• 08/30169502 DC : 0

    Superseded A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

    BS ISO/IEC 9798-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO KNOWLEDGE TECHNIQUES

    Available format(s):  Hardcopy, PDF

    Superseded date:  28-02-2010

    Language(s):  English

    Published date: 

    Publisher:  British Standards Institution

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Introduction
    1 Scope
    2 Normative references
    3 Terms and definitions
    4 Symbols and abbreviated terms
    5 Mechanisms based on identities
       5.1 Security requirements for the environment
       5.2 Key production
       5.3 Unilateral authentication exchange
    6 Mechanisms based on integer factorization
       6.1 Security requirements for the environment
       6.2 Key production
       6.3 Unilateral authentication exchange
    7 Mechanisms based on discrete logarithms with respect to
       prime numbers
       7.1 Security requirements for the environment
       7.2 Key production
       7.3 Unilateral authentication exchange
    8 Mechanisms based on discrete logarithms with respect to
       composite numbers
       8.1 Security requirements for the environment
       8.2 Key production
       8.3 Unilateral authentication exchange
    9 Mechanisms based on asymmetric encryption systems
       9.1 Security requirements for the environment
       9.2 Unilateral authentication exchange
       9.3 Mutual authentication exchange
    10 Mechanism based on elliptic curve discrete logarithms
       10.1 Security requirements for the environment
       10.2 Key production
       10.3 Unilateral authentication exchange
    Annex A (normative) Object identifiers
          A.1 Formal definition
          A.2 Use of subsequent object identifiers
          A.3 Coding examples in accordance with the basic encoding
              rules of ASN.1
    Annex B (informative) Principles of zero-knowledge techniques
          B.1 Introduction
          B.2 Need for zero-knowledge mechanisms
          B.3 Definitions
          B.4 Example
          B.5 Basic design principles
    Annex C (informative) Guidance on parameter choice and comparison
            of the mechanisms
          C.1 Guidance on parameter choice
          C.2 Comparison of the authentication mechanisms
    Annex D (informative) Numerical examples
          D.1 FS mechanism
          D.2 GQ1 mechanism
          D.3 GQ2 mechanism (first example: b > 1)
          D.4 GQ2 mechanism (second example: b = 1)
          D.5 SC mechanism
          D.6 GPS1 mechanism
          D.7 GPS2 mechanism
          D.8 RSA[UA] mechanism
          D.9 RSA[MA] mechanism
    Bibliography

    General Product Information - (Show below) - (Hide below)

    Comment Closes On
    Committee IST/33
    Document Type Draft
    Publisher British Standards Institution
    Status Superseded
    Superseded By

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 18032:2005 Information technology Security techniques Prime number generation
    ISO/IEC 15946-1:2016 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General
    ISO/IEC 8825-1:2015 Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1:
    ISO/IEC 18033-2:2006 Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
    ISO/IEC 14888-2:2008 Information technology Security techniques Digital signatures with appendix Part 2: Integer factorization based mechanisms
    ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
    ISO/IEC 9798-1:2010 Information technology Security techniques Entity authentication Part 1: General
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective