QUICK

TOP

해외표준 상세정보

관심표준 등록 : 표준업데이트 시 알림서비스

제공형태 더보기
  • subList_img01

    폐지

    판매

    CAN/CSA-ISO/IEC 9798-2-10 (R2015)

    Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms (Adopted ISO/IEC 9798-2:2008, third edition, 2008-12-15)
    • 발행일 : 2010-01-01
    • 발행기관 : CSA
    즐겨찾기 장바구니 담기
    닫기

    상품이 장바구니에 담겼습니다.

    장바구니로 이동
    • [영어]보안PDF 166,500원

상세정보

분야
적용범위 Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the Canadian Advisory Committee (CAC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T). This Standard supersedes CAN/CSA-ISO/IEC 9798-2-02 (adoption of ISO/IEC 9798-2:1999, second edition, 1999-07-15). At the time of publication, ISO/IEC 9798-2:2008 is available from ISO and IEC in English only. CSA will publish the French version when it becomes available from ISO and IEC. Scope This part of ISO/IEC 9798 specifies entity authentication mechanisms using symmetric encipherment algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third party is involved; two of these are mechanisms to unilaterally authenticate one entity to another, while the other two are mechanisms for mutual authentication of two entities. The remaining mechanisms require a trusted third party for the establishment of a common secret key, and realize mutual or unilateral entity authentication. The mechanisms specified in this part of ISO/IEC 9798 use time variant parameters such as time stamps, sequence numbers, or random numbers to prevent valid authentication information from being accepted at a later time or more than once. If no trusted third party is involved and a time stamp or sequence number is used, one pass is needed for unilateral authentication, while two passes are needed to achieve mutual authentication. If no trusted third party is involved and a challenge and response method employing random numbers is used, two passes are needed for unilateral authentication, while three passes are required to achieve mutual authentication. If a trusted third party is involved, any additional communication between an entity and the trusted third party requires two extra passes in the communication exchange.
국제분류(ICS)코드
페이지수 105
Edition

이력정보

No. 표준번호 표준명 발행일 상태
1 CSA ISO/IEC 9798-2:20상세보기 IT Security techniques — Entity authentication — Part 2: Mechanisms using authenticated encryption (Adopted ISO/IEC 9798-2:2019, fourth edition, 2019-06) 2020-01-01 표준
2 ISO/IEC 9798-2:2019상세보기 IT Security techniques - Entity authentication - Part 2: Mechanisms using authenticated encryption 2019-06-03 표준
3 ISO/IEC 9798-2:2019상세보기 IT Security techniques — Entity authentication — Part 2: Mechanisms using authenticated encryption 2019-06-03 표준
4 ISO/IEC 9798-2:2008/Cor 3:2013상세보기 Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 3 2013-02-13 구판
5 ISO/IEC 9798-2:2008/COR3:2013상세보기 Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms - Technical Corrigendum 3 2013-02-13 구판
6 ISO/IEC 9798-2:2008/COR2:2012상세보기 Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms - Technical Corrigendum 2 2012-03-05 구판
7 ISO/IEC 9798-2:2008/Cor 2:2012상세보기 Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 2 2012-03-05 구판
8 ISO/IEC 9798-2:2008/Cor 1:2010상세보기 Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 1 2010-02-05 구판
9 ISO/IEC 9798-2:2008/COR1:2010상세보기 Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms - Technical Corrigendum 1 2010-02-05 구판
10 CAN/CSA-ISO/IEC 9798-2-10 (R2015)상세보기 Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms (Adopted ISO/IEC 9798-2:2008, third edition, 2008-12-15) 2010-01-01 폐지
11 ISO/IEC 9798-2:2008상세보기 Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms 2008-12-09 구판
12 ISO/IEC 9798-2:2008상세보기 Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms 2008-12-09 구판
13 ISO/IEC 9798-2:1999/Cor 1:2004상세보기 Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 1 2004-01-20 구판
14 ISO/IEC 9798-2:1999/COR1:2004상세보기 Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms - Technical Corrigendum 1 2004-01-20 구판
15 ISO/IEC 9798-2:1999상세보기 Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms 1999-07-22 구판
16 ISO/IEC 9798-2:1999상세보기 Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms 1999-07-22 구판
17 ISO/IEC 9798-2:1994상세보기 Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms 1994-12-15 구판
18 ISO/IEC 9798-2:1994상세보기 Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms 1994-12-15 구판

다른 사람이 함께 구입한 상품

  • 함께 구입한 상품이 존재하지 않습니다.

제공형태 닫기

  • PDF :

    직접 파일 다운로드 및 인쇄(마이페이지 확인)
  • 보안PDF :

    직접 파일 다운로드 및 인쇄(마이페이지 확인)* 단, 파일이동 및 복사 불가, 1회 다운로드 및 인쇄가능
  • PRINT :

    인쇄본 우편발송, 2~3일 소요(PDF파일 미제공)
  • BOOK :

    인쇄본 우편발송, 2~3일 소요(PDF파일 미제공)
  • ZIP :

    압축파일형태로 제공 (PDF, HTML, TXT, XLS 등으로 구성), 직접 파일 다운로드(마이페이지 확인)
  • CD/DVD :

    직접 파일 다운로드 및 인쇄(마이페이지 확인)
  • DB :

    별도 정보 제공
  • HARDCOPY :

    해외 배송 상품, 최대 3주 소요
  • 바인더 :

    바인더 우편발송, 2~3일 소요
  • 온라인구독 :

    WEB 접속 후 실시간 열람, 출력(1년간)