Standard ISO/IEC 9798-4-ed.2.0 16.12.1999 preview

ISO/IEC 9798-4-ed.2.0

Information technology - Security techniques - Entity authentication - Part 4: Mechanisms using a cryptographic check function

Translate name

STANDARD published on 16.12.1999


Language
Format
AvailabilityIN STOCK
Price84.20 USD excl. VAT
84.20 USD

The information about the standard:

Designation standards: ISO/IEC 9798-4-ed.2.0
Publication date standards: 16.12.1999
SKU: NS-943088
The number of pages: 7
Approximate weight : 21 g (0.05 lbs)
Country: International technical standard
Category: Technical standards ISO

The category - similar standards:

IT Security

Annotation of standard text ISO/IEC 9798-4-ed.2.0 :

This part of ISO/IEC 9798 specifies entity authentication mechanisms using a cryptographic check function. Two mechanisms are concerned with the authentication of a single entity (unilateral authentication), while the remaining are mechanisms for mutual authentication of two entities. The mechanisms specified in this part of ISO/IEC 9798 use time variant parameters such as time stamps, sequence numbers, or random numbers, to prevent valid authentication information from being accepted at a later time or more than once. If a time stamp or sequence number is used, one pass is needed for unilateral authentication, while two passes are needed to achieve mutual authentication. If a challenge and response method employing random numbers is used, two passes are needed for unilateral authentication, while three passes are required to achieve mutual authentication. Examples of cryptographic check functions are given in ISO/IEC 9797.

These corrections apply to this standard:

ISO/IEC 9798-4-ed.2.0/Cor.1 Correction

Information technology - Security techniques - Entity authentication - Part 4: Mechanisms using a cryptographic check function - Technical Corrigendum 1

Correction published on 9.9.2009

Selected format:

Show all technical information.
1.30 USD


IN STOCK
ISO/IEC 9798-4-ed.2.0/Cor.2 Correction

Information technology - Security techniques - Entity authentication - Part 4: Mechanisms using a cryptographic check function - Technical Corrigendum 2

Correction published on 13.7.2012

Selected format:

Show all technical information.
1.30 USD


IN STOCK

We recommend:

Updating of laws

Do you want to be sure about the validity of used regulations?
We offer you a solution so that you could use valid and updated legislative regulations.
Would you like to get more information? Look at this page.




Cookies Cookies

We need your consent to use the individual data so that you can see information about your interests, among other things. Click "OK" to give your consent.

You can refuse consent here.

Here you can customize your cookie settings according to your preferences.

We need your consent to use the individual data so that you can see information about your interests, among other things.