New Reduced price! ISO/IEC 9798-5 : 2009 View larger

ISO/IEC 9798-5 : 2009

M00028969

New product

ISO/IEC 9798-5 : 2009

INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO-KNOWLEDGE TECHNIQUES

International Organization for Standardization

More details

In stock

$35.10

-55%

$78.00

More info

Table of Contents

Foreword
Introduction
1 Scope
2 Terms and definitions
3 Notation, symbols and abbreviated terms
4 Mechanisms based on identities
5 Mechanisms based on integer factorization
6 Mechanisms based on discrete logarithms with respect
  to prime numbers
7 Mechanisms based on discrete logarithms with respect
  to composite numbers
8 Mechanisms based on asymmetric encryption systems
9 Mechanism based on discrete logarithms with respect
  to elliptic curves
Annex A (normative) - Object identifiers
Annex B (informative) - Principles of zero-knowledge techniques
Annex C (informative) - Guidance on parameter choice and
                        comparison of the mechanisms
Annex D (informative) - Numerical examples
Bibliography

Abstract

Describes entity authentication mechanisms using zero-knowledge techniques: - mechanisms based on identities and providing unilateral authentication; - mechanisms based on integer factorization and providing unilateral authentication; - mechanisms based on discrete logarithms with respect to numbers that are either prime or composite, and providing unilateral authentication; - mechanisms based on asymmetric encryption systems and providing either unilateral authentication, or mutual authentication; - mechanisms based on discrete logarithms on elliptic curves and providing unilateral authentication.

General Product Information

Document Type Standard
Status Current
Publisher International Organization for Standardization
Committee JTC 1