ISO/IEC 9798-4:1999
Information technology - Security techniques - Entity authentication - Part 4: Mechanisms using a cryptographic check function

Standard No.
ISO/IEC 9798-4:1999
Release Date
1999
Published By
International Organization for Standardization (ISO)
Status
Replace By
ISO/IEC 9798-4:1999/Cor 1:2009
Latest
ISO/IEC 9798-4:1999/Cor 2:2012
Scope
This part of ISO/IEC 9798 specifies entity authentication mechanisms using a cryptographic check function. Two mechanisms are concerned with the authentication of a single entity (unilateral authentication), while the remaining are mechanisms for mutual authentication of two entities. The mechanisms specified in this part of ISO/IEC 9798 use time variant parameters such as time stamps, sequence numbers, or random numbers, to prevent valid authentication information from being accepted at a later time or more than once. If a time stamp or sequence number is used, one pass is needed for unilateral authentication, while two passes are needed to achieve mutual authentication. If a challenge and response method employing random numbers is used, two passes are needed for unilateral authentication, while three passes are required to achieve mutual authentication. Examples of cryptographic check functions are given in ISO/IEC 9797.

ISO/IEC 9798-4:1999 history

  • 2012 ISO/IEC 9798-4:1999/Cor 2:2012 Information technology - Security techniques - Entity authentication - Part 4: Mechanisms using a cryptographic check function; Technical Corrigendum 2
  • 2009 ISO/IEC 9798-4:1999/Cor 1:2009 Information technology - Security techniques - Entity authentication - Part 4: Mechanisms using a cryptographic check function; Technical Corrigendum 1
  • 1999 ISO/IEC 9798-4:1999 Information technology - Security techniques - Entity authentication - Part 4: Mechanisms using a cryptographic check function
  • 1995 ISO/IEC 9798-4:1995 Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function
Information technology - Security techniques - Entity authentication - Part 4: Mechanisms using a cryptographic check function



Copyright ©2024 All Rights Reserved