UNLIMITED FREE ACCESS TO THE WORLD'S BEST IDEAS

close
Already an Engineering360 user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your Engineering360 Experience

close
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

CSA - CAN/CSA-ISO/IEC-9798-4-02

Information technology Security techniques Entity authentication Part 4: Mechanisms using a cryptographic check function

inactive
Organization: CSA
Publication Date: 1 December 2002
Status: inactive
Page Count: 16
scope:

CSA Preface

Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the Canadian Advisory Committee (CAC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T).

This Standard supersedes CAN/CSA-ISO/IEC 9798-4-98 (adoption of ISO/IEC 9798-4:1995). This International Standard was reviewed by the CSA TCIT under the jurisdiction of the Strategic Steering Committee on Information Technology and deemed acceptable for use in Canada. (A committee membership list is available on request from the CSA Project Manager.) From time to time, ISO/IEC may publish addenda, corrigenda, etc. The CSA TCIT will review these documents for approval and publication. For a listing, refer to the CSA Information Products catalogue or CSA Info Update or contact a CSA Sales representative. This Standard has been formally approved, without modification, by the Technical Committee and has been approved as a National Standard of Canada by the Standards Council of Canada.

December 2002

© Canadian Standards Association - 2002

All rights reserved. No part of this publication may be reproduced in any form whatsoever without the prior permission of the publisher. ISO/IEC material is reprinted with permission. Where the words "this International Standard" appear in the text, they should be interpreted as "this National Standard of Canada".

Inquiries regarding this National Standard of Canada should be addressed to

Canadian Standards Association

178 Rexdale Boulevard, Toronto, Ontario, Canada M9W 1R3

1-800-463-6727 • 416-747-4044

www.csa.ca

Document History

December 1, 2002
Information technology - Security techniques - Entity authentication - Part 4: Mechanisms using a cryptographic check function
This part of ISO/IEC 9798 specifies entity authentication mechanisms using a cryptographic check function. Two mechanisms are concerned with the authentication of a single entity (unilateral...
CAN/CSA-ISO/IEC-9798-4-02
December 1, 2002
Information technology Security techniques Entity authentication Part 4: Mechanisms using a cryptographic check function
CSA Preface Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology...
December 1, 2002
Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function
This part of ISO/IEC 9798 specifies entity authentication mechanisms using a cryptographic check function. Two mechanisms are concerned with the authentication of a single entity (unilateral...
January 1, 2002
Information technology - Security techniques - Entity authentication - Part 4: Mechanisms using a cryptographic check function
A description is not available for this item.
January 1, 1998
Information Technology - Security Techniques - Entity Authentication - Part 4: Mechanisms Using a Cryptographic Check Function
This part of ISO/IEC 9798 specifies entity authentication niechanisim using a cryptographic check function. Two inechanisius are concerned with the authentication of a single entity (unilateral...
Advertisement