IEC > Webstore > Search > Register > Check out > Payment > Order confirmation

Publication detail

 
Reference ISO/IEC 9798-6 ed2.0 withdrawn corrigendum
> preview
Title Information technology -- Security techniques -- Entity authentication -- Part 6: Mechanisms using manual data transfer
Publication date 2010-11-17
Format, price
(Swiss francs)
and language
138.- 35 pages
138.- 799 Kb
 
Abstract ISO/IEC 9798-6:2010 specifies eight entity authentication mechanisms based on manual data transfer between authenticating devices. Four of these mechanisms are improved versions of mechanisms specified in ISO/IEC 9798-6:2005 since they use less user input and achieve more security. Such mechanisms can be appropriate in a variety of circumstances where there is no need for an existing public key infrastructure, shared secret keys or passwords. One such application occurs in personal networks, where the owner of two personal devices capable of wireless communications wishes them to perform an entity authentication procedure as part of the process of preparing them for use in the network. These mechanisms can also be used to support key management functions.

ISO/IEC 9798-6:2010 specifies mechanisms in which entity authentication is achieved by

  • manually transferring short data strings from one device to the other, or

  • manually comparing short data strings output by the two devices.



In ISO/IEC 9798-6:2010, the meaning of the term entity authentication is different from the meaning applied in other parts of ISO/IEC 9798. Instead of one device verifying that the other device has a claimed identity (and vice versa), both devices in possession of a user verify that they correctly share a data string with the other device at the time of execution of the mechanism. This data string could contain identifiers (and/or public keys) for one or both of the devices.
Technical Committee JTC 1/SC 27 - IT security techniques  RSS
ICS Codes
35.040 Character sets and information coding
*Including coding of audio, picture, multimedia and hypermedia information, IT security techniques, encryption, bar coding, electronic signatures, etc.
 
Replaced by
 
Work in progress
ProjectStage codeForecast publication date
No project under development--


Search

>> Advanced search

Quick access by ref. number



Basket

Your basket is empty
Your country is :
Your TVA is : You must login...

Payment

Accepted credit cards:
Prices in CHF (Swiss francs)
Request a pro forma to pay by bank transfer or cheque
Learn how to share your publications with your colleagues, using networking options
Prices in CHF (Swiss francs)
We accept the following credit cards:
To pay by bank transfer: request a pro forma
If you purchase regularly through the IEC Webstore you can open a corporate account

Just Published

>> Published in the last 30 days

Bestsellers

  1. IEC 60601-1-2 Ed. 4.0
  2. IEC 60825-1 Ed. 3.0
  3. IEC 60529 Ed. 2.2
  4. IEC 61000-4-5 Ed. 3.0
  5. IEC 60068-2-30 Ed. 3.0
  6. IEC 60079-0 Ed. 6.0
  7. IEC 60811-501 Ed. 1.0
  8. IEC 62133 Ed. 2.0
  9. IEC 60950-1 Ed. 2.2
  10. IEC 61000-4-2 Ed. 2.0