ISO/IEC 9798-5:2009
Current
The latest, up-to-date edition.
Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
English
12-11-2009
ISO/IEC 9798-5:2009 specifies entity authentication mechanisms using zero-knowledge techniques:
- mechanisms based on identities and providing unilateral authentication;
- mechanisms based on integer factorization and providing unilateral authentication;
- mechanisms based on discrete logarithms with respect to numbers that are either prime or composite, and providing unilateral authentication;
- mechanisms based on asymmetric encryption systems and providing either unilateral authentication, or mutual authentication;
- mechanisms based on discrete logarithms on elliptic curves and providing unilateral authentication.
These mechanisms are constructed using the principles of zero-knowledge techniques, but they are not necessarily zero-knowledge according to the strict definition for every choice of parameters.
Committee |
ISO/IEC JTC 1/SC 27
|
DocumentType |
Standard
|
Pages |
53
|
PublisherName |
International Organization for Standardization
|
Status |
Current
|
Supersedes |
Standards | Relationship |
INCITS/ISO/IEC 9798-5 : 2009(R2020) | Identical |
BS ISO/IEC 9798-5:2009 | Identical |
NEN ISO/IEC 9798-5 : 2010 | Identical |
CSA ISO/IEC 9798-5:10 (R2020) | Identical |
SANS 9798-5:2010(R2022) | Identical |
CSA ISO/IEC 9798-5 : 2010 : R2015 | Identical |
CSA ISO/IEC 9798-5 : 2010 | Identical |
INCITS/ISO/IEC 9798-5 : 2010 | Identical |
SANS 9798-5 : 3ED 2010(R2017) | Identical |
ISO/IEC 29192-4:2013 | Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques |
07/30154069 DC : 0 | BS ISO/IEC 24727-3 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 3: APPLICATION INTERFACE |
BS ISO/IEC 14888-2:2008 | Information technology. Security techniques. Digital signatures with appendix Integer factorization based mechanisms |
ISO/IEC 9798-2:2008 | Information technology Security techniques Entity authentication Part 2: Mechanisms using symmetric encipherment algorithms |
CSA ISO/IEC 9798-2:2010 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
07/30107757 DC : 0 | BS ISO/IEC 24708 - INFORMATION TECHNOLOGY - BIOAPI INTERWORKING PROTOCOL |
INCITS/ISO/IEC 9798-2 : 2010 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
CSA ISO/IEC 9798-2 : 2010 : R2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
ANSI X9.117 : 2012 | SECURE REMOTE ACCESS - MUTUAL AUTHENTICATION |
ISO/IEC 15149-4:2016 | Information technology Telecommunications and information exchange between systems Magnetic field area network (MFAN) Part 4: Security Protocol for Authentication |
BS ISO/IEC 9798-2:2008 | Information technology. Security techniques. Entity authentication Mechanisms using symmetric encipherment algorithms |
14/30275227 DC : 0 | BS ISO/IEC 29167-17 - INFORMATION TECHNOLOGY - AUTOMATIC IDENTIFICATION AND DATA CAPTURE TECHNIQUES - PART 17: AIR INTERFACE FOR SECURITY SERVICES CRYPTO SUITE CRYPTOGPS |
BS ISO/IEC 15149-4:2016 | Information technology. Telecommunications and information exchange between systems. Magnetic field area network (MFAN) Security Protocol for Authentication |
17/30349181 DC : 0 | BS ISO/IEC 24760-1 AMENDMENT 1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IDENTITY MANAGEMENT - PART 1: TERMINOLOGY AND CONCEPTS |
BS ISO/IEC 19790:2012 | Information technology. Security techniques. Security requirements for cryptographic modules |
PD ISO/TR 14742:2010 | Financial services. Recommendations on cryptographic algorithms and their use |
CSA ISO/IEC 7816-8 : 2018 | IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS - PART 8: COMMANDS AND MECHANISMS FOR SECURITY OPERATIONS |
CSA ISO/IEC 9798-2 : 2010 : INC : COR 2 : 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
CSA ISO/IEC 14888-2 : 2009 : R2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 2: INTEGER FACTORIZATION BASED MECHANISMS |
