ISO/IEC 9798-4:1999
Current
The latest, up-to-date edition.
Information technology Security techniques Entity authentication Part 4: Mechanisms using a cryptographic check function
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
16-12-1999
This part of ISO/IEC 9798 specifies entity authentication mechanisms using a cryptographic check function. Two
mechanisms are concerned with the authentication of a single entity (unilateral authentication), while the remaining
are mechanisms for mutual authentication of two entities.
The mechanisms specified in this part of ISO/IEC 9798 use time variant parameters such as time stamps,
sequence numbers, or random numbers, to prevent valid authentication information from being accepted at a later
time or more than once.
If a time stamp or sequence number is used, one pass is needed for unilateral authentication, while two passes are
needed to achieve mutual authentication. If a challenge and response method employing random numbers is
used, two passes are needed for unilateral authentication, while three passes are required to achieve mutual
authentication.
Examples of cryptographic check functions are given in ISO/IEC 9797.
DocumentType |
Standard
|
Pages |
7
|
PublisherName |
International Organization for Standardization
|
Status |
Current
|
Supersedes |
Standards | Relationship |
BS ISO/IEC 9798-4:1999 | Identical |
CAN/CSA-ISO/IEC 9798-4:02 (R2021) | Identical |
AS/NZS ISO/IEC 9798.4:2008 | Identical |
INCITS/ISO/IEC 9798-4 : 1999 | Identical |
CSA ISO/IEC 9798-4 :2002 | Identical |
CSA ISO/IEC 9798-4 : 2002 : R2011 | Identical |
CAN/CSA-ISO/IEC 9798-4-02 (R2016) | Identical |
INCITS/ISO/IEC 9798-4 : 1999 : R2005 | Identical |
CSA ISO/IEC 9798-4 : 2002 : INC : COR 1 : 2010 : R2011 | Identical |
CAN/CSA-ISO/IEC 10181-2-00 (R2013) | Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework (Adopted ISO/IEC 10181-2:1996, first edition, 1996-05-15) |
PD IEC/TS 60870-5-7:2013 | Telecontrol equipment and systems Transmission protocols. Security extensions to IEC 60870-5-101 and IEC 60870-5-104 protocols (applying IEC 62351) |
11/30251478 DC : 0 | BS EN 1300 - SECURE STORAGE UNITS - CLASSIFICATION FOR HIGH SECURITY LOCKS ACCORDING TO THEIR RESISTANCE TO UNAUTHORIZED OPENING |
CSA ISO/IEC TR 14516 : 2004 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES |
CAN/CSA-ISO/IEC TR 14516-04 (R2017) | Information Technology - Security Techniques - Guidelines for the use and Management of Trusted Third Party Services (Adopted ISO/IEC TR 14516:2002, first edition, 2002-06-15) |
CSA ISO/IEC TR 14516 : 2004 : R2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES |
ANSI X9.117 : 2012 | SECURE REMOTE ACCESS - MUTUAL AUTHENTICATION |
CEN ISO/TS 17574:2017 | Electronic fee collection - Guidelines for security protection profiles (ISO/TS 17574:2017) |
BS ISO/IEC 10181-2:1996 | Information technology. Open systems interconnection. Security frameworks for open systems Authentication framework |
07/30107757 DC : 0 | BS ISO/IEC 24708 - INFORMATION TECHNOLOGY - BIOAPI INTERWORKING PROTOCOL |
17/30349181 DC : 0 | BS ISO/IEC 24760-1 AMENDMENT 1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IDENTITY MANAGEMENT - PART 1: TERMINOLOGY AND CONCEPTS |
BS ISO/IEC 19790:2012 | Information technology. Security techniques. Security requirements for cryptographic modules |
PD ISO/TR 14742:2010 | Financial services. Recommendations on cryptographic algorithms and their use |
ISO/IEC 19790:2012 | Information technology — Security techniques — Security requirements for cryptographic modules |
BS EN 1300:2013 | Secure storage units. Classification for high security locks according to their resistance to unauthorized opening |
17/30333935 DC : 0 | BS EN 1300 - SECURE STORAGE UNITS - CLASSIFICATION FOR HIGH SECURITY LOCKS ACCORDING TO THEIR RESISTANCE TO UNAUTHORIZED OPENING |
DIN EN 1300:2014-05 | SECURE STORAGE UNITS - CLASSIFICATION FOR HIGH SECURITY LOCKS ACCORDING TO THEIR RESISTANCE TO UNAUTHORIZED OPENING |
BIS IS/IEC/TS 62351-5 : 2009(R2016) | POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 5: SECURITY FOR IEC 60870-5 AND DERIVATIVES |
