ISO/IEC 9798-5:2004 PDF

ISO/IEC 9798-5:2004 PDF

Name:
ISO/IEC 9798-5:2004 PDF

Published Date:
12/01/2004

Status:
Active

Description:

Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques

Publisher:
International Organization for Standardization/International Electrotechnical Commission

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
$44.7
Need Help?

ISO/IEC 9798-5:2004 specifies authentication mechanisms in the form of exchange of information between a claimant and a verifier.

In accordance with the types of calculations that need to be performed by a claimant and the verifier (see Annex C), the mechanisms specified in ISO/IEC 9798-5:2004 can be classified into four main groups.

  • The first group is characterized by the performance of short modular exponentiations. The challenge size needs to be optimized since it has a proportional impact on workloads.
  • The second group is characterized by the possibility of a "coupon" strategy for the claimant. A verifier can authenticate a claimant without computational power. The challenge size has no impact on workloads.
  • The third group is characterized by the possibility of a "coupon" strategy for the verifier. A verifier without computational power can authenticate a claimant. The challenge size has no impact on workloads.
  • The fourth group has no possibility of a "coupon" strategy.

File Size : 1 file , 560 KB
Note : This product is unavailable in Russia, Ukraine, Belarus
Number of Pages : 50
Published : 12/01/2004

History

ISO/IEC 9798-5:2009
Published Date: 12/15/2009
Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques
$75
ISO/IEC 9798-5:2004
Published Date: 12/01/2004
Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques
$44.7

Related products

ISO/IEC 9798-1:2010
Published Date: 07/01/2010
Information technology - Security techniques - Entity authentication - Part 1: General
$24.3
ISO/IEC 9798-3:2019
Published Date: 02/01/2019
IT Security techniques - Entity authentication - Part 3: Mechanisms using digital signature techniques
$49.8

Best-Selling Products

FIPS FIPS-PUB-0 Notice 1 - Withdrawn
Published Date: 09/01/1997
GENERAL DESCRIPTION OF THE FEDERAL INFORMATION PROCESSING STANDARDS REGISTER (WITHDARWN 9/1/97) (NO S/S DOCUMENT)
$7.2
FIPS FIPS-PUB-0
Published Date: 11/01/1968
GENERAL DESCRIPTION OF THE FEDERAL INFORMATION PROCESSING STANDARDS REGISTER (WITHDARWN 9/1/97) (NO S/S DOCUMENT)
$7.2
FIPS FIPS-PUB-1-2 Notice 1 - Withdrawn
Published Date: 07/29/1997
CODE FOR INFORMATION INTERCHANGE (WITH ANSI X3.4-1977) (SUPERSEDING FIPS-PUB-1-1, FIPS-PUB-1-7, FIPS-PUB-1-15, FIPS-PUB-1-35, AND FIPS-PUB-1-36) (NO S/S DOCUMENT) (WITHDARWN 7/29/97)
$7.2
FIPS FIPS-PUB-100 Notice 1 - Withdrawn
Published Date: 11/18/1998
INTERFACE BETWEEN DATA TERMINAL EQUIPMENT (DTE) AND DATA CIRCUIT-TERMINATING EQUIPMENT (DCE) FOR OPERATION WITH PACKET-SWITCHED DATA NETWORKS (PSDN), OR BETWEEN TWO DTES, BY DEDICATED CIRCUIT (ANSI X3.100)(NO S/S DOCUMENT)
$7.2
FIPS FIPS-PUB-101 Notice 1 - Withdrawn
Published Date: 02/25/2000
GUIDELINE FOR LIFECYCLE VALIDATION, VERIFICATION, & TESTING OF COMPUTER SOFTWARE (NO S/S DOCUMENT)
$7.2
FIPS FIPS-PUB-101
Published Date: 06/06/1983
GUIDELINE FOR LIFECYCLE VALIDATION, VERIFICATION, & TESTING OF COMPUTER SOFTWARE (NO S/S DOCUMENT)
$11.4