• BS ISO/IEC 9798-2:2008

    Superseded A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

    Information technology. Security techniques. Entity authentication Mechanisms using symmetric encipherment algorithms

    Available format(s):  Hardcopy, PDF

    Superseded date:  24-06-2019

    Language(s):  English

    Published date:  01-03-2013

    Publisher:  British Standards Institution

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    1 Scope
    2 Normative references
    3 Terms and definitions
    4 Symbols and notation
    5 Requirements
    6 Mechanisms not involving a trusted third party
    7 Mechanisms involving a trusted third party
    Annex A (normative) - OIDs and ASN.1 syntax
    Annex B (informative) - Use of text fields
    Annex C (informative) - Properties of entity
            authentication mechanisms
    Bibliography

    Abstract - (Show below) - (Hide below)

    Describes entity authentication mechanisms using symmetric encipherment algorithms.

    Scope - (Show below) - (Hide below)

    This part of ISO/IEC 9798 specifies entity authentication mechanisms using symmetric encipherment algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third party is involved; two of these are mechanisms to unilaterally authenticate one entity to another, while the other two are mechanisms for mutual authentication of two entities. The remaining mechanisms require a trusted third party for the establishment of a common secret key, and realize mutual or unilateral entity authentication.

    The mechanisms specified in this part of ISO/IEC 9798 use time variant parameters such as time stamps, sequence numbers, or random numbers to prevent valid authentication information from being accepted at a later time or more than once.

    If no trusted third party is involved and a time stamp or sequence number is used, one pass is needed for unilateral authentication, while two passes are needed to achieve mutual authentication. If no trusted third party is involved and a challenge and response method employing random numbers is used, two passes are needed for unilateral authentication, while three passes are required to achieve mutual authentication. If a trusted third party is involved, any additional communication between an entity and the trusted third party requires two extra passes in the communication exchange.

    General Product Information - (Show below) - (Hide below)

    Committee IST/33/2
    Development Note Supersedes 98/652421 DC. (03/2004) Supersedes 07/30173155 DC. (02/2009)
    Document Type Standard
    Publisher British Standards Institution
    Status Superseded
    Superseded By
    Supersedes

    Standards Referenced By This Book - (Show below) - (Hide below)

    BS EN 726-2:1996 Identification card systems. Telecommunications. Integrated circuit(s) cards and terminals Security framework

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
    ISO/IEC 19772:2009 Information technology Security techniques Authenticated encryption
    ISO/IEC 8825-1:2015 Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1:
    ISO/IEC 11770-2:2008 Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques
    ISO/IEC 9798-5:2009 Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques
    ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
    ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
    ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
    ISO/IEC 18014-1:2008 Information technology Security techniques Time-stamping services Part 1: Framework
    ISO/IEC 9798-1:2010 Information technology Security techniques Entity authentication Part 1: General
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective