• ISO/IEC 9798-4:1999

    Current The latest, up-to-date edition.

    Information technology Security techniques Entity authentication Part 4: Mechanisms using a cryptographic check function

    Available format(s):  Hardcopy, PDF, PDF 3 Users, PDF 5 Users, PDF 9 Users

    Language(s): 

    Published date:  16-12-1999

    Publisher:  International Organization for Standardization

    Add To Cart

    Abstract - (Show below) - (Hide below)

    This part of ISO/IEC 9798 specifies entity authentication mechanisms using a cryptographic check function. Two

    mechanisms are concerned with the authentication of a single entity (unilateral authentication), while the remaining

    are mechanisms for mutual authentication of two entities.

    The mechanisms specified in this part of ISO/IEC 9798 use time variant parameters such as time stamps,

    sequence numbers, or random numbers, to prevent valid authentication information from being accepted at a later

    time or more than once.

    If a time stamp or sequence number is used, one pass is needed for unilateral authentication, while two passes are

    needed to achieve mutual authentication. If a challenge and response method employing random numbers is

    used, two passes are needed for unilateral authentication, while three passes are required to achieve mutual

    authentication.

    Examples of cryptographic check functions are given in ISO/IEC 9797.

    General Product Information - (Show below) - (Hide below)

    Committee ISO/IEC JTC 1/SC 27
    Document Type Standard
    Publisher International Organization for Standardization
    Status Current
    Supersedes

    Standards Referenced By This Book - (Show below) - (Hide below)

