• Shopping Cart
    There are no items in your cart

INCITS/ISO/IEC 9798-5 : 2009(R2020)

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by

Information Technology - Security Techniques - Entity Authentication - Part 5: Mechanisms Using Zero-Knowledge Techniques

Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

12-11-2020

Superseded date

06-06-2025

€184.00
Excluding VAT

This part of ISO/IEC 9798 specifies entity authentication mechanisms using zero-knowledge techniques: ⎯ mechanisms based on identities and providing unilateral authentication; ⎯ mechanisms based on integer factorization and providing unilateral authentication; ⎯ mechanisms based on discrete logarithms with respect to numbers that are either prime or composite, and providing unilateral authentication; ⎯ mechanisms based on asymmetric encryption systems and providing either unilateral authentication, or mutual authentication; ⎯ mechanisms based on discrete logarithms on elliptic curves and providing unilateral authentication.

Committee
ISO/IEC JTC 1
DocumentType
Standard
Pages
0
PublisherName
Information Technology Industry Council
Status
Superseded
SupersededBy
Supersedes

Standards Relationship
ISO/IEC 9798-5:2009 Identical

ISO/IEC 18032:2020 Information security — Prime number generation
ISO/IEC 9798-1:1997 Information technology — Security techniques — Entity authentication — Part 1: General
ISO/IEC 18033-2:2006 Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
ISO/IEC 8825-1:2002 Information technology — ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) — Part 1:
ISO/IEC 15946-1:2008 Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General
ISO/IEC 11770-3:1999 Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques
ISO/IEC 10118-3:2004 Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions
ISO/IEC 18033-1:2005 Information technology — Security techniques — Encryption algorithms — Part 1: General
ISO/IEC 14888-2:2008 Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms

Access your standards online with a subscription

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.

€184.00
Excluding VAT