08/30169502 DC : 0
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
BS ISO/IEC 9798-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO KNOWLEDGE TECHNIQUES
Hardcopy , PDF
28-02-2010
English
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 Mechanisms based on identities
5.1 Security requirements for the environment
5.2 Key production
5.3 Unilateral authentication exchange
6 Mechanisms based on integer factorization
6.1 Security requirements for the environment
6.2 Key production
6.3 Unilateral authentication exchange
7 Mechanisms based on discrete logarithms with respect to
prime numbers
7.1 Security requirements for the environment
7.2 Key production
7.3 Unilateral authentication exchange
8 Mechanisms based on discrete logarithms with respect to
composite numbers
8.1 Security requirements for the environment
8.2 Key production
8.3 Unilateral authentication exchange
9 Mechanisms based on asymmetric encryption systems
9.1 Security requirements for the environment
9.2 Unilateral authentication exchange
9.3 Mutual authentication exchange
10 Mechanism based on elliptic curve discrete logarithms
10.1 Security requirements for the environment
10.2 Key production
10.3 Unilateral authentication exchange
Annex A (normative) Object identifiers
A.1 Formal definition
A.2 Use of subsequent object identifiers
A.3 Coding examples in accordance with the basic encoding
rules of ASN.1
Annex B (informative) Principles of zero-knowledge techniques
B.1 Introduction
B.2 Need for zero-knowledge mechanisms
B.3 Definitions
B.4 Example
B.5 Basic design principles
Annex C (informative) Guidance on parameter choice and comparison
of the mechanisms
C.1 Guidance on parameter choice
C.2 Comparison of the authentication mechanisms
Annex D (informative) Numerical examples
D.1 FS mechanism
D.2 GQ1 mechanism
D.3 GQ2 mechanism (first example: b > 1)
D.4 GQ2 mechanism (second example: b = 1)
D.5 SC mechanism
D.6 GPS1 mechanism
D.7 GPS2 mechanism
D.8 RSA[UA] mechanism
D.9 RSA[MA] mechanism
Bibliography
Committee |
IST/33
|
DocumentType |
Draft
|
Pages |
63
|
PublisherName |
British Standards Institution
|
Status |
Superseded
|
SupersededBy |
ISO/IEC 18032:2005 | Information technology Security techniques Prime number generation |
ISO/IEC 15946-1:2016 | Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General |
ISO/IEC 8825-1:2015 | Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1: |
ISO/IEC 18033-2:2006 | Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers |
ISO/IEC 14888-2:2008 | Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms |
ISO/IEC 11770-3:2015 | Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
ISO/IEC 9798-1:2010 | Information technology Security techniques Entity authentication Part 1: General |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.