accuris store logo
  • Browse all
  • 3A
  • 9000
  • A3
  • A4A
  • AA
  • AAMI
  • AASHTO
  • AATCC
  • ABCB
  • ABMA
  • ABMA-BOILER
  • ACC
  • ACGIH
  • ACI
  • ADA
  • ADS
  • AEIC
  • AENOR
  • AES
  • AFCEN
  • AGA
  • AGMA
  • AHAM
  • AHP
  • AHRI
  • AIA
  • AIAA
  • AICHE
  • AIHA
  • AIIM
  • AISC
  • ALI
  • ALPEMA
  • AMCA
  • ANS
  • ANSI
  • ANSI/ANSLG
  • ANSI/NEMA
  • ANSI/TCNA
  • ANSI/UAMA
  • API
  • APWA
  • AREMA
  • ARINC
  • ARMY
  • AS
  • ASA
  • ASABE
  • ASCE
  • ASD-STAN prEN
  • ASHE
  • ASHRAE
  • ASIS
  • ASM
  • ASME
  • ASNT
  • ASQ
  • ASSE (Plumbing)
  • ASSP
  • ASTM
  • ATIS
  • AVIXA
  • AWC
  • AWI
  • AWPA
  • AWS
  • AWWA
  • B11
  • BHMA
  • BICSI
  • BIFMA
  • BioWorld
  • BMI
  • BS
  • CAN/CGSB
  • CAN/ULC
  • CEI
  • CFR
  • CGA
  • CGSB
  • CIE
  • CII
  • CISPR
  • CLSI
  • CMAA
  • CRANE
  • CRSI
  • CSA
  • CTA
  • CTI
  • DID
  • DIN
  • DNV
  • DOD
  • DOXPUB
  • DVS
  • ECIA
  • EEC
  • EEMUA
  • ESD
  • ETSI
  • FCI
  • FED
  • FM Approvals
  • FORD
  • FRPI
  • GMW
  • GPA
  • HEI
  • HFES
  • HI
  • HIR
  • HPS
  • I3A
  • IADC
  • IAPMO
  • IATA
  • ICAO
  • ICC
  • ICEA
  • ICML
  • IEC
  • IEEE
  • IEEE/UL
  • IES
  • IEST
  • IFI
  • IICRC
  • INCITS
  • INTERN
  • IPC
  • ISA
  • ISEA
  • ISO
  • ISO/IEC/IEEE
  • ISPE
  • ISTA
  • ISUZU
  • JEDEC
  • JIS
  • LIA
  • MBMA
  • MCGRAW-HILL
  • MIL
  • MPIF
  • MSS
  • NAAMM
  • NACE
  • NADCA
  • NAS
  • NASA
  • NBBI
  • NCSL
  • NECA
  • NEMA
  • NETA
  • NFPA (Fire)
  • NFPA (Fluid)
  • NFSI
  • NG
  • NGA
  • NISO
  • NORSOK
  • NRC
  • NSC
  • NSF
  • NZS
  • OPEI
  • PCI
  • PDA
  • PEI
  • PIA
  • PIP
  • PPI
  • RTCA
  • SAE
  • SAIA
  • SCTE
  • SDI
  • SES
  • SIA
  • SJI
  • SMACNA
  • SME
  • SMPTE
  • SN EN
  • SPC
  • SPI
  • SSPC
  • STI/SPFA
  • TAPPI
  • TCIA
  • TEMA
  • THHILL
  • TIA
  • TMS
  • UL
  • ULC
  • UOP
  • WILEY
  • WRC
  • X9
Publishers
Need Help?
Log in
Create Account
Cart

Your shopping cart is empty.

Log in or create account

  1. Home
  2. ISO/IEC 9798-2:2008

ISO/IEC 9798-2:2008 Historical

1594687

Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms

standard by International Organization for Standardization/International Electrotechnical Commission , 12/15/2008

This document has been replaced. View the most recent version.

📝 Amendments Available

Track This

Identical Versions Available

  • BS ISO/IEC 9798-2:2008

    March 2013
    Information technology. Security techniques. Entity authentication-Mechanisms using symmetric encipherment algorithms

    • Historical Version

Full Description

ISO/IEC 9798-2:2008 specifies entity authentication mechanisms using symmetric encipherment algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third party is involved; two of these are mechanisms to unilaterally authenticate one entity to another, while the other two are mechanisms for mutual authentication of two entities. The remaining mechanisms require a trusted third party for the establishment of a common secret key, and realize mutual or unilateral entity authentication.

