We need your consent to use the individual data so that you can see information about your interests, among other things. Click "OK" to give your consent.
IT Security techniques - Entity authentication - Part 2: Mechanisms using authenticated encryption
Translate name
STANDARD published on 5.6.2019
Availability | Sold out |
Price | ON REQUEST excl. VAT |
ON REQUEST |
Designation standards: ISO/IEC 9798-2-ed.4.0
Publication date standards: 5.6.2019
SKU: NS-951429
The number of pages: 15
Approximate weight : 45 g (0.10 lbs)
Country: International technical standard
This document specifies entity authentication mechanisms using authenticated encryption algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third party is involved; two of these are mechanisms to unilaterally authenticate one entity to another, while the other two are mechanisms for mutual authentication of two entities. The remaining mechanisms require an on-line trusted third party for the establishment of a common secret key. They also realize mutual or unilateral entity authentication. Annex A defines Object Identifiers for the mechanisms specified in this document.
Do you want to be sure about the validity of used regulations?
We offer you a solution so that you could use valid and updated legislative regulations.
Would you like to get more information? Look at this page.
Latest update: 2024-07-18 (Number of items: 2 337 971)
© Copyright 2024 NORMSERVIS s.r.o.