This document specifies entity authentication mechanisms using authenticated encryption algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third party is involved; two of these are mechanisms to unilaterally authenticate one entity to another, while the other two are mechanisms for mutual authentication of two entities. The remaining mechanisms require an on-line trusted third party for the establishment of a common secret key. They also realize mutual or unilateral entity authentication.
Annex A defines Object Identifiers for the mechanisms specified in this document.
Status: PublishedPublication date: 2019-06
Edition: 4Number of pages: 15
Technical Committee: ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection
- ICS :
- 35.030 IT Security
Buy this standard
|std 1 92||PDF + ePub|
|std 2 92||Paper|
ISO/IEC 9798-2:2008/Cor 1:2010Withdrawn
ISO/IEC 9798-2:2008/Cor 2:2012Withdrawn
ISO/IEC 9798-2:2008/Cor 3:2013
ISO/IEC 9798-2:2019Stage: 60.60
Got a question?
Check out our FAQs
Monday to Friday - 09:00-12:00, 14:00-17:00 (UTC+1)
Keep up to date with ISO
Sign up to our newsletter for the latest news, views and product information.