ISO/IEC-9798-2 › IT Security techniques - Entity authentication - Part 2: Mechanisms using authenticated encryption
The following bibliographic material is provided to assist you with your purchasing decision:
This document specifies entity authentication mechanisms using authenticated encryption algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third party is involved; two of these are mechanisms to unilaterally authenticate one entity to another, while the other two are mechanisms for mutual authentication of two entities. The remaining mechanisms require an on-line trusted third party for the establishment of a common secret key. They also realize mutual or unilateral entity authentication.
Annex A defines Object Identifiers for the mechanisms specified in this document.
To find similar documents by classification:
35.030 (IT Security Including encryption)
This document comes with our free Notification Service, good for the life of the document.
This document is available in either Paper or PDF format.
Customers who bought this document also bought:
IPC-R-700Modification, Rework & Repair of Printed Boards & Assemblies
IPC-A-610
Acceptability of Electronic Assemblies (Hardcopy format)
EIA-568
Commercial Building Telecommunications Cabling Standard
Document Number
ISO/IEC 9798-2:2019
Revision Level
4TH EDITION
Status
Current
Publication Date
June 1, 2019
Committee Number
ISO/IEC JTC 1/SC 27