ISO/IEC 9798-2:2019
$27.95
IT Security techniques — Entity authentication — Part 2: Mechanisms using authenticated encryption
Published By | Publication Date | Number of Pages |
ISO | 2019-06 | 20 |
If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]
This document specifies entity authentication mechanisms using authenticated encryption algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third party is involved; two of these are mechanisms to unilaterally authenticate one entity to another, while the other two are mechanisms for mutual authentication of two entities. The remaining mechanisms require an on-line trusted third party for the establishment of a common secret key. They also realize mutual or unilateral entity authentication.
Annex A defines Object Identifiers for the mechanisms specified in this document.
Published Code | ISO |
---|---|
Published By | International Organization for Standardization |
Publication Date | 2019-06 |
Pages Count | 20 |
Language | English |
Edition | 4 |
File Size | 1.7 MB |
ICS Codes | 35.030 - IT Security |
Related products
-
CAN/CSA-ISO/IEC 9797-2:13:2013 Edition
Information technology – Security techniques – Message authentication codes (MACs) – Part 2: Mechanisms using…
-
BS EN ISO 11929-2:2021
Determination of the characteristics limits (decision threshold, detection limit and limits of the coverage interval)…
-
BS EN ISO 8835-3:2009+A1:2010:2011 Edition
Inhalational anaesthesia systems. – Transfer and receiving systems of active anaesthetic gas scavenging systems. Published…
-
BS EN ISO 80000-9:2013+A1:2011
Quantities and units – Physical chemistry and molecular physics Published By Publication Date Number of…
-
CSA ISO/IEC 15946-5:20:2020 Edition
Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5:…
-
CSA ISO/IEC 10118-3:19:2019 Edition
IT Security techniques – Hash-functions -Part 3: Dedicated hash-functions Published By Publication Date Number of…
-
BS EN ISO 2719:2016+A1:2021
Determination of flash point. Pensky-Martens closed cup method Published By Publication Date Number of Pages…
-
BS ISO/IEC 14651:2016+A1:2017:2018 Edition
Information technology. International string ordering and comparison. Method for comparing character strings and description of…
-
ISO/IEC 15946-5:2009
Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5:…
-
BS ISO/IEC 8825-7:2015:2018 Edition
Information technology. ASN.1 encoding rules – Specification of Octet Encoding Rules (OER) Published By Publication…
-
BS ISO/IEC 14443-2:2016
Identification cards. Contactless integrated circuit cards. Proximity cards – Radio frequency power and signal interface…
-
ISO/IEC 9797-2:2011
Information technology — Security techniques — Message Authentication Codes (MACs) — Part 2: Mechanisms using…
-
ISO/IEC 10116:2017
Information technology — Security techniques — Modes of operation for an n-bit block cipher Published…
-
BS ISO/IEC 14651:2011+A2:2015
Information technology. International string ordering and comparison. Method for comparing character strings and description of…
-
BS EN ISO 13959:2015:2016 Edition
Water for haemodialysis and related therapies Published By Publication Date Number of Pages BSI 2016…
-
BSI PD CEN/TR 17868:2022
Intelligent transport systems. EU-ICIP. ITS standards deliverables (2022) Published By Publication Date Number of Pages…
-
BS ISO/IEC 14443-4:2016+A1:2016:2017 Edition
Identification cards. Contactless integrated circuit cards. Proximity cards – Transmission protocol Published By Publication Date…
-
CSA ISO/IEC 9798-2:20:2020 Edition
IT Security techniques — Entity authentication — Part 2: Mechanisms using authenticated encryption Published By…
-
ISO/IEC 15946-1:2016
Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1:…
-
CAN/CSA-ISO/IEC 10116:18:2018 Edition
Information technology – Security techniques – Modes of operation for an n-bit block cipher Published…
-
BS ISO/IEC 9796-2:2010:2011 Edition
Information technology. Security techniques. Digital signature schemes giving message recovery – Integer factorization based mechanisms…
-
ISO/IEC 9796-2:2010
Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2:…
-
ISO/IEC 19798:2017
Information technology — Office equipment — Method for the determination of toner cartridge yield for…
-
BS EN 4165-026:2018 – TC:2020 Edition
Tracked Changes. Aerospace series. Connector, electrical, rectangular, modular. Operating temperature 175°C continuous – Accessories for…
-
BS ISO/IEC 14443-3:2016+A1:2016:2017 Edition
Identification cards. Contactless integrated circuit cards. Proximity cards – Initialization and anticollision Published By Publication…
-
BS ISO/IEC 9798-2:2019
IT Security techniques. Entity authentication – Mechanisms using authenticated encryption Published By Publication Date Number…
-
BS ISO/IEC 9797-2:2011:2015 Edition
Information technology. Security techniques. Message Authentication Codes (MACs) – Mechanisms using a dedicated hash-function Published…
-
ISO/IEC 10118-1:2016
Information technology — Security techniques — Hash-functions — Part 1: General Published By Publication Date…
-
BS ISO/IEC 9798-2:2019 – TC:2020 Edition
Tracked Changes. IT Security techniques. Entity authentication – Mechanisms using authenticated encryption Published By Publication…
-
BS EN ISO 14978:2018:2019 Edition
Geometrical product specifications (GPS). General concepts and requirements for GPS measuring equipment Published By Publication…
-
BS ISO/IEC 9798-2:2008 2013
Information technology. Security techniques. Entity authentication – Mechanisms using symmetric encipherment algorithms Published By Publication…
-
BS ISO/IEC 9798-3:1998+A1:2010:2012 Edition
Information technology. Security techniques. Entity authentication – Mechanisms using digital signature techniques Published By Publication…
-
ISO/IEC 15946-5:2017
Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5:…
-
ISO/IEC 9798-3:2019
IT Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques Published…
-
CSA ISO/IEC 9798-3:20:2020 Edition
IT Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques Published…
-
BS ISO/IEC 15693-3:2009+A4:2017:2018 Edition
Identification cards. Contactless integrated circuit cards. Vicinity cards – Anticollision and transmission protocol Published By…
-
BS EN ISO 11929-3:2021
Determination of the characteristic limits (decision threshold, detection limit and limits of the coverage interval)…
-
BS ISO/IEC 9798-3:2019
IT Security techniques. Entity authentication – Mechanisms using digital signature techniques Published By Publication Date…
-
BS EN 62035:2014+A1:2019
Discharge lamps (excluding fluorescent lamps). Safety specifications Published By Publication Date Number of Pages BSI…
-
BS ISO/IEC 9798-2:2019 – TC:2020 Edition
Tracked Changes. IT Security techniques. Entity authentication – Mechanisms using authenticated encryption Published By Publication…