please contact us at:
Related Documents
-

ISO 27562:2024 Information technology – Security techniques – Privacy guidelines for fintech services
CDN $273.00 Add to cart -

ISO 27013:2021 Information security, cybersecurity and privacy protection – Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1
CDN $351.00 Add to cart -

ISO 27006:2021 Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems
CDN $115.00 Add to cart -

ISO 27001:2024 Information security, cybersecurity and privacy protection – Information security management systems – Requirements – Amendment 1: Climate action changes
CDN $0.00 Add to cart







