UNLIMITED FREE ACCESS TO THE WORLD'S BEST IDEAS

close
Already an Engineering360 user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your Engineering360 Experience

close
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

ISO/IEC 9798-3

IT Security techniques - Entity authentication - Part 3: Mechanisms using digital signature techniques

active, Most Current
Buy Now
Organization: ISO
Publication Date: 1 January 2019
Status: active
Page Count: 30
ICS Code (IT Security): 35.030
scope:

This document specifies entity authentication mechanisms using digital signatures based on asymmetric techniques. A digital signature is used to verify the identity of an entity.

Ten mechanisms are specified in this document. The first five mechanisms do not involve an on-line trusted third party and the last five make use of on-line trusted third parties. In both of these two categories, two mechanisms achieve unilateral authentication and the remaining three achieve mutual authentication.

Annex A defines the object identifiers assigned to the entity authentication mechanisms specified in this document.

Document History

ISO/IEC 9798-3
January 1, 2019
IT Security techniques - Entity authentication - Part 3: Mechanisms using digital signature techniques
This document specifies entity authentication mechanisms using digital signatures based on asymmetric techniques. A digital signature is used to verify the identity of an entity. Ten mechanisms are...
March 15, 2012
Information technology - security techniques - entity Authentication - Part 3: Mechanisms using digital signature techniques Technical corrigendum 2
A description is not available for this item.
June 1, 2010
Information technology - Security techniques - Entity authentication - Part 3: Mechanisms using digital signature techniques AMENDMENT 1
A description is not available for this item.
September 15, 2009
Information technology - Security techniques - Entity authentication - Part 3: Mechanisms using digital signature techniques TECHNICAL CORRIGENDUM 1
A description is not available for this item.
October 15, 1998
Information Technology - Security Techniques - Entity Authentication - Part 3: Mechanisms Using Digital Signature Techniques
A description is not available for this item.
November 15, 1993
Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 3: Entity Authentication Using a Public Key Algorithm
A description is not available for this item.

References

Advertisement