UNLIMITED FREE ACCESS TO THE WORLD'S BEST IDEAS

close
Already an Engineering360 user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your Engineering360 Experience

close
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

ISO/IEC 9798-2

IT Security techniques - Entity authentication - Part 2: Mechanisms using authenticated encryption

active, Most Current
Buy Now
Organization: ISO
Publication Date: 1 June 2019
Status: active
Page Count: 20
ICS Code (IT Security): 35.030
scope:

This document specifies entity authentication mechanisms using authenticated encryption algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third party is involved; two of these are mechanisms to unilaterally authenticate one entity to another, while the other two are mechanisms for mutual authentication of two entities. The remaining mechanisms require an on-line trusted third party for the establishment of a common secret key. They also realize mutual or unilateral entity authentication.

Annex A defines Object Identifiers for the mechanisms specified in this document.

 

Document History

ISO/IEC 9798-2
June 1, 2019
IT Security techniques - Entity authentication - Part 2: Mechanisms using authenticated encryption
This document specifies entity authentication mechanisms using authenticated encryption algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third...
February 15, 2013
Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms TECHNICAL CORRIGENDUM 3
A description is not available for this item.
March 15, 2012
Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms Technical corrigendum 2
This part of ISO/IEC 9798 specifies entity authentication mechanisms using symmetric encipherment algorithms. Four of the mechanisms provide entity authentication between two entities where no...
February 15, 2010
Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms TECHNICAL CORRIGENDUM 1
This part of ISO/IEC 9798 specifies entity authentication mechanisms using symmetric encipherment algorithms. Four of the mechanisms provide entity authentication between two entities where no...
December 15, 2008
Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms
This part of ISO/IEC 9798 specifies entity authentication mechanisms using symmetric encipherment algorithms. Four of the mechanisms provide entity authentication between two entities where no...
February 1, 2004
Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms TECHNICAL CORRIGENDUM 1
A description is not available for this item.
July 15, 1999
Information Technology - Security Techniques - Entity Authentication - Part 2: Mechanisms Using Symmetric Encipherment Algorithms
A description is not available for this item.
December 15, 1994
Information Technology - Security Techniques - Entity Authentication - Part 2: Mechanisms Using Symmetric Encipherment Algorithms
A description is not available for this item.

References

Advertisement