ETR 237 : 20001 | SECURITY TECHNIQUES ADVISORY GROUP (STAG) - BASELINE SECURITY STANDARDS - FEATURES AND MECHANISMS |
07/30163724 DC : 0 | BS ISO/IEC 24727-4 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS PROGRAMMING INTERFACE - PART 4: API ADMINISTRATION |
12/30228421 DC : 0 | BS ISO/IEC 29192-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES |
15/30297775 DC : 0 | BS ISO/IEC 7816-8 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS - PART 8: COMMANDS AND MECHANISMS FOR SECURITY OPERATIONS |
ISO/IEC 29167-17:2015 | Information technology Automatic identification and data capture techniques Part 17: Crypto suite cryptoGPS security services for air interface communications |
CSA ISO/IEC 14888-2 : 2009 : INC : COR 1 : 2016 : R201400 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 2: INTEGER FACTORIZATION BASED MECHANISMS |
ANSI X9.112-1 : 2009 | WIRELESS MANAGEMENT AND SECURITY - PART 1: GENERAL REQUIREMENTS |
BS ISO/IEC 29192-4 : 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES |
CAN/CSA-ISO/IEC 15149-4:18 | Information technology — Telecommunications and information exchange between systems — Magnetic field area network (MFAN) — Part 4: Security Protocol for Authentication (Adopted ISO/IEC 15149-4:2016, first edition, 2016-01-15) |
ANSI X9.112 : 2016 | WIRELESS MANAGEMENT AND SECURITY - PART 1: GENERAL REQUIREMENTS |
ISO/TR 14742:2010 | Financial services Recommendations on cryptographic algorithms and their use |
15/30302611 DC : 0 | BS ISO/IEC 15149-4 - INFORMATION TECHNOLOGY - TELECOMMUNICATIONS AND INFORMATION EXCHANGE BETWEEN SYSTEMS - MAGNETIC FIELD AREA NETWORK (MFAN) - PART 4: SECURITY PROTOCOL FOR AUTHORIZATION |
CSA ISO/IEC 14888-2 :2009 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 2: INTEGER FACTORIZATION BASED MECHANISMS |
CAN/CSA-ISO/IEC 29167-17:16 | Information technology Automatic identification and data capture techniques Part 17: Crypto suite cryptoGPS security services for air interface communications (Adopted ISO/IEC 29167-17:2015, first edition, 2015-06-01) |
ISO/IEC 7816-8:2016 | Identification cards Integrated circuit cards Part 8: Commands and mechanisms for security operations |
ISO/IEC 14888-2:2008 | Information technology Security techniques Digital signatures with appendix Part 2: Integer factorization based mechanisms |
DD ENV 13729:2000 | Health informatics. Secure user identification. Strong authentication microprocessor cards |
INCITS/ISO/IEC 29192-4 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES |
BS ISO/IEC 7816-8:2016 | Identification cards. Integrated circuit cards Commands and mechanisms for security operations |
ISO/IEC 19790:2012 | Information technology — Security techniques — Security requirements for cryptographic modules |
ISO/IEC 18033-1:2015 | Information technology Security techniques Encryption algorithms Part 1: General |
ISO/IEC 18032:2005 | Information technology Security techniques Prime number generation |
ISO/IEC 15946-1:2016 | Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General |
ISO/IEC 8825-1:2015 | Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1: |
ISO/IEC 18033-2:2006 | Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers |
ISO/IEC 10118-3:2004 | Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions |
ISO/IEC 14888-2:2008 | Information technology Security techniques Digital signatures with appendix Part 2: Integer factorization based mechanisms |
ISO/IEC 11770-3:2015 | Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
ISO/IEC 9798-1:2010 | Information technology Security techniques Entity authentication Part 1: General |
Please Login or Create an Account so you can add users to your Multi user PDF Later.
Important note : All end users must be registered with an Account prior to user licenses being assigned.
Users cannot be edited or removed once added to your Multi user PDF.
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.