Norm

NEN-ISO/IEC 9798-5:2004 en

Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques

  • Deze norm is ingetrokken sinds 12-01-2010

131,28

Over deze norm

Status Ingetrokken
Aantal pagina's 50
Commissie Informatiebeveiliging, Cyber security en Privacy
Gepubliceerd op 01-12-2004
Taal Engels
This part of ISO/IEC 9798 specifies entity authentication mechanisms using zero-knowledge techniques. ç Clause 5 specifies mechanisms (already present in the first edition, ISO/IEC 9798-4:1999) based on identities and providing unilateral authentication. They have been repaired after the withdrawal of ISO/IEC 9796:1991. ç Clause 6 specifies mechanisms (inserted in this second edition) based on integer factorization and providing unilateral authentication. ç Clauses 7 and 8 specify mechanisms based on discrete logarithms with respect to numbers that are either prime (see Clause 7, mechanisms already present in the first edition) or composite (see Clause 8, mechanisms inserted in the second edition), and providing unilateral authentication. ç Clause 9 specifies mechanisms based on asymmetric encipherment systems and providing either unilateral (see 9.3, mechanisms already present in the first edition), or mutual (see 9.4, mechanisms inserted in the second edition) authentication. The verifier associates the correct verification key with the claimant by any appropriate procedure, for example, by retrieving it from a certificate. Such procedures are outside the scope of this part of ISO/IEC 9798.

Details

ICS-code 35.040
Nederlandse titel Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques
Engelse titel Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques
Vervangen door

Winkelwagen

Subtotaal:

Ga naar winkelwagen