We need your consent to use the individual data so that you can see information about your interests, among other things. Click "OK" to give your consent.
                IT Security techniques - Entity authentication - Part 2: Mechanisms using authenticated encryption
Translate name
STANDARD published on 5.6.2019
| Availability | Sold out | 
| Price | ONREQUEST excl. VAT | 
| ON REQUEST | 
    
        Designation standards: ISO/IEC 9798-2-ed.4.0
                
                
                
               
                Publication date standards:  5.6.2019
                  SKU:  NS-951429
          The number of pages: 15
Approximate weight : 45 g (0.10 lbs)
        Country:          International technical standard
                
                
              
This document specifies entity authentication mechanisms using authenticated encryption algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third party is involved; two of these are mechanisms to unilaterally authenticate one entity to another, while the other two are mechanisms for mutual authentication of two entities. The remaining mechanisms require an on-line trusted third party for the establishment of a common secret key. They also realize mutual or unilateral entity authentication. Annex A defines Object Identifiers for the mechanisms specified in this document.
      Do you want to make sure you use only the valid technical standards? 
      We can offer you a solution which will provide you a monthly overview concerning the updating of standards which you use.
     
      Would you like to know more? Look at this page.
    
Latest update:  2025-11-03 (Number of items: 2 242 248) 
© Copyright 2025 NORMSERVIS s.r.o.