BS ISO/IEC 9798-6:2010
Current
The latest, up-to-date edition.
Information technology. Security techniques. Entity authentication Mechanisms using manual data transfer
Hardcopy , PDF
English
31-12-2010
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 Overall requirements
6 Mechanisms using a short check-value
7 Mechanisms using a manual transfer of a short digest-value
or a short key
8 Mechanisms using a MAC
Annex A (normative) - ASN.1 modules
Annex B (informative) - Using manual authentication protocols
for the exchange of secret keys
Annex C (informative) - Using manual authentication protocols
for the exchange of public keys
Annex D (informative) - On mechanism security and choices
for parameter lengths
Annex E (informative) - A method for generating short
check-values
Annex F (informative) - Comparative analysis in security and
efficiency of mechanisms 1-8
Annex G (informative) - Methods for generating short
digest-values
Bibliography
Describes eight entity authentication mechanisms based on manual data transfer between authenticating devices.
Committee |
IST/33/2
|
DevelopmentNote |
Supersedes 04/30093313 DC. (10/2005) Supersedes 09/30204751 DC. (12/2010)
|
DocumentType |
Standard
|
Pages |
46
|
PublisherName |
British Standards Institution
|
Status |
Current
|
Supersedes |
This part of ISO/IEC9798 specifies eight entity authentication mechanisms based on manual data transfer between authenticating devices. It indicates how these mechanisms can be used to support key management functions, and provides guidance on secure choices of parameters for the mechanisms. A comparison of the levels of security and efficiency provided by the eight mechanisms is given.
Such mechanisms can be appropriate in a variety of circumstances. One such application occurs in personal networks, where the owner of two personal devices capable of wireless communications wishes them to perform an entity authentication procedure as part of the process of preparing them for use in the network.
Standards | Relationship |
ISO/IEC 9798-6:2010 | Identical |
ISO/IEC 8825-1:2015 | Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1: |
ISO/IEC 18033-3:2010 | Information technology Security techniques Encryption algorithms Part 3: Block ciphers |
ISO 7498-2:1989 | Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture |
ISO/IEC 18033-4:2011 | Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers |
ISO/IEC 11770-3:2015 | Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
ISO/IEC 9798-1:2010 | Information technology Security techniques Entity authentication Part 1: General |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.