ISO/IEC 9798-2:2019
IT Security techniques - Entity authentication - Part 2: Mechanisms using authenticated encryption
Abstract
This document specifies entity authentication mechanisms using authenticated encryption algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third party is involved; two of these are mechanisms to unilaterally authenticate one entity to another, while the other two are mechanisms for mutual authentication of two entities. The remaining mechanisms require an on-line trusted third party for the establishment of a common secret key. They also realize mutual or unilateral entity authentication.
Annex A defines Object Identifiers for the mechanisms specified in this document.
Annex A defines Object Identifiers for the mechanisms specified in this document.
Additional information
Publication type | International Standard |
---|---|
Publication date | 2019-06-05 |
Edition | 4.0 |
Available language(s) | English |
TC/SC | ISO/IEC JTC 1/SC 27 - Information security, cybersecurity and privacy protectionrss |
ICS | 35.030 - IT Security |
Pages | 15 |
File size | 1591 KB |
The following test report forms are related:
Share your publications
Learn how to share your publications with your colleagues, using networking options.
Payment information
Our prices are in Swiss francs (CHF). We accept all major credit cards (American Express, Mastercard and Visa, JCB and CUP), PayPal and bank transfers as form of payment.
Keep in touch
Keep up to date with new publication releases and announcements with our free IEC Just Published email newsletter.
Contact customer services
Please send your enquiry by email or call us on +41 22 919 02 11 between 09:00 – 16:00 CET Monday to Friday.