• CSA ISO/IEC 9798-1 :2012

    Superseded A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

    INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 1: GENERAL

    Available format(s):  Hardcopy, PDF

    Superseded date:  20-07-2021

    Language(s):  English

    Published date:  01-01-2016

    Publisher:  Canadian Standards Association

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Introduction
    1 Scope
    2 Normative references
    3 Terms and definitions
    4 Symbols and abbreviated terms
    5 Authentication model
    6 General requirements and constraints
    Annex A (informative) - Use of text field
    Annex B (informative) - Time variant parameters
    Annex C (informative) - Certificates
    Bibliography

    Abstract - (Show below) - (Hide below)

    Defines an authentication model and general requirements and constraints for entity authentication mechanisms, which use security techniques.

    General Product Information - (Show below) - (Hide below)

    Document Type Standard
    Product Note Reconfirmed EN
    Publisher Canadian Standards Association
    Status Superseded
    Superseded By
    Supersedes

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
    ISO/IEC 7498-1:1994 Information technology Open Systems Interconnection Basic Reference Model: The Basic Model
    ISO/IEC 14888-3:2016 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
    ISO/IEC 8825-1:2015 Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1:
    ISO/IEC 11770-2:2008 Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques
    ISO/IEC 10181-1:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Overview
    ISO/IEC 9594-8:2017 Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks
    ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
    ISO/IEC 14888-1:2008 Information technology Security techniques Digital signatures with appendix Part 1: General
    ISO/IEC 13888-1:2009 Information technology Security techniques Non-repudiation Part 1: General
    ISO/IEC 10181-2:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Authentication framework
    ISO/IEC 9796-2:2010 Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms
    ISO/IEC 14888-2:2008 Information technology Security techniques Digital signatures with appendix Part 2: Integer factorization based mechanisms
    ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
    ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective