Abstract
PreviewThis document specifies entity authentication mechanisms using authenticated encryption algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third party is involved; two of these are mechanisms to unilaterally authenticate one entity to another, while the other two are mechanisms for mutual authentication of two entities. The remaining mechanisms require an on-line trusted third party for the establishment of a common secret key. They also realize mutual or unilateral entity authentication.
Annex A defines Object Identifiers for the mechanisms specified in this document.
-
Status: PublishedPublication date: 2019-06
-
Edition: 4Number of pages: 15
-
Technical Committee: ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection
-
- ICS :
- 35.030 IT Security
Buy this standard
Format | Language | |
---|---|---|
std 1 92 | PDF + ePub | |
std 2 92 | Paper |
- CHF92
Life cycle
-
Previously
WithdrawnISO/IEC 9798-2:2008
WithdrawnISO/IEC 9798-2:2008/Cor 1:2010
WithdrawnISO/IEC 9798-2:2008/Cor 2:2012
WithdrawnISO/IEC 9798-2:2008/Cor 3:2013
-
Now
Got a question?
Check out our FAQs
Opening hours:
Monday to Friday - 09:00-12:00, 14:00-17:00 (UTC+1)
Keep up to date with ISO
Sign up to our newsletter for the latest news, views and product information.