Customer Service:
Mon - Fri: 8:30 am - 6 pm EST

 Most recent

ISO/IEC 9798-2:2019

IT Security techniques - Entity authentication - Part 2: Mechanisms using authenticated encryption

This document specifies entity authentication mechanisms using authenticated encryption algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third party is involved; two of these are mechanisms to unilaterally authenticate one entity to another, while the other two are mechanisms for mutual authentication of two entities. The remaining mechanisms require an on-line trusted third party for the establishment of a common secret key. They also realize mutual or unilateral entity authentication.

Annex A defines Object Identifiers for the mechanisms specified in this document.

Content Provider
International Organization for Standardization [iso]

Others Also Bought

Information technology -- Security techniques -- Entity authentication -- Part 4: Mechanisms using a cryptographic ...
Information technology - Security techniques - Entity authentication - Part 1: General
IT Security techniques - Entity authentication - Part 3: Mechanisms using digital signature techniques
Document History
  • ISO/IEC 9798-2:2008
  • ISO/IEC 9798-2:2008/Cor 1:2010
  • ISO/IEC 9798-2:2008/Cor 2:2012
  • ISO/IEC 9798-2:2008/Cor 3:2013
Included in Packages
This standard is not included in any packages.
Amendments & Corrections
We have no amendments or corrections for this standard.

As the voice of the U.S. standards and conformity assessment system, the American National Standards Institute (ANSI) empowers its members and constituents to strengthen the U.S. marketplace position in the global economy while helping to assure the safety and health of consumers and the protection of the environment.