INCITS/ISO/IEC 9798-5 : 2009(R2020)
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
Information Technology - Security Techniques - Entity Authentication - Part 5: Mechanisms Using Zero-Knowledge Techniques
Hardcopy , PDF
English
12-11-2020
06-06-2025
This part of ISO/IEC 9798 specifies entity authentication mechanisms using zero-knowledge techniques: ⎯ mechanisms based on identities and providing unilateral authentication; ⎯ mechanisms based on integer factorization and providing unilateral authentication; ⎯ mechanisms based on discrete logarithms with respect to numbers that are either prime or composite, and providing unilateral authentication; ⎯ mechanisms based on asymmetric encryption systems and providing either unilateral authentication, or mutual authentication; ⎯ mechanisms based on discrete logarithms on elliptic curves and providing unilateral authentication.
| Committee |
ISO/IEC JTC 1
|
| DocumentType |
Standard
|
| Pages |
0
|
| PublisherName |
Information Technology Industry Council
|
| Status |
Superseded
|
| SupersededBy | |
| Supersedes |
| Standards | Relationship |
| ISO/IEC 9798-5:2009 | Identical |
| ISO/IEC 8825-1:2002 | Information technology — ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) — Part 1: |
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.