• Shopping Cart
    There are no items in your cart

ISO/IEC 9798-4:1999

Current

Current

The latest, up-to-date edition.

Information technology Security techniques Entity authentication Part 4: Mechanisms using a cryptographic check function

Available format(s)

Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users

Published date

16-12-1999

€60.00
Excluding VAT

This part of ISO/IEC 9798 specifies entity authentication mechanisms using a cryptographic check function. Two

mechanisms are concerned with the authentication of a single entity (unilateral authentication), while the remaining

are mechanisms for mutual authentication of two entities.

The mechanisms specified in this part of ISO/IEC 9798 use time variant parameters such as time stamps,

sequence numbers, or random numbers, to prevent valid authentication information from being accepted at a later

time or more than once.

If a time stamp or sequence number is used, one pass is needed for unilateral authentication, while two passes are

needed to achieve mutual authentication. If a challenge and response method employing random numbers is

used, two passes are needed for unilateral authentication, while three passes are required to achieve mutual

authentication.

Examples of cryptographic check functions are given in ISO/IEC 9797.

DocumentType
Standard
Pages
7
PublisherName
International Organization for Standardization
Status
Current
Supersedes

CAN/CSA-ISO/IEC 10181-2-00 (R2013) Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework (Adopted ISO/IEC 10181-2:1996, first edition, 1996-05-15)
PD IEC/TS 60870-5-7:2013 Telecontrol equipment and systems Transmission protocols. Security extensions to IEC 60870-5-101 and IEC 60870-5-104 protocols (applying IEC 62351)
11/30251478 DC : 0 BS EN 1300 - SECURE STORAGE UNITS - CLASSIFICATION FOR HIGH SECURITY LOCKS ACCORDING TO THEIR RESISTANCE TO UNAUTHORIZED OPENING
CSA ISO/IEC TR 14516 : 2004 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES
CAN/CSA-ISO/IEC TR 14516-04 (R2017) Information Technology - Security Techniques - Guidelines for the use and Management of Trusted Third Party Services (Adopted ISO/IEC TR 14516:2002, first edition, 2002-06-15)
CSA ISO/IEC TR 14516 : 2004 : R2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES
ANSI X9.117 : 2012 SECURE REMOTE ACCESS - MUTUAL AUTHENTICATION
CEN ISO/TS 17574:2017 Electronic fee collection - Guidelines for security protection profiles (ISO/TS 17574:2017)
BS ISO/IEC 10181-2:1996 Information technology. Open systems interconnection. Security frameworks for open systems Authentication framework
07/30107757 DC : 0 BS ISO/IEC 24708 - INFORMATION TECHNOLOGY - BIOAPI INTERWORKING PROTOCOL
17/30349181 DC : 0 BS ISO/IEC 24760-1 AMENDMENT 1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IDENTITY MANAGEMENT - PART 1: TERMINOLOGY AND CONCEPTS
BS ISO/IEC 19790:2012 Information technology. Security techniques. Security requirements for cryptographic modules
PD ISO/TR 14742:2010 Financial services. Recommendations on cryptographic algorithms and their use
ISO/IEC 19790:2012 Information technology — Security techniques — Security requirements for cryptographic modules
BS EN 1300:2013 Secure storage units. Classification for high security locks according to their resistance to unauthorized opening
17/30333935 DC : 0 BS EN 1300 - SECURE STORAGE UNITS - CLASSIFICATION FOR HIGH SECURITY LOCKS ACCORDING TO THEIR RESISTANCE TO UNAUTHORIZED OPENING
DIN EN 1300:2014-05 SECURE STORAGE UNITS - CLASSIFICATION FOR HIGH SECURITY LOCKS ACCORDING TO THEIR RESISTANCE TO UNAUTHORIZED OPENING
BIS IS/IEC/TS 62351-5 : 2009(R2016) POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 5: SECURITY FOR IEC 60870-5 AND DERIVATIVES
UNI EN 1300 : 2014 SECURE STORAGE UNITS - CLASSIFICATION FOR HIGH SECURITY LOCKS ACCORDING TO THEIR RESISTANCE TO UNAUTHORIZED OPENING
