Account:  - Login  |  Webstore  |  Shopping basket cart
English  |  Français  |  Nederlands

Publication details

Publication CODE Title
ISO/IEC 9798-5:2004 (2004-12) INFORMATION TECHNOLOGY -- SECURITY TECHNIQUES -- ENTITY AUTHENTICATION -- PART 5: MECHANISMS USING ZERO-KNOWLEDGE TECHNIQUES
 
Price Excl. VAT Total number of pages, tables and drawings
183.00 € 50.
Description
ISO/IEC 9798-5:2004 specifies authentication mechanisms in the form of exchange of information between a claimant and a verifier.

In accordance with the types of calculations that need to be performed by a claimant and the verifier (see Annex C), the mechanisms specified in ISO/IEC 9798-5:2004 can be classified into four main groups.
  • The first group is characterized by the performance of short modular exponentiations. The challenge size needs to be optimized since it has a proportional impact on workloads.
  • The second group is characterized by the possibility of a "coupon" strategy for the claimant. A verifier can authenticate a claimant without computational power. The challenge size has no impact on workloads.
  • The third group is characterized by the possibility of a "coupon" strategy for the verifier. A verifier without computational power can authenticate a claimant. The challenge size has no impact on workloads.
  • The fourth group has no possibility of a "coupon" strategy.
Class  C990  (IEC PUBLICATIONS IEC PUBLICATIONS)
Available files
EN version
Status
Status IEC PUBLICATION
Situation Withdrawn
Replaced by  ISO/IEC 9798-5:2009
Origin
Committee ISO/IEC JTC 1/SC 27
IT SECURITY TECHNIQUES
Approval
BEC Approval 2004-12-06
ICS-Code (International Standards Classification) 35.030
NBN Status New
IEC publication date 2004-12-06
IEC last modification date 2014-04-14