Abstract Preview
This document specifies entity authentication mechanisms using authenticated encryption algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third party is involved; two of these are mechanisms to unilaterally authenticate one entity to another, while the other two are mechanisms for mutual authentication of two entities. The remaining mechanisms require an on-line trusted third party for the establishment of a common secret key. They also realize mutual or unilateral entity authentication.
Annex A defines Object Identifiers for the mechanisms specified in this document.
General information
-
Status : PublishedPublication date : 2019-06
-
Edition : 4Number of pages : 15
-
Technical Committee:Information security, cybersecurity and privacy protection
-
- ICS :
-
IT Security
Buy this standard
Format | Language | |
---|---|---|
PDF + ePub | ||
Paper |
- CHF88
Life cycle
-
Previously
WithdrawnISO/IEC 9798-2:2008
WithdrawnISO/IEC 9798-2:2008/Cor 1:2010
WithdrawnISO/IEC 9798-2:2008/Cor 2:2012
WithdrawnISO/IEC 9798-2:2008/Cor 3:2013
-
Now
Got a question?
Check out our FAQs
Opening hours:
Monday to Friday - 09:00-12:00, 14:00-17:00 (UTC+1)
Keep up to date with ISO
Sign up to our newsletter for the latest news, views and product information.