• BS ISO/IEC 20009-4:2017

    Current The latest, up-to-date edition.

    Information technology. Security techniques. Anonymous entity authentication Mechanisms based on weak secrets

    Available format(s):  Hardcopy, PDF

    Language(s):  English

    Published date:  22-08-2017

    Publisher:  British Standards Institution

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Introduction
    1 Scope
    2 Normative references
    3 Terms and definitions
    4 Symbols, abbreviated terms and conversion functions
    5 General model for password-based anonymous entity
      authentication
    6 Password-only PAEA mechanisms
    7 Storage-extra PAEA mechanism
    Annex A (normative) - Object identifiers
    Bibliography

    Abstract - (Show below) - (Hide below)

    Gives anonymous entity authentication mechanisms based on weak secrets.

    Scope - (Show below) - (Hide below)

    This document specifies anonymous entity authentication mechanisms based on weak secrets. The precise operation of each mechanism is specified, together with details of all inputs and outputs. This document is applicable to situations in which the server only verifies that the user belongs to a certain user group without obtaining any information that can be used to identify the user later on.

    General Product Information - (Show below) - (Hide below)

    Committee IST/33/2
    Development Note Supersedes 16/30288045 DC. (09/2017)
    Document Type Standard
    Publisher British Standards Institution
    Status Current
    Supersedes

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 19772:2009 Information technology Security techniques Authenticated encryption
    ISO/IEC 15946-1:2016 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General
    ISO/IEC 11770-4:2006 Information technology Security techniques Key management Part 4: Mechanisms based on weak secrets
    ISO/IEC 20009-1:2013 Information technology — Security techniques — Anonymous entity authentication — Part 1: General
    ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
    ISO/IEC 9797-2:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function
    ISO/IEC 18033-4:2011 Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective