Your cart is currently empty!
“ISO 27013:2024 Information security, cybersecurity and privacy protection – Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 – Amendment 1” has been added to your cart. View cart

ISO 9798:2009
ISO 9798:2009 Information technology – Security techniques – Entity authentication – Part 5: Mechanisms using zero-knowledge techniques
CDN $351.00
SKU: 69be81a2ced1
Category: ICS:35.030
Description
ISO/IEC 9798-5:2009 specifies entity authentication mechanisms using zero-knowledge techniques:
- mechanisms based on identities and providing unilateral authentication;
- mechanisms based on integer factorization and providing unilateral authentication;
- mechanisms based on discrete logarithms with respect to numbers that are either prime or composite, and providing unilateral authentication;
- mechanisms based on asymmetric encryption systems and providing either unilateral authentication, or mutual authentication;
- mechanisms based on discrete logarithms on elliptic curves and providing unilateral authentication.
These mechanisms are constructed using the principles of zero-knowledge techniques, but they are not necessarily zero-knowledge according to the strict definition for every choice of parameters.
Edition
3
Published Date
2009-12-11
Status
PUBLISHED
Pages
53
Format 
Secure PDF
Secure – PDF details
- Save your file locally or view it via a web viewer
- Viewing permissions are restricted exclusively to the purchaser
- Device limits - 3
- Printing – Enabled only to print (1) copy
See more about our Environmental Commitment

Abstract
ISO/IEC 9798-5:2009 specifies entity authentication mechanisms using zero-knowledge techniques:
- mechanisms based on identities and providing unilateral authentication;
- mechanisms based on integer factorization and providing unilateral authentication;
- mechanisms based on discrete logarithms with respect to numbers that are either prime or composite, and providing unilateral authentication;
- mechanisms based on asymmetric encryption systems and providing either unilateral authentication, or mutual authentication;
- mechanisms based on discrete logarithms on elliptic curves and providing unilateral authentication.
These mechanisms are constructed using the principles of zero-knowledge techniques, but they are not necessarily zero-knowledge according to the strict definition for every choice of parameters.
Previous Editions
Can’t find what you are looking for?
Please contact us at:
Related Documents
-
ISO 20009:2022 Information security – Anonymous entity authentication – Part 3: Mechanisms based on blind signatures
0 out of 5CDN $173.00 Add to cart -
ISO 27003:2017 Information technology – Security techniques – Information security management systems – Guidance
0 out of 5CDN $312.00 Add to cart -
ISO 27557:2022 Information security, cybersecurity and privacy protection – Application of ISO 31000:2018 for organizational privacy risk management
0 out of 5CDN $233.00 Add to cart -
ISO 27013:2024 Information security, cybersecurity and privacy protection – Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 – Amendment 1
0 out of 5CDN $32.00 Add to cart