Your cart is currently empty!

ISO 9798:2019
ISO 9798:2019 IT Security techniques – Entity authentication – Part 2: Mechanisms using authenticated encryption
CDN $173.00
Description
This document specifies entity authentication mechanisms using authenticated encryption algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third party is involved; two of these are mechanisms to unilaterally authenticate one entity to another, while the other two are mechanisms for mutual authentication of two entities. The remaining mechanisms require an on-line trusted third party for the establishment of a common secret key. They also realize mutual or unilateral entity authentication.
Annex A defines Object Identifiers for the mechanisms specified in this document.
Edition
4
Published Date
2019-06-03
Status
PUBLISHED
Pages
15
Format 
Secure PDF
Secure – PDF details
- Save your file locally or view it via a web viewer
- Viewing permissions are restricted exclusively to the purchaser
- Device limits - 3
- Printing – Enabled only to print (1) copy
See more about our Environmental Commitment

Abstract
This document specifies entity authentication mechanisms using authenticated encryption algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third party is involved; two of these are mechanisms to unilaterally authenticate one entity to another, while the other two are mechanisms for mutual authentication of two entities. The remaining mechanisms require an on-line trusted third party for the establishment of a common secret key. They also realize mutual or unilateral entity authentication.
Annex A defines Object Identifiers for the mechanisms specified in this document.
Previous Editions
Can’t find what you are looking for?
Please contact us at:
Related Documents
-
ISO 20243:2023 Information technology – Open Trusted Technology ProviderTM Standard (O-TTPS) – Part 1: Requirements and recommendations for mitigating maliciously tainted and counterfeit products
0 out of 5CDN $273.00 Add to cart -
ISO 27000:2018 Information technology – Security techniques – Information security management systems – Overview and vocabulary
0 out of 5CDN $0.00 Add to cart -
ISO 27033:2023 Information technology – Network security – Part 7: Guidelines for network virtualization security
0 out of 5CDN $233.00 Add to cart -
ISO 27006:2021 Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems
0 out of 5CDN $115.00 Add to cart