Codes & Standards - Purchase
CAN/CSA-ISO/IEC-9798-2-95 (R1999)
Information Technology - Security Techniques - Entity Authentication - Part 2: Mechanisms Using Symmetric Encipherment Algorithms (Adopted ISO/IEC 9798-2:1994)
SKU: 2411452
Published by CSA Group
Publication Year 1995
Reaffirmed in 1999
12 pages
Withdrawn
Product Details
Scope
This part of ISO/IEC 9798 specifies entity authentication mechanisms using symmetric encipherment algorithms. Four of them deal with authentication mechanisms between two entities where no trusted third party is involved; two of these four are concerned with the authentication of a single entity (unilateral au thentication), while the other two are mechanisms for mutual authentication of two entities. The remaining mechanisms require a trusted third party for the establishment of a common secret key, a nd realize mutual or unilateral entity authentication.
The mechanisms specified in this part of ISO/IEC 9798 use time variant parameters such as time stamps, sequence numbers, or random numbers, to prevent valid authentication information from being accepted at a later time.
If no trusted third party is involved and a time stamp or sequence number is used, one pass is needed for unilateral authentication, while two passes are needed to achieve mutual authentication. If no trusted third party is involved and a challenge and response method employing random numbers is used, two passes are needed for unilateral authentication, while three passes are required to achieve mutual authentication. If a trusted third party is involved, any additional communication between an entity and the trusted third party requires two extra passes in the communication exchange.
This part of ISO/IEC 9798 specifies entity authentication mechanisms using symmetric encipherment algorithms. Four of them deal with authentication mechanisms between two entities where no trusted third party is involved; two of these four are concerned with the authentication of a single entity (unilateral au thentication), while the other two are mechanisms for mutual authentication of two entities. The remaining mechanisms require a trusted third party for the establishment of a common secret key, a nd realize mutual or unilateral entity authentication.
The mechanisms specified in this part of ISO/IEC 9798 use time variant parameters such as time stamps, sequence numbers, or random numbers, to prevent valid authentication information from being accepted at a later time.
If no trusted third party is involved and a time stamp or sequence number is used, one pass is needed for unilateral authentication, while two passes are needed to achieve mutual authentication. If no trusted third party is involved and a challenge and response method employing random numbers is used, two passes are needed for unilateral authentication, while three passes are required to achieve mutual authentication. If a trusted third party is involved, any additional communication between an entity and the trusted third party requires two extra passes in the communication exchange.