Phone: (011) 7541-421, 3409-301, 3409-335, 6547-293, 3409-310
E-mail: Standards sales: prodaja@iss.rs Education: iss-edukacija@iss.rs Information about standards: infocentar@iss.rs
Stevana Brakusa 2, 11030 Beograd
Main menu

ISO/IEC 9798-5:2004

Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques

Dec 6, 2004
95.99   Withdrawal of Standard   Dec 11, 2009

General information

95.99     Dec 11, 2009

ISO/IEC

ISO/IEC JTC 1/SC 27

International Standard

35.030  

English  

Buying

Withdrawn

Language in which you want to receive the document.

Scope

ISO/IEC 9798-5:2004 specifies authentication mechanisms in the form of exchange of information between a claimant and a verifier.
In accordance with the types of calculations that need to be performed by a claimant and the verifier (see Annex C), the mechanisms specified in ISO/IEC 9798-5:2004 can be classified into four main groups.
The first group is characterized by the performance of short modular exponentiations. The challenge size needs to be optimized since it has a proportional impact on workloads.The second group is characterized by the possibility of a "coupon" strategy for the claimant. A verifier can authenticate a claimant without computational power. The challenge size has no impact on workloads.The third group is characterized by the possibility of a "coupon" strategy for the verifier. A verifier without computational power can authenticate a claimant. The challenge size has no impact on workloads.The fourth group has no possibility of a "coupon" strategy.

Life cycle

PREVIOUSLY

WITHDRAWN
ISO/IEC 9798-5:1999

NOW

WITHDRAWN
ISO/IEC 9798-5:2004
95.99 Withdrawal of Standard
Dec 11, 2009

REVISED BY

PUBLISHED
ISO/IEC 9798-5:2009