• There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

INCITS/ISO/IEC 9798-2 : 2010

Superseded
Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by
superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS
Available format(s)

Hardcopy , PDF

Superseded date

08-10-2020

Language(s)

English

Published date

01-01-2010

Foreword
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and notation
5 Requirements
6 Mechanisms not involving a trusted third party
7 Mechanisms involving a trusted third party
Annex A (normative) - OIDs and ASN.1 syntax
Annex B (informative) - Use of text fields
Annex C (informative) - Properties of entity
        authentication mechanisms
Bibliography

Describes entity authentication mechanisms using symmetric encipherment algorithms.

Committee
CS1
DocumentType
Standard
Pages
22
PublisherName
Information Technology Industry Council
Status
Superseded
SupersededBy

Standards Relationship
ISO/IEC 9798-2:2008 Identical

ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
ISO/IEC 19772:2009 Information technology Security techniques Authenticated encryption
ISO/IEC 8825-1:2015 Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1:
ISO/IEC 11770-2:2008 Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques
ISO/IEC 9798-5:2009 Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques
ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
ISO/IEC 18014-1:2008 Information technology Security techniques Time-stamping services Part 1: Framework
ISO/IEC 9798-1:2010 Information technology Security techniques Entity authentication Part 1: General

View more information
£95.24
Excluding VAT

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.