CSA CAN/CSA-ISO/IEC 9798-6:12 Information technology — Security techniques — Entity authentication — Part 6: Mechanisms using manual data transfer
Данный раздел/документ содержится в продуктах:
- Техэксперт: Машиностроительный комплекс
- Картотека зарубежных и международных стандартов
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- 35
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- 35.240
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- 35.240.15
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- ISO ISO/IEC 9798-5 Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques - Third Edition
- BSI BS ISO/IEC 29192-4 Information technology — Security techniques — Lightweight cryptography Part 4: Mechanisms using asymmetric techniques
- ISO ISO/IEC 29192-2 Information technology - Security techniques - Lightweight cryptography Part 2: Block ciphers - First Edition
- BSI BS ISO/IEC 29192-4 Information technology — Security techniques — Lightweight cryptography Part 4: Mechanisms using asymmetric techniques
- ISO ISO/IEC 9798-5 Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques - Third Edition
- ISO ISO/IEC 9798-5 Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques - Third Edition
- BSI BS ISO/IEC 29192-4 Information technology — Security techniques — Lightweight cryptography Part 4: Mechanisms using asymmetric techniques
- ISO ISO/IEC 29192-2 Information technology - Security techniques - Lightweight cryptography Part 2: Block ciphers - First Edition
- BSI BS ISO/IEC 29192-4 Information technology — Security techniques — Lightweight cryptography Part 4: Mechanisms using asymmetric techniques
- BSI BS ISO/IEC 29192-4 Information technology — Security techniques — Lightweight cryptography Part 4: Mechanisms using asymmetric techniques
- ISO ISO/IEC 29192-2 Information technology - Security techniques - Lightweight cryptography Part 2: Block ciphers - First Edition
- ISO ISO/IEC 29192-2 Information technology - Security techniques - Lightweight cryptography Part 2: Block ciphers - First Edition
- ISO ISO/IEC 9798-1 Information technology - Security techniques - Entity authentication - Part 1: General - Third Edition
- CSA CAN/CSA-ISO/IEC 9798-6:12 Information technology — Security techniques — Entity authentication — Part 6: Mechanisms using manual data transfer
- ISO ISO/IEC 9797-3 Information technology - Security techniques - Message Authentication Codes (MACs) - Part 3: Mechanisms using a universal hash-function - First Edition
- Картотека зарубежных и международных стандартов
CSA Standards
Information technology — Security techniques — Entity authentication — Part 6: Mechanisms using manual data transfer
N CAN/CSA-ISO/IEC 9798-6:12
Annotation
This part of ISO/IEC 9798 specifies eight entity authentication mechanisms based on manual data transfer between authenticating devices. It indicates how these mechanisms can be used to support key management functions, and provides guidance on secure choices of parameters for the mechanisms. A comparison of the levels of security and efficiency provided by the eight mechanisms is given.
Such mechanisms can be appropriate in a variety of circumstances. One such application occurs in personal networks, where the owner of two personal devices capable of wireless communications wishes them to perform an entity authentication procedure as part of the process of preparing them for use in the network.
Автоматический перевод:
Информационные технологии — методы Безопасности — идентификация Предприятия — Часть 6: Механизмы с помощью ручной передачи данных
Эта часть ISO/IEC 9798 указывает восемь механизмов аутентификации объекта на основе ручной передачи данных между аутентификацией устройств. Это указывает, как эти механизмы могут использоваться для поддержки функций управления ключами и дают представление о безопасном выборе параметров для механизмов. Сравнение уровней безопасности и эффективности, обеспеченной этими восемью механизмами, дано.



