• Shopping Cart
    There are no items in your cart

AS 4019.8-1992

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by

Information technology - Open Systems Interconnection - The Directory Authentication framework

Available format(s)

Hardcopy , PDF 1 User , PDF 3 Users , PDF 5 Users , PDF 9 Users

Superseded date

25-06-2021

Superseded by

AS/NZS 4019.8:1996

Language(s)

English

Published date

01-01-1992

€57.40
Excluding VAT

1 - AS 4019.8:1992 INFORMATION TECHNOLOGY - OPEN SYSTEMS INTERCONNECTION - THE DIRECTORY - AUTHENTICATION FRAMEWORK
4 - PREFACE
5 - CONTENTS
6 - SECTION 1: GENERAL
6 - 1 Scope
6 - 2 Normative references
7 - 3 Definitions
8 - 4 Notation and Abbreviations
8 - SECTION 2: SIMPLE AUTHENTICATION
8 - 5 Simple Authentication Procedure
10 - SECTION 3: STRONG AUTHENTICATION
10 - 6 Basis of Strong Authentication
11 - 7 Obtaining a User’s Public Key
13 - 8 Digital Signatures
15 - 9 Strong Authentication Procedures
15 - 9.1 Overview
15 - 9.2 One-way Authentication
16 - 9.3 Two-way Authentication
16 - 9.4 Three-way Authentication
16 - 10 Management of Keys and Certificates
16 - 10.1 Generation of Key Pairs
17 - 10.2 Management of Certificates
19 - Annex A - Security Requirements
19 - A.1 Threats
19 - A.2 Security Services
20 - A.3 Security Mechanisms
20 - A.4 Threats Protected Against by the Security Services
20 - A5 Negotiation of Security Services and Mechanisms
22 - Annex B - An Introduction to Public Key Cryptography
23 - Annex C - The RSA Public Key Cryptosystem
23 - C.1 Scope and Field of Application
23 - C.2 Definitions
23 - C.3 Symbols and Abbreviations
23 - C.4 Description
23 - C.5 Security Requirements
24 - C.5.1 Key Lengths
24 - C.5.2 Key Generation
24 - C.6 Public Exponent
24 - C.7 Conformance
25 - Annex D - Hash Functions
25 - D.1 Requirements for Hash Functions
25 - D.2 Description of a Hash Function
26 - Annex E - Threats Protected Against by the Strong Authentication Method
27 - Annex F - Data Confidentiality
27 - F.1 Introduction
27 - F.2 Data Confidentiality by Asymmetric Encipherment
27 - F3 Data Confidentiality by Symmetric Encipherment
28 - Annex G - Authentication Framework in ASN.1
31 - Annex H - Reference Definition of Algorithm Object Identifiers
32 - TECHNICAL CORRIGENDUM 1

Specifies the form of authentication information held by the Directory; describes how authentication information may be obtained from the Directory; states the assumptions made about how authentication information is formed and placed in the Directory; and defines three ways in which applications may use this authentication information to perform authentication and describes how other security services may be supported by authentication. This Standard is identical with and has been reproduced from ISO/IEC 9594-8:1990 including Technical Corrigendum 1:1991.

Committee
IT-001
DocumentType
Standard
ISBN
0 7262 7434 8
Pages
26
ProductNote
To run concurrently with AS/NZS 4019.8:1996
PublisherName
Standards Australia
Status
Superseded
SupersededBy

This part of ISO/IEC 9594:+ specifies the form of authentication information held by the Directory;+ describes how authentication information may be obtained from the Directory;+ states the assumptionsmade about how authentication information is formed and placed in the Directory;+ defines three ways in which applications may use this authentication information to perform authentication and describes how other security services may be supported by authentication.This part of ISO/IEC 9594 describes two levels of authentication: simple authentication, using a password as a verification of claimed identity; and strong authentication, involving credentials formed using cryptographic techniques. While simple authentication offers some limited protection against unauthorized access, only strong authentication should be used as the basis for providing secure services. It is not intended to establish this as a general framework for authentication, but it can be of general use for applications which consider these techniques adequate.Authentication (and other security services) can only be provided within the context of a defined security policy. It is a matter for users of an application to define their own security policy which may be constrained by the services provided by a standard.It is a matter for standards defining applications which use the authentication framework to specify the protocol exchanges which need to be performed in order to achieve authentication based upon the authentication information obtained from the Directory. The protocol used by applications to obtain credentials from the Directory is the Directory Access Protocol (DAP), specified in ISO/IEC 9594-5.The strong authentication method specified in this part of ISO/IEC 9594 is based upon public-key cryptosystems. It is a major advantage of such systems that user certificates may be held within the Directory as attributes, and may be freely communicated within the Directory System and obtained by users of the Directory in the same manner as other Directory information. The user certificates are assumed to be formed by 'off-line' means, and placed in the Directory by their creator. The generation of user certificates is performed by some offline Certification Authority which is completely separate from the DSAs in the Directory. In particular, no special requirements are placed upon Directory providers to store or communicate user certificates in a secure manner.A brief introduction to public-key cryptography can be found in annex B.In general, the authentication framework is not dependent on the use of a particular cryptographic algorithm, provided it has the properties described in 6.1. Potentially a number of different algorithms may be used.However, two users wishing to authenticate shall support the same cryptographic algorithm for authentication to be performed correctly. Thus, within the context of a set of related applications, the choice of a single algorithm willserve to maximize the community of users able to authenticate and communicate securely. One example of apublic key cryptographic algorithm can be found in Annex C.Similarly, two users wishing to authenticate shall support the same hash function (see 3.3f) (used in formingcredentials and authentication tokens). Again, in principle, a number of alternative hash functions could be used, at the cost of narrowing the communities of users able to authenticate. A brief introduction to hash functions together with one example hash function can be found in annex D.

Standards Relationship
ISO/IEC 9594-8:1990 Identical

First published as AS 4019.8-1992.

AS 3626-1991 Information technology - Open Systems Interconnection - Specification of basic encoding rules for Abstract Syntax Notation One (ASN.1)
AS 2777.2-1990 Information processing systems - Open systems interconnection - Basic reference model Security architecture
AS 3625-1991 Information technology - Open Systems Interconnection - Specification of Abstract Syntax Notation One (ASN.1)

AS 4019.4-1992 Information technology - Open Systems Interconnection - The Directory Procedures for distributed operation
AS 4033.5-1992 Information technology - Text communication - Message-oriented text interchange systems Message store - Abstract service definition
AS/NZS 4471:1997 Information technology - Open Systems Interconnection - Network layer security protocol
AS 4019.1-1992 Information technology - Open Systems Interconnection - The Directory Overview of concepts, models and services
AS 4033.1-1992 Information technology - Text communication - Message-oriented text interchange systems System and service overview
AS 4033.2-1992 Information technology - Text communication - Message-oriented text interchange systems Overall architecture
AS 4019.7-1992 Information technology - Open Systems Interconnection - The Directory Selected object classes
AS 4019.3-1992 Information technology - Open Systems Interconnection - The Directory Abstract service definition
AS 4019.5-1992 Information technology - Open Systems Interconnection - The Directory Protocol specifications
AS/NZS ISO/IEC 11770.3:2008 Information technology - Security techniques - Key management Mechanisms using asymmetric techniques
AS 4033.4-1992 Information technology - Text communication - Message-oriented text interchange systems Message transfer system - Abstract service definition and procedures
AS 4019.2-1992 Information technology - Open Systems Interconnection - The Directory Models

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.