Your cart is currently empty!

ISO 9798:2019
ISO 9798:2019 IT Security techniques – Entity authentication – Part 3: Mechanisms using digital signature techniques
CDN $233.00
Description
This document specifies entity authentication mechanisms using digital signatures based on asymmetric techniques. A digital signature is used to verify the identity of an entity.
Ten mechanisms are specified in this document. The first five mechanisms do not involve an on-line trusted third party and the last five make use of on-line trusted third parties. In both of these two categories, two mechanisms achieve unilateral authentication and the remaining three achieve mutual authentication.
Annex A defines the object identifiers assigned to the entity authentication mechanisms specified in this document.
Edition
3
Published Date
2019-01-30
Status
PUBLISHED
Pages
25
Format 
Secure PDF
Secure – PDF details
- Save your file locally or view it via a web viewer
- Viewing permissions are restricted exclusively to the purchaser
- Device limits - 3
- Printing – Enabled only to print (1) copy
See more about our Environmental Commitment

Abstract
This document specifies entity authentication mechanisms using digital signatures based on asymmetric techniques. A digital signature is used to verify the identity of an entity.
Ten mechanisms are specified in this document. The first five mechanisms do not involve an on-line trusted third party and the last five make use of on-line trusted third parties. In both of these two categories, two mechanisms achieve unilateral authentication and the remaining three achieve mutual authentication.
Annex A defines the object identifiers assigned to the entity authentication mechanisms specified in this document.
Previous Editions
Can’t find what you are looking for?
Please contact us at:
Related Documents
-
ISO 20243:2023 Information technology – Open Trusted Technology ProviderTM Standard (O-TTPS) – Part 1: Requirements and recommendations for mitigating maliciously tainted and counterfeit products
0 out of 5CDN $273.00 Add to cart -
ISO 20008:2024 Information security – Anonymous digital signatures – Part 3: Mechanisms using multiple public keys
0 out of 5CDN $233.00 Add to cart -
ISO 18180:2013 Information technology – Specification for the Extensible Configuration Checklist Description Format (XCCDF) Version 1.2
0 out of 5CDN $0.00 Add to cart -
ISO 27010:2015 Information technology – Security techniques – Information security management for inter-sector and inter-organizational communications
0 out of 5CDN $273.00 Add to cart