We need your consent to use the individual data so that you can see information about your interests, among other things. Click "OK" to give your consent.
IT Security techniques - Entity authentication - Part 2: Mechanisms using authenticated encryption
Translate name
STANDARD published on 5.6.2019
Availability | Sold out |
Price | ONREQUEST excl. VAT |
ON REQUEST |
Designation standards: ISO/IEC 9798-2-ed.4.0
Publication date standards: 5.6.2019
SKU: NS-951429
The number of pages: 15
Approximate weight : 45 g (0.10 lbs)
Country: International technical standard
This document specifies entity authentication mechanisms using authenticated encryption algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third party is involved; two of these are mechanisms to unilaterally authenticate one entity to another, while the other two are mechanisms for mutual authentication of two entities. The remaining mechanisms require an on-line trusted third party for the establishment of a common secret key. They also realize mutual or unilateral entity authentication. Annex A defines Object Identifiers for the mechanisms specified in this document.
Do you want to make sure you use only the valid technical standards?
We can offer you a solution which will provide you a monthly overview concerning the updating of standards which you use.
Would you like to know more? Look at this page.
Latest update: 2025-07-03 (Number of items: 2 207 355)
© Copyright 2025 NORMSERVIS s.r.o.