    07/30154069 DC : 0 BS ISO/IEC 24727-3 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 3: APPLICATION INTERFACE
    DD ENV 13729:2000 HEALTH INFORMATICS - SECURE USER IDENTIFICATION - STRONG AUTHENTICATION MICROPROCESSOR CARDS
    UNI EN 1300 : 2014 SECURE STORAGE UNITS - CLASSIFICATION FOR HIGH SECURITY LOCKS ACCORDING TO THEIR RESISTANCE TO UNAUTHORIZED OPENING
    PD ISO/TS 16785:2014 Electronic Fee Collection (EFC). Interface definition between DSRC-OBE and external in-vehicle devices
    PD IEC/TS 62351-5:2013 (published 2014-08) Power systems management and associated information exchange. Data and communications security Security for IEC 60870-5 and derivatives
    BS ISO/IEC TR 14516 : 2002 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES
    07/30163724 DC : 0 BS ISO/IEC 24727-4 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS PROGRAMMING INTERFACE - PART 4: API ADMINISTRATION
    BS ISO/IEC 10181-2 : 1996 INFORMATION TECHNOLOGY - OPEN SYSTEMS INTERCONNECTION - SECURITY FRAMEWORKS FOR OPEN SYSTEMS - AUTHENTICATION FRAMEWORK ITU-T REC. X.811 (1995)
    07/30107757 DC : 0 BS ISO/IEC 24708 - INFORMATION TECHNOLOGY - BIOAPI INTERWORKING PROTOCOL
    CAN/CSA-ISO/IEC 10181-2-00 (R2013) Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework (Adopted ISO/IEC 10181-2:1996, first edition, 1996-05-15)
    ISO 15668:1999 Banking Secure file transfer (retail)
    17/30349181 DC : 0 BS ISO/IEC 24760-1 AMENDMENT 1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IDENTITY MANAGEMENT - PART 1: TERMINOLOGY AND CONCEPTS
    BS ISO 15668 : 1999 BANKING - SECURE FILE TRANSFER (RETAIL)
    DD CEN ISO/TS 17574 : 2009 ELECTRONIC FEE COLLECTION - GUIDELINES FOR SECURITY PROTECTION PROFILES
    BS ISO/IEC 19790:2012 Information technology. Security techniques. Security requirements for cryptographic modules
    DD IEC TS 62351-5 : DRAFT OCT 2009 POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 5: SECURITY FOR IEC 60870-5 AND DERIVATIVES
    TS 102 165-2 : 4.2.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); METHODS AND PROTOCOLS; PART 2: PROTOCOL FRAMEWORK DEFINITION; SECURITY COUNTER MEASURES
    ISO/IEC TR 14516:2002 Information technology Security techniques Guidelines for the use and management of Trusted Third Party services
    PD ISO/TR 14742:2010 Financial services. Recommendations on cryptographic algorithms and their use
    BS PD IEC TS 60870-5-7 : 2013 TELECONTROL EQUIPMENT AND SYSTEMS - PART 5-7: TRANSMISSION PROTOCOLS - SECURITY EXTENSIONS TO IEC 60870-5-101 AND IEC 60870-5-104 PROTOCOLS (APPLYING IEC 62351)
    11/30251478 DC : 0 BS EN 1300 - SECURE STORAGE UNITS - CLASSIFICATION FOR HIGH SECURITY LOCKS ACCORDING TO THEIR RESISTANCE TO UNAUTHORIZED OPENING
    PD CEN ISO/TS 17574:2017 Electronic fee collection. Guidelines for security protection profiles
    BS PD IEC TR 61850-90-5 : 2012 COMMUNICATION NETWORKS AND SYSTEMS FOR POWER UTILITY AUTOMATION - PART 90-5: USE OF IEC 61850 TO TRANSMIT SYNCHROPHASOR INFORMATION ACCORDING TO IEEE C37.118
    CSA ISO/IEC TR 14516 : 2004 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES
    CAN/CSA-ISO/IEC TR 14516-04 (R2017) Information Technology - Security Techniques - Guidelines for the use and Management of Trusted Third Party Services (Adopted ISO/IEC TR 14516:2002, first edition, 2002-06-15)
    CSA ISO/IEC TR 14516 : 2004 : R2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES
    TS 133 102 : 13.0.0 DIGITAL CELLULAR TELECOMMUNICATIONS SYSTEM (PHASE 2+) (GSM); UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); 3G SECURITY; SECURITY ARCHITECTURE (3GPP TS 33.102 VERSION 14.1.0 RELEASE 14)
    UNE-EN 1300:2014 Secure storage units - Classification for high security locks according to their resistance to unauthorized opening
    ANSI X9.112-1 : 2009 WIRELESS MANAGEMENT AND SECURITY - PART 1: GENERAL REQUIREMENTS
    ISO/IEC 19790:2012 Information technology Security techniques Security requirements for cryptographic modules
    ANSI X9.117 : 2012 SECURE REMOTE ACCESS - MUTUAL AUTHENTICATION
    S.R. CEN ISO/TS 17574:2017 ELECTRONIC FEE COLLECTION - GUIDELINES FOR SECURITY PROTECTION PROFILES (ISO/TS 17574:2017)
    ISO 15764:2004 Road vehicles Extended data link security
    BS EN 1300:2013 SECURE STORAGE UNITS - CLASSIFICATION FOR HIGH SECURITY LOCKS ACCORDING TO THEIR RESISTANCE TO UNAUTHORIZED OPENING
    IEEE 1815 : 2012 ELECTRIC POWER SYSTEMS COMMUNICATIONS - DISTRIBUTED NETWORK PROTOCOL (DNP3)
    17/30333935 DC : 0 BS EN 1300 - SECURE STORAGE UNITS - CLASSIFICATION FOR HIGH SECURITY LOCKS ACCORDING TO THEIR RESISTANCE TO UNAUTHORIZED OPENING
    ANSI X9.112 : 2016 WIRELESS MANAGEMENT AND SECURITY - PART 1: GENERAL REQUIREMENTS
    IEC TR 61850-90-5:2012 Communication networks and systems for power utility automation - Part 90-5: Use of IEC 61850 to transmit synchrophasor information according to IEEE C37.118
    ISO/TS 16785:2014 Electronic Fee Collection (EFC) Interface definition between DSRC-OBE and external in-vehicle devices
    ISO/TR 14742:2010 Financial services Recommendations on cryptographic algorithms and their use
    I.S. EN 1300:2013 SECURE STORAGE UNITS - CLASSIFICATION FOR HIGH SECURITY LOCKS ACCORDING TO THEIR RESISTANCE TO UNAUTHORIZED OPENING
    IEC TS 62351-5:2013 Power systems management and associated information exchange - Data and communications security - Part 5: Security for IEC 60870-5 and derivatives
    ISO/TS 17574:2017 Electronic fee collection Guidelines for security protection profiles
    EN 1300:2013 SECURE STORAGE UNITS - CLASSIFICATION FOR HIGH SECURITY LOCKS ACCORDING TO THEIR RESISTANCE TO UNAUTHORIZED OPENING
    DIN EN 1300:2014-05 SECURE STORAGE UNITS - CLASSIFICATION FOR HIGH SECURITY LOCKS ACCORDING TO THEIR RESISTANCE TO UNAUTHORIZED OPENING
    CEN ISO/TS 17574:2017 ELECTRONIC FEE COLLECTION - GUIDELINES FOR SECURITY PROTECTION PROFILES (ISO/TS 17574:2017)

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 8825-1:2015 Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1:
    ISO/IEC 9798-1:2010 Information technology Security techniques Entity authentication Part 1: General
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective