CAN/CSA-ISO/IEC 5/5/9798 PDF

CAN/CSA-ISO/IEC 5/5/9798 PDF

Name:
CAN/CSA-ISO/IEC 5/5/9798 PDF

Published Date:
10/01/2005

Status:
Active

Description:

Information Technology - Security Techniques - Entity Authentication - Part 5: Mechanisms Using Zero-Knowledge Techniques (Adopted ISO/IEC 9798-5:2004, second edition, 2004-12-01)

Publisher:
Canada National Standard/Canadian Standards - ISO/IEC

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
$50.4
Need Help?
CSA Preface

Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the Canadian Advisory Committee (CAC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T).

This Standard supersedes CAN/CSA-ISO/IEC 9798-5:02 (adoption of ISO/IEC 9798-5:1999).

At the time of publication, ISO/IEC 9798-5:2004 is available from ISO and IEC in English only. CSA will publish the French version when it becomes available from ISO and IEC.

1 Scope

This part of ISO/IEC 9798 specifies entity authentication mechanisms using zero-knowledge techniques. - Clause 5 specifies mechanisms (already present in the first edition, ISO/IEC 9798-4:1999) based on identities and providing unilateral authentication. They have been repaired after the withdrawal of ISO/IEC 9796:1991. - Clause 6 specifies mechanisms (inserted in this second edition) based on integer factorization and providing unilateral authentication. - Clauses 7 and 8 specify mechanisms based on discrete logarithms with respect to numbers that are either prime (see Clause 7, mechanisms already present in the first edition) or composite (see Clause 8, mechanisms inserted in the second edition), and providing unilateral authentication. - Clause 9 specifies mechanisms based on asymmetric encipherment systems and providing either unilateral (see 9.3, mechanisms already present in the first edition), or mutual (see 9.4, mechanisms inserted in the second edition) authentication.

The verifier associates the correct verification key with the claimant by any appropriate procedure, for example, by retrieving it from a certificate. Such procedures are outside the scope of this part of ISO/IEC 9798.

To identify each mechanism, Annex A specifies object identifiers in accordance with ISO/IEC 8825-1. These mechanisms are constructed using the principles of zero-knowledge techniques, but they will not be zero-knowledge according to the strict definition sketched in Annex B for every choice of parameters. Annex C compares the mechanisms and provides guidance on parameter choices. Annex D provides numerical examples.


File Size : 1 file , 900 KB
Number of Pages : 61
Published : 10/01/2005

History

CAN/CSA-ISO/IEC 9798-5:10 (R2020)
Published Date: 12/01/2010
Information Technology - Security Techniques - Entity Authentication - Part 5: Mechanisms Using Zero-Knowledge Techniques (Adopted ISO/IEC 9798-5:2010, third edition, 2009-12-15)
$58.2
CAN/CSA-ISO/IEC 5/5/9798
Published Date: 10/01/2005
Information Technology - Security Techniques - Entity Authentication - Part 5: Mechanisms Using Zero-Knowledge Techniques (Adopted ISO/IEC 9798-5:2004, second edition, 2004-12-01)
$50.4
CAN/CSA-ISO/IEC 5/2/9798
Published Date: 03/19/2002
Information technology - Security techniques - Entity authentication Part 5: Mechanisms using Zero knowledge techniques
$23.7

Related products

CAN/CSA-ISO/IEC 18033-4:13 (R2022)
Published Date: 01/01/2013
Information technology - Security techniques - Encryption algorithms - Part 4: Stream ciphers (Adopted ISO/IEC 18033-4:2011, second edition, 2011-12-15)
$60.6
CAN/CSA-ISO/IEC 11694-5:18 (R2022)
Published Date: 01/01/2018
Identification cards - Optical memory cards Part 5: Data format for information interchange for applications using ISO/IEC 11694-4 (Adopted ISO/IEC 11694-5:2014, second edition, 2014-11-01)
$29.7
CAN/CSA-ISO/IEC 23008-5:18 (R2022)
Published Date: 01/01/2018
Information technology - High efficiency coding and media delivery in heterogeneous environments - Part 5: Reference software for high efficiency video coding (Adopted ISO/IEC 23008-5:2017, second edition, 2017-02)
$12
CAN/CSA-ISO/IEC 15067-3-3:20
Published Date: 07/01/2020
Information technology - Home electronic system (HES) application model - Part 3-3: Model of a system of interacting energy management agents (EMAs) for demand-response energy management (Adopted ISO/IEC 15067-3-3:2019, first edition, 2019-10)
$48

Best-Selling Products

2019 IADC Membership Directory
Published Date: 2019
$22.5
2020 IADC Membership Directory
Published Date: 2020
$22.5
2021 IADC Membership Directory
Published Date: 2021
$22.5
2022 IADC Membership Directory
Published Date: 2022
$22.5
2023 IADC Membership Directory
Published Date: 2023
$22.5
2024 IADC Membership Directory
Published Date: 2024
$22.5