UNI EN 1300 : 2014 | SECURE STORAGE UNITS - CLASSIFICATION FOR HIGH SECURITY LOCKS ACCORDING TO THEIR RESISTANCE TO UNAUTHORIZED OPENING |
PD ISO/TS 16785:2014 | Electronic Fee Collection (EFC). Interface definition between DSRC-OBE and external in-vehicle devices |
PD IEC/TS 62351-5:2013 | Power systems management and associated information exchange. Data and communications security Security for IEC 60870-5 and derivatives |
07/30163724 DC : 0 | BS ISO/IEC 24727-4 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS PROGRAMMING INTERFACE - PART 4: API ADMINISTRATION |
BS ISO 15668:1999 | Banking. Secure file transfer (retail) |
TS 102 165-2 : 4.2.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); METHODS AND PROTOCOLS; PART 2: PROTOCOL FRAMEWORK DEFINITION; SECURITY COUNTER MEASURES |
ISO/IEC TR 14516:2002 | Information technology Security techniques Guidelines for the use and management of Trusted Third Party services |
UNE-EN 1300:2014 | Secure storage units - Classification for high security locks according to their resistance to unauthorized opening |
ANSI X9.112-1 : 2009 | WIRELESS MANAGEMENT AND SECURITY - PART 1: GENERAL REQUIREMENTS |
ISO 15764:2004 | Road vehicles Extended data link security |
ANSI X9.112 : 2016 | WIRELESS MANAGEMENT AND SECURITY - PART 1: GENERAL REQUIREMENTS |
ISO/TR 14742:2010 | Financial services Recommendations on cryptographic algorithms and their use |
IEC TS 62351-5:2013 | Power systems management and associated information exchange - Data and communications security - Part 5: Security for IEC 60870-5 and derivatives |
EN 1300:2013 | Secure storage units - Classification for high security locks according to their resistance to unauthorized opening |
07/30154069 DC : 0 | BS ISO/IEC 24727-3 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 3: APPLICATION INTERFACE |
DD ENV 13729:2000 | Health informatics. Secure user identification. Strong authentication microprocessor cards |
BS ISO/IEC TR 14516:2002 | Information technology. Security techniques. Guidelines for the use and management of trusted third party services |
ISO 15668:1999 | Banking Secure file transfer (retail) |
DD IEC TS 62351-5 : DRAFT OCT 2009 | POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 5: SECURITY FOR IEC 60870-5 AND DERIVATIVES |
PD IEC/TR 61850-90-5:2012 | Communication networks and systems for power utility automation Use of IEC 61850 to transmit synchrophasor information according to IEEE C37.118 |
TS 133 102 : 13.0.0 | DIGITAL CELLULAR TELECOMMUNICATIONS SYSTEM (PHASE 2+) (GSM); UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); 3G SECURITY; SECURITY ARCHITECTURE (3GPP TS 33.102 VERSION 14.1.0 RELEASE 14) |
S.R. CEN ISO/TS 17574:2017 | ELECTRONIC FEE COLLECTION - GUIDELINES FOR SECURITY PROTECTION PROFILES (ISO/TS 17574:2017) |
ISO/TS 16785:2014 | Electronic Fee Collection (EFC) Interface definition between DSRC-OBE and external in-vehicle devices |
I.S. EN 1300:2013 | SECURE STORAGE UNITS - CLASSIFICATION FOR HIGH SECURITY LOCKS ACCORDING TO THEIR RESISTANCE TO UNAUTHORIZED OPENING |
ISO/TS 17574:2017 | Electronic fee collection — Guidelines for security protection profiles |
DD CEN ISO/TS 17574:2009 | Electronic fee collection. Guidelines for security protection profiles |
PD CEN ISO/TS 17574:2017 | Electronic fee collection. Guidelines for security protection profiles |
IEEE 1815-2012 REDLINE | IEEE Standard for Electric Power Systems Communications-Distributed Network Protocol (DNP3) |
IEC TR 61850-90-5:2012 | Communication networks and systems for power utility automation - Part 90-5: Use of IEC 61850 to transmit synchrophasor information according to IEEE C37.118 |
ONORM EN 1300 : MAY 2014 | SECURE STORAGE UNITS - CLASSIFICATION FOR HIGH SECURITY LOCKS ACCORDING TO THEIR RESISTANCE TO UNAUTHORIZED OPENING |
ISO/IEC 8825-1:2015 | Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1: |
ISO/IEC 9798-1:2010 | Information technology Security techniques Entity authentication Part 1: General |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.