• Shopping Cart
    There are no items in your cart

08/30169502 DC : 0

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by

BS ISO/IEC 9798-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO KNOWLEDGE TECHNIQUES

Available format(s)

Hardcopy , PDF

Superseded date

28-02-2010

Superseded by

BS ISO/IEC 9798-5:2009

Language(s)

English

€23.37
Excluding VAT

Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 Mechanisms based on identities
   5.1 Security requirements for the environment
   5.2 Key production
   5.3 Unilateral authentication exchange
6 Mechanisms based on integer factorization
   6.1 Security requirements for the environment
   6.2 Key production
   6.3 Unilateral authentication exchange
7 Mechanisms based on discrete logarithms with respect to
   prime numbers
   7.1 Security requirements for the environment
   7.2 Key production
   7.3 Unilateral authentication exchange
8 Mechanisms based on discrete logarithms with respect to
   composite numbers
   8.1 Security requirements for the environment
   8.2 Key production
   8.3 Unilateral authentication exchange
9 Mechanisms based on asymmetric encryption systems
   9.1 Security requirements for the environment
   9.2 Unilateral authentication exchange
   9.3 Mutual authentication exchange
10 Mechanism based on elliptic curve discrete logarithms
   10.1 Security requirements for the environment
   10.2 Key production
   10.3 Unilateral authentication exchange
Annex A (normative) Object identifiers
      A.1 Formal definition
      A.2 Use of subsequent object identifiers
      A.3 Coding examples in accordance with the basic encoding
          rules of ASN.1
Annex B (informative) Principles of zero-knowledge techniques
      B.1 Introduction
      B.2 Need for zero-knowledge mechanisms
      B.3 Definitions
      B.4 Example
      B.5 Basic design principles
Annex C (informative) Guidance on parameter choice and comparison
        of the mechanisms
      C.1 Guidance on parameter choice
      C.2 Comparison of the authentication mechanisms
Annex D (informative) Numerical examples
      D.1 FS mechanism
      D.2 GQ1 mechanism
      D.3 GQ2 mechanism (first example: b > 1)
      D.4 GQ2 mechanism (second example: b = 1)
      D.5 SC mechanism
      D.6 GPS1 mechanism
      D.7 GPS2 mechanism
      D.8 RSA[UA] mechanism
      D.9 RSA[MA] mechanism
Bibliography

Committee
IST/33
DocumentType
Draft
Pages
63
PublisherName
British Standards Institution
Status
Superseded
SupersededBy

ISO/IEC 18032:2005 Information technology Security techniques Prime number generation
ISO/IEC 15946-1:2016 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General
ISO/IEC 8825-1:2015 Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1:
ISO/IEC 18033-2:2006 Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
ISO/IEC 14888-2:2008 Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
ISO/IEC 9798-1:2010 Information technology Security techniques Entity authentication Part 1: General

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.