This section specifies an entity authentication mechanism using digital signature technology. Two of the authentication mechanisms are for single entity authentication (one-way authentication), and the rest are for mutual authentication of two entities. The mechanisms specified in this section use time-varying parameters such as timestamps, sequence numbers, or random numbers to prevent previously valid authentication information from being accepted later or multiple times. If timestamps or sequence numbers are used, only one pass is required for one-way authentication, while two passes are required for mutual authentication. If a stimulus-response method using random numbers is used, two passes are required for one-way authentication and three or four passes (depending on the mechanism used) for mutual authentication.
ISO/IEC 9798-3:1998 Referenced Document
GB 15851-1995 Information technology--Security techniques--Digital signature scheme giving message recovery
GB/T 15843.1-2008 Information technology.Security techniques.Entity authentication.Part 1: General*, 2008-06-19 Update
ISO/IEC 9798-3:1998 history
2019ISO/IEC 9798-3:2019 IT Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques
2012ISO/IEC 9798-3:1998/Cor 2:2012 Information technology - Security techniques - Entity authentication - Part 3: Mechanisms using digital signature techniques; Technical Corrigendum 2
2010ISO/IEC 9798-3:1998/Amd 1:2010 Information technology — Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques — Amendment 1:.
2009ISO/IEC 9798-3:1998/Cor 1:2009 Information technology — Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques — Technical Corrigendum 1
1998ISO/IEC 9798-3:1998 Information technology - Security techniques - Entity authentication - Part 3: Mechanisms using digital signature techniques
1993ISO/IEC 9798-3:1993 Information technology — Security techniques — Entity authentication mechanisms — Part 3: Entity authentication using a public key algorithm