Most recent

ISO/IEC 9798-2:2019

IT Security techniques - Entity authentication - Part 2: Mechanisms using authenticated encryption


This document specifies entity authentication mechanisms using authenticated encryption algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third party is involved; two of these are mechanisms to unilaterally authenticate one entity to another, while the other two are mechanisms for mutual authentication of two entities. The remaining mechanisms require an on-line trusted third party for the establishment of a common secret key. They also realize mutual or unilateral entity authentication.

Annex A defines Object Identifiers for the mechanisms specified in this document.


CONTENT PROVIDER
International Organization for Standardization [iso]

Others Also Bought
Information technology -- Security techniques -- Entity authentication -- Part 4: Mechanisms using a cryptographic ...
Information technology - Security techniques - Entity authentication - Part 1: General
IT Security techniques - Entity authentication - Part 3: Mechanisms using digital signature techniques
Document History
Revises:
  • ISO/IEC 9798-2:2008
  • ISO/IEC 9798-2:2008/Cor 1:2010
  • ISO/IEC 9798-2:2008/Cor 2:2012
  • ISO/IEC 9798-2:2008/Cor 3:2013
Included in Packages
This standard is not included in any packages.
Amendments & Corrections
We have no amendments or corrections for this standard.