BS ISO/IEC 9798-3:1998
Information technology - Security techniques - Entity authentication mechanisms - Mechanisms using digital signature techniques

Standard No.
BS ISO/IEC 9798-3:1998
Release Date
1998
Published By
British Standards Institution (BSI)
Status
 1998-12
Replace By
BS ISO/IEC 9798-3:1998+A1:2010
Latest
BS ISO/IEC 9798-3:2019
Replace
97/643183 DC:1997 BS ISO/IEC 9798-3:1993
Scope
This part of ISO/IEC 9798 specifies entity authentica-tion mechanisms using digital signatures based on asym-metric techniques. Two mechanisms are concerned with the authentication of a single entity (unilateral authenti-cation), while the remaining are mechanisms for mutual authentication of two entities. A digital signature is used to verify the identity of an entity. A trusted third party may be involved. The mechanisms specified in this part of ISO/IEC 9798 use time variant parameters such as time stamps, se-quence numbers, or random numbers, to prevent valid authentication information from being accepted at a later time. If a time stamp or a sequence number is used, one pass is needed for unilateral authentication, while two passes are needed to achieve mutual authentication. If a chal-lenge and response method employing random numbers is used, two passes are needed for unilateral authen-tication, while three or four passes (depending on the mechanism employed) are required to achieve mutual authentication.

BS ISO/IEC 9798-3:1998 history

  • 2019 BS ISO/IEC 9798-3:2019 IT Security techniques. Entity authentication - Mechanisms using digital signature techniques
  • 1998 BS ISO/IEC 9798-3:1998+A1:2010 Information technology - Security techniques - Entity authentication - Mechanisms using digital signature techniques
  • 1998 BS ISO/IEC 9798-3:1998 Information technology - Security techniques - Entity authentication mechanisms - Mechanisms using digital signature techniques
  • 1994 BS ISO/IEC 9798-3:1993 Information technology. Security techniques. Entity authentication mechanisms - Entity authentication using a public key algorithm



Copyright ©2024 All Rights Reserved