BS ISO/IEC 20009-4:2017
Current
The latest, up-to-date edition.
Information technology. Security techniques. Anonymous entity authentication Mechanisms based on weak secrets
Hardcopy , PDF
English
22-08-2017
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols, abbreviated terms and conversion functions
5 General model for password-based anonymous entity
authentication
6 Password-only PAEA mechanisms
7 Storage-extra PAEA mechanism
Annex A (normative) - Object identifiers
Bibliography
Gives anonymous entity authentication mechanisms based on weak secrets.
Committee |
IST/33/2
|
DevelopmentNote |
Supersedes 16/30288045 DC. (09/2017)
|
DocumentType |
Standard
|
Pages |
32
|
PublisherName |
British Standards Institution
|
Status |
Current
|
Supersedes |
This document specifies anonymous entity authentication mechanisms based on weak secrets. The precise operation of each mechanism is specified, together with details of all inputs and outputs. This document is applicable to situations in which the server only verifies that the user belongs to a certain user group without obtaining any information that can be used to identify the user later on.
Standards | Relationship |
ISO/IEC 20009-4:2017 | Identical |
ISO/IEC 19772:2009 | Information technology Security techniques Authenticated encryption |
ISO/IEC 15946-1:2016 | Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General |
ISO/IEC 11770-4:2006 | Information technology Security techniques Key management Part 4: Mechanisms based on weak secrets |
ISO/IEC 20009-1:2013 | Information technology — Security techniques — Anonymous entity authentication — Part 1: General |
ISO/IEC 10118-3:2004 | Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions |
ISO/IEC 9797-2:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function |
ISO/IEC 18033-4:2011 | Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.