Codes & Standards - Purchase
CAN/CSA-ISO/IEC 9798-3-94 (R1999)
Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 3: Entity Authentication Using a Public Key Algorithm (Adopted ISO/IEC 9798-3:1993)
SKU: 2410179
Published by CSA Group
Publication Year 1994
Reaffirmed in 1999
9 pages
Withdrawn
Product Details
Scope
This part of ISO/IEC 9798 specifies entity authentication mechanisms using a public key algorithm. Two mechanisms are concerned with the authentication of a single entity (unilateral authentication), while the remaining are mechanisms for mutual authentication of two entites. A digital signature is used to ve rify the identity of an entity. A trusted third party may be involved.
The mechanisms specified in this part of ISO/IEC 9798 use time variant parameters such as time stamps, sequence numbers, or random numbers, to prevent valid authentication information from being accepted at a later time.
If a time stamp or a sequence number is used, one pass is needed for unilateral authentication, while two passes are needed to achieve mutual authentication. If a challenge and response method employing random numbers is used, two passes are needed for unilateral authentication, while three or four passes (depending on the mechanism employed) are required to achieve mutual authentication.
This part of ISO/IEC 9798 specifies entity authentication mechanisms using a public key algorithm. Two mechanisms are concerned with the authentication of a single entity (unilateral authentication), while the remaining are mechanisms for mutual authentication of two entites. A digital signature is used to ve rify the identity of an entity. A trusted third party may be involved.
The mechanisms specified in this part of ISO/IEC 9798 use time variant parameters such as time stamps, sequence numbers, or random numbers, to prevent valid authentication information from being accepted at a later time.
If a time stamp or a sequence number is used, one pass is needed for unilateral authentication, while two passes are needed to achieve mutual authentication. If a challenge and response method employing random numbers is used, two passes are needed for unilateral authentication, while three or four passes (depending on the mechanism employed) are required to achieve mutual authentication.