Abstract
PreviewThis document specifies entity authentication mechanisms using digital signatures based on asymmetric techniques. A digital signature is used to verify the identity of an entity.
Ten mechanisms are specified in this document. The first five mechanisms do not involve an on-line trusted third party and the last five make use of on-line trusted third parties. In both of these two categories, two mechanisms achieve unilateral authentication and the remaining three achieve mutual authentication.
Annex A defines the object identifiers assigned to the entity authentication mechanisms specified in this document.
-
Status: PublishedPublication date: 2019-01
-
Edition: 3Number of pages: 25
-
Technical Committee: ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection
-
- ICS :
- 35.030 IT Security
Buy this standard
en
Format | Language | |
---|---|---|
std 1 124 | PDF + ePub | |
std 2 124 | Paper |
- CHF124
Life cycle
-
Previously
WithdrawnISO/IEC 9798-3:1998
WithdrawnISO/IEC 9798-3:1998/Amd 1:2010
WithdrawnISO/IEC 9798-3:1998/Cor 1:2009
WithdrawnISO/IEC 9798-3:1998/Cor 2:2012
-
Now
Got a question?
Check out our FAQs
Customer care
+41 22 749 08 88
Opening hours:
Monday to Friday - 09:00-12:00, 14:00-17:00 (UTC+1)