ISO IEC 9798-1 pdf download – Information technology — Security techniques — Entity authentication — Part 1: General

admin
ISO IEC 9798-1 pdf download – Information technology — Security techniques — Entity authentication — Part 1: General

ISO IEC 9798-1 pdf download – Information technology — Security techniques — Entity authentication — Part 1: General
Scope
This part of lSO/EC9798 specifies an authentication model and general requirements and constraints forentity authentication mechanisms which use security techniques. These mechanisms are used to corroboratethat an entity is the one that is claimed.An entity to be authenticated proves its identity by showing itsknowledge of a secret. The mechanisms are defined as exchanges of information between entities and,whererequired, exchanges with a trusted third party.
The details of the mechanisms and the contents of the authentication exchanges are given in subsequentparts of lSO/IEC 9798.
2Normative references
There are no normative references for this part of lSO/IEC 9798.
3 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
3.1
asymmetric cryptographic technique
cryptographic technique that uses two related transformations: a public transformation (defined by the publickey) and a private transformation (defined by the private key)
NOTE The two transformations have the property that, given the public transformation, it is computationally infeasibleto derive the private transformation.
3.2
asymmetric encryption system
system based on asymmetric cryptographic techniques whose public operation is used for encryption andwhose private operation is used for decryption
3.3
asymmetric key pair
pair of related keys where the private key defines the private transformation and the public key defines thepublic transformation
3.4
asymmetric signature system
system based on asymmetric cryptographic techniques whose private transformation is used for signing andwhose public transformation is used for verification
Scope
This part of lSO/EC9798 specifies an authentication model and general requirements and constraints forentity authentication mechanisms which use security techniques. These mechanisms are used to corroboratethat an entity is the one that is claimed.An entity to be authenticated proves its identity by showing itsknowledge of a secret. The mechanisms are defined as exchanges of information between entities and,whererequired, exchanges with a trusted third party.
The details of the mechanisms and the contents of the authentication exchanges are given in subsequentparts of lSO/IEC 9798.
2Normative references
There are no normative references for this part of lSO/IEC 9798.
3 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
3.1
asymmetric cryptographic technique
cryptographic technique that uses two related transformations: a public transformation (defined by the publickey) and a private transformation (defined by the private key)
NOTE The two transformations have the property that, given the public transformation, it is computationally infeasibleto derive the private transformation.
3.2
asymmetric encryption system
system based on asymmetric cryptographic techniques whose public operation is used for encryption andwhose private operation is used for decryption
3.3
asymmetric key pair
pair of related keys where the private key defines the private transformation and the public key defines thepublic transformation
3.4
asymmetric signature system
system based on asymmetric cryptographic techniques whose private transformation is used for signing andwhose public transformation is used for verification