Language:
    • Available Formats
    • Options
    • Availability
    • Priced From ( in USD )
    • Printed Edition
    • Ships in 1-2 business days
    • $52.00
    • Add to Cart

Customers Who Bought This Also Bought

 

About This Item

 

Full Description

This part of ISO/IEC 9798 specifies entity authentication mechanisms using digital signatures based on asymmetric techniques. Two mechanisms are concerned with the authentication of a single entity (unilateral authentication), while the remaining are mechanisms for mutual authentication of two entities. A digital signature is used to verify the identity of an entity. A trusted third party may be involved.

The mechanisms specified in this part of ISO/IEC 9798 use time variant parameters such as time stamps, sequence numbers, or random numbers, to prevent valid authentication information from being accepted at a later time.

If a time stamp or a sequence number is used, one pass is needed for unilateral authentication, while two passes are needed to achieve mutual authentication. If a challenge and response method employing random numbers is used, two passes are needed for unilateral authentication, while three or four passes (depending on the mechanism employed) are required to achieve mutual authentication.

 

Document History

  1. ISO/IEC 9798-3:2019


    IT Security techniques - Entity authentication - Part 3: Mechanisms using digital signature techniques

    • Most Recent
  2. ISO/IEC 9798-3 Ed. 1.0 en CORR2:2012


    Corrigendum 2 - Information technology -- Security techniques -- Entity authentication -- Part 3: Mechanisms using digital signature techniques -

    • Historical Version
  3. ISO/IEC 9798-3 Ed. 1.0 en CORR1:2009


    Corrigendum 1 - Information technology -- Security techniques -- Entity authentication -- Part 3: Mechanisms using digital signature techniques -

    • Historical Version
  4. ISO/IEC 9798-3:1998

    👀currently
    viewing


    Information technology - Security techniques - Entity authentication - Part 3: Mechanisms using digital signature techniques

    • Historical Version
 

Amendments, rulings, supplements, and errata

  1. ISO/IEC 9798-3/Cor2:2012

    Free
    Download


    Information technology - Security techniques - Entity authentication mechanisms - Part 3: Entity authentication using a public key algorithm - Corrigendum 2

  2. ISO/IEC 9798-3 Ed. 1.0 en CORR2:2012

    Free
    Download


    Corrigendum 2 - Information technology -- Security techniques -- Entity authentication -- Part 3: Mechanisms using digital signature techniques -

  3. ISO/IEC 9798-3/Amd1:2010


    Information technology - Security techniques - Entity authentication mechanisms - Part 3: Entity authentication using a public key algorithm - Amendment 1: .

  4. ISO/IEC 9798-3/Cor1:2009

    Free
    Download


    Information technology - Security techniques - Entity authentication mechanisms - Part 3: Entity authentication using a public key algorithm - Corrigendum

  5. ISO/IEC 9798-3 Ed. 1.0 en CORR1:2009

    Free
    Download


    Corrigendum 1 - Information technology -- Security techniques -- Entity authentication -- Part 3: Mechanisms using digital signature techniques -