ISO/IEC 9798-5:2009
Current
Current
The latest, up-to-date edition.
Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques
Available format(s)
Hardcopy , PDF
Language(s)
English
Published date
11-12-2009
€192.00
Excluding VAT
ISO/IEC 9798-5:2009 specifies entity authentication mechanisms using zero-knowledge techniques:
- mechanisms based on identities and providing unilateral authentication;
- mechanisms based on integer factorization and providing unilateral authentication;
- mechanisms based on discrete logarithms with respect to numbers that are either prime or composite, and providing unilateral authentication;
- mechanisms based on asymmetric encryption systems and providing either unilateral authentication, or mutual authentication;
- mechanisms based on discrete logarithms on elliptic curves and providing unilateral authentication.
These mechanisms are constructed using the principles of zero-knowledge techniques, but they are not necessarily zero-knowledge according to the strict definition for every choice of parameters.
| Committee |
ISO/IEC JTC 1/SC 27
|
| DocumentType |
Standard
|
| Pages |
53
|
| PublisherName |
International Organization for Standardization
|
| Status |
Current
|
| Supersedes |
| Standards | Relationship |
| INCITS/ISO/IEC 9798-5 : 2009(R2020) | Identical |
| BS ISO/IEC 9798-5:2009 | Identical |
| NEN ISO/IEC 9798-5 : 2010 | Identical |
| CSA ISO/IEC 9798-5:10 (R2020) | Identical |
| INCITS/ISO/IEC 9798-5:2009(R2025) | Identical |
| INCITS/ISO/IEC 9798-5 : 2010 | Identical |
| INCITS/ISO/IEC 9798-5:2009(R2025) | Identical |
| ISO/IEC 29192-4:2013 | Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques |
| 07/30154069 DC : 0 | BS ISO/IEC 24727-3 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 3: APPLICATION INTERFACE |
| BS ISO/IEC 14888-2:2008 | Information technology. Security techniques. Digital signatures with appendix Integer factorization based mechanisms |
| ISO/IEC 9798-2:2008 | Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms |
| 07/30107757 DC : 0 | BS ISO/IEC 24708 - INFORMATION TECHNOLOGY - BIOAPI INTERWORKING PROTOCOL |
| INCITS/ISO/IEC 9798-2 : 2010 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
| ANSI X9.117 : 2012 | SECURE REMOTE ACCESS - MUTUAL AUTHENTICATION |
| ISO/IEC 15149-4:2016 | Information technology — Telecommunications and information exchange between systems — Magnetic field area network (MFAN) — Part 4: Security Protocol for Authentication |
| BS ISO/IEC 9798-2:2008 | Information technology. Security techniques. Entity authentication Mechanisms using symmetric encipherment algorithms |
| BS ISO/IEC 15149-4:2016 | Information technology. Telecommunications and information exchange between systems. Magnetic field area network (MFAN) Security Protocol for Authentication |
| 17/30349181 DC : 0 | BS ISO/IEC 24760-1 AMENDMENT 1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IDENTITY MANAGEMENT - PART 1: TERMINOLOGY AND CONCEPTS |
| BS ISO/IEC 19790:2012 | Information technology. Security techniques. Security requirements for cryptographic modules |
| PD ISO/TR 14742:2010 | Financial services. Recommendations on cryptographic algorithms and their use |
| 07/30163724 DC : 0 | BS ISO/IEC 24727-4 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS PROGRAMMING INTERFACE - PART 4: API ADMINISTRATION |
| 12/30228421 DC : 0 | BS ISO/IEC 29192-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES |
| 15/30297775 DC : 0 | BS ISO/IEC 7816-8 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS - PART 8: COMMANDS AND MECHANISMS FOR SECURITY OPERATIONS |
| ISO/IEC 29167-17:2015 | Information technology — Automatic identification and data capture techniques — Part 17: Crypto suite cryptoGPS security services for air interface communications |
| ANSI X9.112-1 : 2009 | WIRELESS MANAGEMENT AND SECURITY - PART 1: GENERAL REQUIREMENTS |
| BS ISO/IEC 29192-4 : 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES |
| ANSI X9.112 : 2016 | WIRELESS MANAGEMENT AND SECURITY - PART 1: GENERAL REQUIREMENTS |
| ISO/TR 14742:2010 | Financial services — Recommendations on cryptographic algorithms and their use |
| 15/30302611 DC : 0 | BS ISO/IEC 15149-4 - INFORMATION TECHNOLOGY - TELECOMMUNICATIONS AND INFORMATION EXCHANGE BETWEEN SYSTEMS - MAGNETIC FIELD AREA NETWORK (MFAN) - PART 4: SECURITY PROTOCOL FOR AUTHORIZATION |
| ISO/IEC 7816-8:2016 | Identification cards — Integrated circuit cards — Part 8: Commands and mechanisms for security operations |
| ISO/IEC 14888-2:2008 | Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms |
| DD ENV 13729:2000 | Health informatics. Secure user identification. Strong authentication microprocessor cards |
| INCITS/ISO/IEC 29192-4 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES |
| BS ISO/IEC 7816-8:2016 | Identification cards. Integrated circuit cards Commands and mechanisms for security operations |
| ISO/IEC 19790:2012 | Information technology — Security techniques — Security requirements for cryptographic modules |
| INCITS/ISO/IEC 29192-4:2013(R2019) | Information technology - Security techniques - Lightweight cryptography - Part 4: Mechanisms using asymmetric techniques |
| ISO/IEC 18033-1:2015 | Information technology — Security techniques — Encryption algorithms — Part 1: General |
| ISO/IEC 18032:2005 | Information technology — Security techniques — Prime number generation |
| ISO/IEC 15946-1:2016 | Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General |
| ISO/IEC 8825-1:2015 | Information technology — ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) — Part 1: |
| ISO/IEC 18033-2:2006 | Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers |
| ISO/IEC 10118-3:2004 | Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions |
| ISO/IEC 14888-2:2008 | Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms |
| ISO/IEC 11770-3:2015 | Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques |
| ISO/IEC 9798-1:2010 | Information technology — Security techniques — Entity authentication — Part 1: General |
Summarise
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.