• There are no items in your cart

BS ISO/IEC 20009-4:2017

Current

Current

The latest, up-to-date edition.

Information technology. Security techniques. Anonymous entity authentication Mechanisms based on weak secrets

Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

22-08-2017

€217.36
Excluding VAT

Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols, abbreviated terms and conversion functions
5 General model for password-based anonymous entity
  authentication
6 Password-only PAEA mechanisms
7 Storage-extra PAEA mechanism
Annex A (normative) - Object identifiers
Bibliography

Gives anonymous entity authentication mechanisms based on weak secrets.

Committee
IST/33/2
DevelopmentNote
Supersedes 16/30288045 DC. (09/2017)
DocumentType
Standard
Pages
32
PublisherName
British Standards Institution
Status
Current
Supersedes

This document specifies anonymous entity authentication mechanisms based on weak secrets. The precise operation of each mechanism is specified, together with details of all inputs and outputs. This document is applicable to situations in which the server only verifies that the user belongs to a certain user group without obtaining any information that can be used to identify the user later on.

Standards Relationship
ISO/IEC 20009-4:2017 Identical

ISO/IEC 19772:2009 Information technology Security techniques Authenticated encryption
ISO/IEC 15946-1:2016 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General
ISO/IEC 11770-4:2006 Information technology Security techniques Key management Part 4: Mechanisms based on weak secrets
ISO/IEC 20009-1:2013 Information technology — Security techniques — Anonymous entity authentication — Part 1: General
ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
ISO/IEC 9797-2:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function
ISO/IEC 18033-4:2011 Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.