ISO/IEC 9798-2:2019 PDF

ISO/IEC 9798-2:2019 PDF

Name:
ISO/IEC 9798-2:2019 PDF

Published Date:
06/01/2019

Status:
Active

Description:

IT Security techniques - Entity authentication - Part 2: Mechanisms using authenticated encryption

Publisher:
International Organization for Standardization/International Electrotechnical Commission

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
$37.2
Need Help?

ISO/IEC 9798-2:2019 specifies entity authentication mechanisms using authenticated encryption algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third party is involved; two of these are mechanisms to unilaterally authenticate one entity to another, while the other two are mechanisms for mutual authentication of two entities. The remaining mechanisms require an on-line trusted third party for the establishment of a common secret key. They also realize mutual or unilateral entity authentication.

Annex A defines Object Identifiers for the mechanisms specified in this document.


Edition : 4th
File Size : 1 file , 1.7 MB
Note : This product is unavailable in Russia, Ukraine, Belarus
Number of Pages : 20
Published : 06/01/2019
Same As : ISO/IEC 9798-2:2019

History

ISO/IEC 9798-2:2019
Published Date: 06/01/2019
IT Security techniques - Entity authentication - Part 2: Mechanisms using authenticated encryption
$37.2
ISO/IEC 9798-2 Ed. 1.0 en CORR2:2012
Published Date: 03/05/2012
Corrigendum 2 - Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms -
Free Download
ISO/IEC 9798-2 Ed. 1.0 en CORR1:2010
Published Date: 02/05/2010
Corrigendum 1 - Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms -
Free Download
ISO/IEC 9798-2:2008
Published Date: 12/15/2008
Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms
$30.9
ISO/IEC 9798-2:2008/Cor3:2013
Published Date: 02/15/2008
Corrigendum
Free Download
ISO/IEC 9798-2 Ed. 1.0 en CORR1:2004
Published Date: 01/20/2004
Corrigendum 1 - Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms -
Free Download
ISO/IEC 9798-2:1999
Published Date: 07/01/1999
Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms
$21.9

Related products

ISO/IEC 9798-5:2009
Published Date: 12/15/2009
Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques
$75
ISO/IEC 27000:2018
Published Date: 02/01/2018
Information technology - Security techniques - Information security management systems - Overview and vocabulary
$58.2
ISO/IEC 20008-2:2013
Published Date: 11/15/2013
Information technology - Security techniques - Anonymous digital signatures - Part 2: Mechanisms using a group public key
$83.4

Best-Selling Products

NEN NEN 1006+A1
Published Date: 06/01/2018
Algemene voorschriften voor leidingwaterinstallaties
$15.9
NEN NEN 1010
Published Date: 01/01/2020
Elektrische installaties voor laagspanning – Nederlandse implementatie van de HD-IEC 60364-reeks
$130.8
NEN NEN 1059
Published Date: 06/01/2019
Nederlandse editie op basis van NEN-EN 12186 en NEN-EN 12279 - Gasvoorzieningsystemen - Gasdrukregel- en meetstations voor transport en distributie
$26.4
NEN NEN 11298-2
Published Date: 10/01/1995
Process measurement and control devices - General methods and procedures for evaluating performance - Part 2: Test under reference conditions
$17.1
NEN NEN 2075
Published Date: 09/01/2018
Quality measuring system and process control system for cleaning performance
$19.8
NEN NEN 2767‐1+C1
Published Date: 05/01/2019
Condition assessment built environment ‐ Part 1: Methodology
$21.3