ISO/IEC 9798-2:2008 PDF

ISO/IEC 9798-2:2008 PDF

Name:
ISO/IEC 9798-2:2008 PDF

Published Date:
12/15/2008

Status:
Active

Description:

Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms

Publisher:
International Organization for Standardization/International Electrotechnical Commission

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
$30.9
Need Help?

ISO/IEC 9798-2:2008 specifies entity authentication mechanisms using symmetric encipherment algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third party is involved; two of these are mechanisms to unilaterally authenticate one entity to another, while the other two are mechanisms for mutual authentication of two entities. The remaining mechanisms require a trusted third party for the establishment of a common secret key, and realize mutual or unilateral entity authentication.

The mechanisms specified in ISO/IEC 9798-2:2008 use time variant parameters such as time stamps, sequence numbers, or random numbers to prevent valid authentication information from being accepted at a later time or more than once.

If no trusted third party is involved and a time stamp or sequence number is used, one pass is needed for unilateral authentication, while two passes are needed to achieve mutual authentication. If no trusted third party is involved and a challenge and response method employing random numbers is used, two passes are needed for unilateral authentication, while three passes are required to achieve mutual authentication. If a trusted third party is involved, any additional communication between an entity and the trusted third party requires two extra passes in the communication exchange.


File Size : 1 file , 240 KB
Note : This product is unavailable in Russia, Ukraine, Belarus
Published : 12/15/2008
Same As : ISO/IEC 9798-2:2008

History

ISO/IEC 9798-2:2019
Published Date: 06/01/2019
IT Security techniques - Entity authentication - Part 2: Mechanisms using authenticated encryption
$37.2
ISO/IEC 9798-2 Ed. 1.0 en CORR2:2012
Published Date: 03/05/2012
Corrigendum 2 - Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms -
Free Download
ISO/IEC 9798-2 Ed. 1.0 en CORR1:2010
Published Date: 02/05/2010
Corrigendum 1 - Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms -
Free Download
ISO/IEC 9798-2:2008
Published Date: 12/15/2008
Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms
$30.9
ISO/IEC 9798-2:2008/Cor3:2013
Published Date: 02/15/2008
Corrigendum
Free Download
ISO/IEC 9798-2 Ed. 1.0 en CORR1:2004
Published Date: 01/20/2004
Corrigendum 1 - Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms -
Free Download
ISO/IEC 9798-2:1999
Published Date: 07/01/1999
Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms
$21.9

Related products

ISO/IEC 9798-1:2010
Published Date: 07/01/2010
Information technology - Security techniques - Entity authentication - Part 1: General
$24.3
ISO/IEC 13818-2:2013
Published Date: 10/01/2013
Information technology - Generic coding of moving pictures and associated audio information - Part 2: Video
$83.4
ISO/IEC 9798-3:2019
Published Date: 02/01/2019
IT Security techniques - Entity authentication - Part 3: Mechanisms using digital signature techniques
$49.8

Best-Selling Products