Information Technology - Security Techniques - Entity Authentication - Part 4: Mechanisms Using a Cryptographic Check Function (Adopted ISO/IEC 9798-4:1999, second edition, 1999-12-15)
Formats Available:
Online,Print
Receive a printed paperback book
Shipped via Canada Post
Receive a printed binder(s)
Shipped via Canada Post
Receive a printed hardcover book
Shipped via Canada Post
Receive access to an electronic copy viewable in a web browser or the Orderline Reader app (Click here to view a demo)
Orderline Reader app available for Windows, Mac, Android, and iOS (Click here to download)
Offline access via Orderline Reader app
Reflowable layout suitable for viewing on any device Orderline Reader app
Font-size controls
Text to speech
Built-in search feature
Google and Wikipedia lookup
Ability to add custom highlights, bookmarks, and notes
Can be registered on up to 3 personal devices total (example: computer, laptop, phone)
Receive access to an online PDF copy viewable in a web browser
Offline access via bookmark to a cached web page
Single user access on up to 3 devices
All online copies are watermarked with your license information
Receive access to an online course viewable in a web browser
Receive access to an online course viewable in a web browser
Receive access to an interactive online copy viewable in a web browser (Click here to view a demo)
Searchable
Printable
Expandable images
Drop-down definitions
Links
Receive access to an online webinar hosted through Zoom
Product Overview
CAN/CSA-ISO/IEC 9798-4-02 (R2016)
CSA Group
Information Technology - Security Techniques - Entity Authentication - Part 4: Mechanisms Using a Cryptographic Check Function (Adopted ISO/IEC 9798-4:1999, second edition, 1999-12-15)
Total
As low as$66.00
More About This Product
Description
Preface Technical corrigendum #1 to this standard is available. Scope This part of ISO/IEC 9798 specifies entity authentication mechanisms using a cryptographic check function. Two mechanisms are concerned with the authentication of a single entity (unilateral authentication), while the remaining are mechanisms for mutual authentication of two entities. The mechanisms specified in this part of ISO/IEC 9798 use time variant parameters such as time stamps, sequence numbers, or random numbers, to prevent valid authentication information from being accepted at a later time or more than once. If a time stamp or sequence number is used, one pass is needed for unilateral authentication, while two passes are needed to achieve mutual authentication. If a challenge and response method employing random numbers is used, two passes are needed for unilateral authentication, while three passes are required to achieve mutual authentication. Examples of cryptographic check functions are given in ISO/IEC 9797.
Preface Technical corrigendum #1 to this standard is available. Scope This part of ISO/IEC 9798 specifies entity authentication mechanisms using a cryptographic check function. Two mechanisms are concerned with the authentication of a single entity (unilateral authentication), while the remaining are mechanisms for mutual authentication of two entities. The mechanisms specified in this part of ISO/IEC 9798 use time variant parameters such as time stamps, sequence numbers, or random numbers, to prevent valid authentication information from being accepted at a later time or more than once. If a time stamp or sequence number is used, one pass is needed for unilateral authentication, while two passes are needed to achieve mutual authentication. If a challenge and response method employing random numbers is used, two passes are needed for unilateral authentication, while three passes are required to achieve mutual authentication. Examples of cryptographic check functions are given in ISO/IEC 9797.