• Shopping Cart
    There are no items in your cart

INCITS/ISO/IEC 9798-6 : 2012

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by

INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 6: MECHANISMS USING MANUAL DATA TRANSFER

Available format(s)

Hardcopy , PDF

Superseded date

13-05-2018

Language(s)

English

Published date

01-01-2012

€99.06
Excluding VAT

Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 Overall requirements
6 Mechanisms using a short check-value
7 Mechanisms using a manual transfer of a short
  digest-value or a short key
8 Mechanisms using a MAC
Annex A (normative) - ASN.1 modules
Annex B (informative) - Using manual authentication protocols
        for the exchange of secret keys
Annex C (informative) - Using manual authentication protocols
        for the exchange of public keys
Annex D (informative) - On mechanism security and choices
        for parameter lengths
Annex E (informative) - A method for generating short check-values
Annex F (informative) - Comparative analysis in security
        and efficiency of mechanisms 1-8
Annex G (informative) - Methods for generating short digest-values
Bibliography

Describes eight entity authentication mechanisms based on manual data transfer between authenticating devices.

Committee
CS1
DocumentType
Standard
Pages
42
PublisherName
Information Technology Industry Council
Status
Superseded
SupersededBy
Supersedes

Standards Relationship
ISO/IEC 9798-6:2010 Identical

ISO/IEC 8825-1:2015 Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1:
ISO/IEC 18033-3:2010 Information technology Security techniques Encryption algorithms Part 3: Block ciphers
ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
ISO/IEC 18033-4:2011 Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
ISO/IEC 9798-1:2010 Information technology Security techniques Entity authentication Part 1: General

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.