ISO/IEC 9798-2:2019 PDF

ISO/IEC 9798-2:2019 PDF

Name:
ISO/IEC 9798-2:2019 PDF

Published Date:
06/01/2019

Status:
Active

Description:

IT Security techniques - Entity authentication - Part 2: Mechanisms using authenticated encryption

Publisher:
International Organization for Standardization/International Electrotechnical Commission

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
$37.2
Need Help?

ISO/IEC 9798-2:2019 specifies entity authentication mechanisms using authenticated encryption algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third party is involved; two of these are mechanisms to unilaterally authenticate one entity to another, while the other two are mechanisms for mutual authentication of two entities. The remaining mechanisms require an on-line trusted third party for the establishment of a common secret key. They also realize mutual or unilateral entity authentication.

Annex A defines Object Identifiers for the mechanisms specified in this document.


Edition : 4th
File Size : 1 file , 1.7 MB
Note : This product is unavailable in Russia, Ukraine, Belarus
Number of Pages : 20
Published : 06/01/2019
Same As : ISO/IEC 9798-2:2019

History

ISO/IEC 9798-2:2019
Published Date: 06/01/2019
IT Security techniques - Entity authentication - Part 2: Mechanisms using authenticated encryption
$37.2
ISO/IEC 9798-2 Ed. 1.0 en CORR2:2012
Published Date: 03/05/2012
Corrigendum 2 - Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms -
Free Download
ISO/IEC 9798-2 Ed. 1.0 en CORR1:2010
Published Date: 02/05/2010
Corrigendum 1 - Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms -
Free Download
ISO/IEC 9798-2:2008
Published Date: 12/15/2008
Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms
$30.9
ISO/IEC 9798-2:2008/Cor3:2013
Published Date: 02/15/2008
Corrigendum
Free Download
ISO/IEC 9798-2 Ed. 1.0 en CORR1:2004
Published Date: 01/20/2004
Corrigendum 1 - Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms -
Free Download
ISO/IEC 9798-2:1999
Published Date: 07/01/1999
Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms
$21.9

Related products

ISO/IEC 9798-5:2009
Published Date: 12/15/2009
Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques
$75
ISO/IEC 27000:2018
Published Date: 02/01/2018
Information technology - Security techniques - Information security management systems - Overview and vocabulary
$58.2
ISO/IEC 20008-2:2013
Published Date: 11/15/2013
Information technology - Security techniques - Anonymous digital signatures - Part 2: Mechanisms using a group public key
$83.4

Best-Selling Products

GMSA CAPG 0113
Published Date: 10/01/2012
Suspension Subjective Evaluation Procedure
$23.4
GMSA CAPG 0118
Published Date: 08/01/2013
New Tire Breaking-in Procedure
$12.9
GMSA CAPG 0118
Published Date: 08/01/2003
New Tire Breaking-in Procedure
GMSA CAPG 0151
Published Date: 08/01/2003
Vehicle Electrical System Subjective Evaluation
GMSA CAPG 0151
Published Date: 05/01/2010
Vehicle Electrical System Subjective Evaluation
GMSA CAPG 2149
Published Date: 02/01/2012
Front Suspension Lateral Impact – Curb Test