ISO/IEC 9798-2:2019 PDF

ISO/IEC 9798-2:2019 PDF

Name:
ISO/IEC 9798-2:2019 PDF

Published Date:
06/01/2019

Status:
Active

Description:

IT Security techniques - Entity authentication - Part 2: Mechanisms using authenticated encryption

Publisher:
International Organization for Standardization/International Electrotechnical Commission

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
$37.2
Need Help?

ISO/IEC 9798-2:2019 specifies entity authentication mechanisms using authenticated encryption algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third party is involved; two of these are mechanisms to unilaterally authenticate one entity to another, while the other two are mechanisms for mutual authentication of two entities. The remaining mechanisms require an on-line trusted third party for the establishment of a common secret key. They also realize mutual or unilateral entity authentication.

Annex A defines Object Identifiers for the mechanisms specified in this document.


Edition : 4th
File Size : 1 file , 1.7 MB
Note : This product is unavailable in Russia, Ukraine, Belarus
Number of Pages : 20
Published : 06/01/2019
Same As : ISO/IEC 9798-2:2019

History

ISO/IEC 9798-2:2019
Published Date: 06/01/2019
IT Security techniques - Entity authentication - Part 2: Mechanisms using authenticated encryption
$37.2
ISO/IEC 9798-2 Ed. 1.0 en CORR2:2012
Published Date: 03/05/2012
Corrigendum 2 - Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms -
Free Download
ISO/IEC 9798-2 Ed. 1.0 en CORR1:2010
Published Date: 02/05/2010
Corrigendum 1 - Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms -
Free Download
ISO/IEC 9798-2:2008
Published Date: 12/15/2008
Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms
$30.9
ISO/IEC 9798-2:2008/Cor3:2013
Published Date: 02/15/2008
Corrigendum
Free Download
ISO/IEC 9798-2 Ed. 1.0 en CORR1:2004
Published Date: 01/20/2004
Corrigendum 1 - Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms -
Free Download
ISO/IEC 9798-2:1999
Published Date: 07/01/1999
Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms
$21.9

Related products

ISO/IEC 9798-5:2009
Published Date: 12/15/2009
Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques
$75
ISO/IEC 27000:2018
Published Date: 02/01/2018
Information technology - Security techniques - Information security management systems - Overview and vocabulary
$58.2
ISO/IEC 20008-2:2013
Published Date: 11/15/2013
Information technology - Security techniques - Anonymous digital signatures - Part 2: Mechanisms using a group public key
$83.4

Best-Selling Products

ISO/IWA 1:2005
Published Date: 10/01/2005
Quality management systems - Guidelines for process improvements in health service organizations
$39.6
ISO/IWA 11:2012
Published Date: 2012
Guidelines for evaluating cookstove performance
$13.5
ISO/IWA 12:2013
Published Date: 12/15/2013
Guidelines on the application of ISO 9001:2008 in policing organizations
$55.5
ISO/IWA 13:2014
Published Date: 11/15/2014
Multiple resource evaluation guideline
$23.1
ISO/IWA 14-1:2013
Published Date: 11/15/2013
Vehicle security barriers - Part 1: Performance requirement, vehicle impact test method and performance rating
$63
ISO/IWA 14-2:2013
Published Date: 11/15/2013
Vehicle security barriers - Part 2: Application
$71.1