ISO/IEC-9798-3 › IT Security techniques - Entity authentication - Part 3: Mechanisms using digital signature techniques
Show Complete Document History
The following bibliographic material is provided to assist you with your purchasing decision:
This document specifies entity authentication mechanisms using digital signatures based on asymmetric techniques. A digital signature is used to verify the identity of an entity.
Ten mechanisms are specified in this document. The first five mechanisms do not involve an on-line trusted third party and the last five make use of on-line trusted third parties. In both of these two categories, two mechanisms achieve unilateral authentication and the remaining three achieve mutual authentication.
Annex A defines the object identifiers assigned to the entity authentication mechanisms specified in this document.
To find similar documents by classification:
35.030 (IT Security Including encryption)
This document comes with our free Notification Service, good for the life of the document.
This document is available in either Paper or PDF format.
Customers who bought this document also bought:
IPC-R-700Modification, Rework & Repair of Printed Boards & Assemblies
IPC-A-610
Acceptability of Electronic Assemblies (Hardcopy format)
EIA-568
Commercial Building Telecommunications Cabling Standard
Document Number
ISO/IEC 9798-3:2019
Revision Level
3RD EDITION
Status
Current
Publication Date
Jan. 1, 2019
Committee Number
ISO/IEC JTC 1/SC 27