PD ISO/TS 16785:2014 Electronic Fee Collection (EFC). Interface definition between DSRC-OBE and external in-vehicle devices
PD IEC/TS 62351-5:2013 Power systems management and associated information exchange. Data and communications security Security for IEC 60870-5 and derivatives
07/30163724 DC : 0 BS ISO/IEC 24727-4 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS PROGRAMMING INTERFACE - PART 4: API ADMINISTRATION
BS ISO 15668:1999 Banking. Secure file transfer (retail)
TS 102 165-2 : 4.2.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); METHODS AND PROTOCOLS; PART 2: PROTOCOL FRAMEWORK DEFINITION; SECURITY COUNTER MEASURES
ISO/IEC TR 14516:2002 Information technology Security techniques Guidelines for the use and management of Trusted Third Party services
UNE-EN 1300:2014 Secure storage units - Classification for high security locks according to their resistance to unauthorized opening
ANSI X9.112-1 : 2009 WIRELESS MANAGEMENT AND SECURITY - PART 1: GENERAL REQUIREMENTS
ISO 15764:2004 Road vehicles Extended data link security
ANSI X9.112 : 2016 WIRELESS MANAGEMENT AND SECURITY - PART 1: GENERAL REQUIREMENTS
ISO/TR 14742:2010 Financial services Recommendations on cryptographic algorithms and their use
IEC TS 62351-5:2013 Power systems management and associated information exchange - Data and communications security - Part 5: Security for IEC 60870-5 and derivatives
EN 1300:2013 Secure storage units - Classification for high security locks according to their resistance to unauthorized opening
07/30154069 DC : 0 BS ISO/IEC 24727-3 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 3: APPLICATION INTERFACE
DD ENV 13729:2000 Health informatics. Secure user identification. Strong authentication microprocessor cards
BS ISO/IEC TR 14516:2002 Information technology. Security techniques. Guidelines for the use and management of trusted third party services
ISO 15668:1999 Banking Secure file transfer (retail)
DD IEC TS 62351-5 : DRAFT OCT 2009 POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 5: SECURITY FOR IEC 60870-5 AND DERIVATIVES
PD IEC/TR 61850-90-5:2012 Communication networks and systems for power utility automation Use of IEC 61850 to transmit synchrophasor information according to IEEE C37.118
TS 133 102 : 13.0.0 DIGITAL CELLULAR TELECOMMUNICATIONS SYSTEM (PHASE 2+) (GSM); UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); 3G SECURITY; SECURITY ARCHITECTURE (3GPP TS 33.102 VERSION 14.1.0 RELEASE 14)
S.R. CEN ISO/TS 17574:2017 ELECTRONIC FEE COLLECTION - GUIDELINES FOR SECURITY PROTECTION PROFILES (ISO/TS 17574:2017)
ISO/TS 16785:2014 Electronic Fee Collection (EFC) Interface definition between DSRC-OBE and external in-vehicle devices
I.S. EN 1300:2013 SECURE STORAGE UNITS - CLASSIFICATION FOR HIGH SECURITY LOCKS ACCORDING TO THEIR RESISTANCE TO UNAUTHORIZED OPENING
ISO/TS 17574:2017 Electronic fee collection — Guidelines for security protection profiles
DD CEN ISO/TS 17574:2009 Electronic fee collection. Guidelines for security protection profiles
PD CEN ISO/TS 17574:2017 Electronic fee collection. Guidelines for security protection profiles
IEEE 1815-2012 REDLINE IEEE Standard for Electric Power Systems Communications-Distributed Network Protocol (DNP3)
IEC TR 61850-90-5:2012 Communication networks and systems for power utility automation - Part 90-5: Use of IEC 61850 to transmit synchrophasor information according to IEEE C37.118
ONORM EN 1300 : MAY 2014 SECURE STORAGE UNITS - CLASSIFICATION FOR HIGH SECURITY LOCKS ACCORDING TO THEIR RESISTANCE TO UNAUTHORIZED OPENING

ISO/IEC 8825-1:2015 Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1:
ISO/IEC 9798-1:2010 Information technology Security techniques Entity authentication Part 1: General

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.