GB/T 15843.3-2008
Information technology.Security techniques.Entity authentication.Part3:Mechanisms using digital signature techniques (English Version)

Standard No.
GB/T 15843.3-2008
Language
Chinese, Available in English version
Release Date
2008
Published By
General Administration of Quality Supervision, Inspection and Quarantine of the People‘s Republic of China
Status
 2016-11
Replace By
GB/T 15843.3-2016
Latest
GB/T 15843.3-2023
Replace
GB/T 15843.3-1998
Scope
This part specifies the entity authentication mechanism using digital signature technology. Two authentication mechanisms are authentication of a single entity (one-way authentication), and the rest are mutual authentication mechanisms of two entities. The mechanisms specified in this standard use time-varying parameters such as timestamps, sequence numbers or random numbers to prevent previous authentication information from being accepted later or accepted multiple times. If timestamps or sequence numbers are used, only one pass is required for single-phase authentication, while two passes are required for mutual authentication. If a stimulus-response approach using random numbers is used, two passes are required for one-way authentication, and three or four passes (depending on the mechanism used) for mutual authentication.

GB/T 15843.3-2008 Referenced Document

  • GB 15851-1995 Information technology--Security techniques--Digital signature scheme giving message recovery
  • GB/T 15843.1-2008 Information technology.Security techniques.Entity authentication.Part 1: General

GB/T 15843.3-2008 history

  • 2023 GB/T 15843.3-2023 Information Technology Security Technical Entity Authentication Part 3: Mechanisms Using Digital Signature Technology
  • 2016 GB/T 15843.3-2016 Information technology.Security techniques.Entity authentication.Part 3:Mechanisms using digital signature techniques
  • 2008 GB/T 15843.3-2008 Information technology.Security techniques.Entity authentication.Part3:Mechanisms using digital signature techniques
  • 1998 GB/T 15843.3-1998 Information technology--Security techniques--Entity authentication--Part 3: Mechanisms using asymmetric signature techniques
Information technology.Security techniques.Entity authentication.Part3:Mechanisms using digital signature techniques

GB/T 15843.3-2008 -All Parts




Copyright ©2024 All Rights Reserved