Language:
    • Available Formats
    • Options
    • Availability
    • Priced From ( in USD )
    • Printed Edition
    • Ships in 1-2 business days
    • $118.00
    • Add to Cart

Customers Who Bought This Also Bought

 

About This Item

 

Full Description

ISO/IEC 9798-2:2008 specifies entity authentication mechanisms using symmetric encipherment algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third party is involved; two of these are mechanisms to unilaterally authenticate one entity to another, while the other two are mechanisms for mutual authentication of two entities. The remaining mechanisms require a trusted third party for the establishment of a common secret key, and realize mutual or unilateral entity authentication.

The mechanisms specified in ISO/IEC 9798-2:2008 use time variant parameters such as time stamps, sequence numbers, or random numbers to prevent valid authentication information from being accepted at a later time or more than once.

If no trusted third party is involved and a time stamp or sequence number is used, one pass is needed for unilateral authentication, while two passes are needed to achieve mutual authentication. If no trusted third party is involved and a challenge and response method employing random numbers is used, two passes are needed for unilateral authentication, while three passes are required to achieve mutual authentication. If a trusted third party is involved, any additional communication between an entity and the trusted third party requires two extra passes in the communication exchange.

 

Document History

  1. ISO/IEC 9798-2:2019


    IT Security techniques - Entity authentication - Part 2: Mechanisms using authenticated encryption

    • Most Recent
  2. ISO/IEC 9798-2 Ed. 1.0 en CORR2:2012


    Corrigendum 2 - Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms -

    • Historical Version
  3. ISO/IEC 9798-2 Ed. 1.0 en CORR1:2010


    Corrigendum 1 - Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms -

    • Historical Version
  4. ISO/IEC 9798-2:2008

    👀 currently
    viewing


    Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms

    • Historical Version
  5. ISO/IEC 9798-2:2008/Cor3:2013


    Corrigendum

    • Historical Version
  6. ISO/IEC 9798-2 Ed. 1.0 en CORR1:2004


    Corrigendum 1 - Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms -

    • Historical Version
  7. ISO/IEC 9798-2:1999


    Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms

    • Historical Version
 

Amendments, rulings, supplements, and errata

  1. ISO/IEC 9798-2:2008/Cor3:2013

    Free
    Download


    Corrigendum

  2. ISO/IEC 9798-2/Cor2:2012

    Free
    Download


    Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms - Corrigendum 2

  3. ISO/IEC 9798-2 Ed. 1.0 en CORR2:2012

    Free
    Download


    Corrigendum 2 - Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms -

  4. ISO/IEC 9798-2/Cor1:2010

    Free
    Download


    Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms - Corrigendum

  5. ISO/IEC 9798-2 Ed. 1.0 en CORR1:2010

    Free
    Download


    Corrigendum 1 - Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms -