CAN/CSA-ISO/IEC 9798-5:10 (R2020) PDF

CAN/CSA-ISO/IEC 9798-5:10 (R2020) PDF

Name:
CAN/CSA-ISO/IEC 9798-5:10 (R2020) PDF

Published Date:
12/01/2010

Status:
Active

Description:

Information Technology - Security Techniques - Entity Authentication - Part 5: Mechanisms Using Zero-Knowledge Techniques (Adopted ISO/IEC 9798-5:2010, third edition, 2009-12-15)

Publisher:
Canada National Standard/Canadian Standards - ISO/IEC

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
$58.2
Need Help?
Preface:

Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the Canadian Advisory Committee (CAC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T).

This Standard supersedes CAN/CSA-ISO/IEC 9798-5-05 (adoption of ISO/IEC 9798-5:2004, second edition, 2004-12-01). At the time of publication, ISO/IEC 9798-5:2009 is available from ISO and IEC in English only. CSA will publish the French version when it becomes available from ISO and IEC.

Scope:

This part of ISO/IEC 9798 specifies entity authentication mechanisms using zero-knowledge techniques:
  • mechanisms based on identities and providing unilateral authentication
  • mechanisms based on integer factorization and providing unilateral authentication
  • mechanisms based on discrete logarithms with respect to numbers that are either prime or composite, and providing unilateral authentication
  • mechanisms based on asymmetric encryption systems and providing either unilateral authentication, or mutual authentication
  • mechanisms based on discrete logarithms on elliptic curves and providing unilateral authentication.
These mechanisms are constructed using the principles of zero-knowledge techniques, but they are not necessarily zero-knowledge according to the strict definition for every choice of parameters.
File Size : 1 file , 2.2 MB
ISBN(s) : 9781554364425
Number of Pages : 71
Product Code(s) : 2420898, 2420898
Published : 12/01/2010

History

CAN/CSA-ISO/IEC 9798-5:10 (R2020)
Published Date: 12/01/2010
Information Technology - Security Techniques - Entity Authentication - Part 5: Mechanisms Using Zero-Knowledge Techniques (Adopted ISO/IEC 9798-5:2010, third edition, 2009-12-15)
$58.2
CAN/CSA-ISO/IEC 5/5/9798
Published Date: 10/01/2005
Information Technology - Security Techniques - Entity Authentication - Part 5: Mechanisms Using Zero-Knowledge Techniques (Adopted ISO/IEC 9798-5:2004, second edition, 2004-12-01)
$50.4
CAN/CSA-ISO/IEC 5/2/9798
Published Date: 03/19/2002
Information technology - Security techniques - Entity authentication Part 5: Mechanisms using Zero knowledge techniques
$23.7

Related products

CAN/CSA-ISO/IEC 14367-00
Published Date:
Information Technology - Test Methods for Measuring Conformance to MHS-Based Electronic Messaging C Language Interfaces - Binding for Application Program Interface (API) (Adopted ISO/IEC 14367:1996, first edition, 1996-06-01)
$30

Best-Selling Products

CDM Regulations Procedual Manual
Published Date: 01/01/1999
$25.5
Dynamics of Marine Ecosystems
Published Date: 09/01/1996
$21.6
Workmanship Standards Manual
Published Date: 09/01/1997
$28.5