The mechanisms specified in ISO/IEC 9798-2:2008 use time variant parameters such as time stamps, sequence numbers, or random numbers to prevent valid authentication information from being accepted at a later time or more than once.

If no trusted third party is involved and a time stamp or sequence number is used, one pass is needed for unilateral authentication, while two passes are needed to achieve mutual authentication. If no trusted third party is involved and a challenge and response method employing random numbers is used, two passes are needed for unilateral authentication, while three passes are required to achieve mutual authentication. If a trusted third party is involved, any additional communication between an entity and the trusted third party requires two extra passes in the communication exchange.

See more

Also Bought By Customers

  • 1727287

    ISO/IEC 9798-1:2010
    Priced From $84.00

  • 2030000

    ISO/IEC 14888-3:2018
    Priced From $287.00

  • 863254

    ISO/IEC 9798-4:1999
    Priced From $84.00

  • 1667674

    ISO/IEC 9798-5:2009
    Priced From $259.00

 

Document History

  1. ISO/IEC 9798-2:2019

    June 2019
    IT Security techniques - Entity authentication - Part 2: Mechanisms using authenticated encryption

    • Most Recent  Most Recent
  2. ISO/IEC 9798-2 Ed. 1.0 en CORR2:2012

    March 2012
    Corrigendum 2 - Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms -

    • Historical Version
  3. ISO/IEC 9798-2 Ed. 1.0 en CORR1:2010

    February 2010
    Corrigendum 1 - Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms -

    • Historical Version
  4. ISO/IEC 9798-2:2008

    You are currently viewing this product 👀 currently
    viewing

    December 2008
    Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms

    • Historical Version
  5. ISO/IEC 9798-2:2008/Cor3:2013

    February 2008
    Corrigendum

    • Historical Version
  6. ISO/IEC 9798-2 Ed. 1.0 en CORR1:2004

    January 2004
    Corrigendum 1 - Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms -

    • Historical Version
  7. ISO/IEC 9798-2:1999

    July 1999
    Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms

    • Historical Version
 

Amendments, rulings, supplements, and errata

  1. ISO/IEC 9798-2:2008/Cor3:2013

    Free
    Download

    February 2008
    Corrigendum

  2. ISO/IEC 9798-2/Cor2:2012

    Free
    Download

    March 2012
    Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms - Corrigendum 2

  3. ISO/IEC 9798-2 Ed. 1.0 en CORR2:2012

    Free
    Download

    March 2012
    Corrigendum 2 - Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms -

  4. ISO/IEC 9798-2/Cor1:2010

    Free
    Download

    February 2010
    Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms - Corrigendum

  5. ISO/IEC 9798-2 Ed. 1.0 en CORR1:2010

    Free
    Download

    February 2010
    Corrigendum 1 - Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms -

Browse related products from International Organization for Standardization/International Electrotechnical Commission

  • International Organization for Standardization > By ICS Code > 35: Information technology. Office machines > 35.040: Character sets and information coding
  • International Organization for Standardization > By Technical Committee > JTC 1: Information technology > JTC 1/SC 27: IT Security techniques
  • International Organization for Standardization > By ICS Code > 35: Information technology. Office machines > 35.030: IT Security

Order Options

Delivery Options
Price: $103.00
Available for Immediate Download

Product Details

Published:

12/15/2008

File Size:

1 file

Same As:

BS ISO/IEC 9798-2:2008

Note:

This product is restricted and cannot be purchased in the following countries Russia, Ukraine, Belarus
✕

Document Delivery Options

PDF
A Portable Document Format which is electronic and downloadable. All PDF's can be downloaded from your My Downloads page in your Accuris Store account. Refer to Help Center for more details.
Printed Edition
A vast majority of our standards are available in printed format. Sometimes these are bound like a book, sometimes loose pages that you can put in a binder.
✕

What is a Secured PDF?

Secured PDFs are equipped with Digital Rights Management (DRM) software, by request of the Publisher to protect the copyright of the Publication, preventing unauthorized duplication and distribution.

What does this mean?

To view the PDF, a DRM tool, FileOpen must be installed. FileOpen is a free plugin which is compatible with Adobe Acrobat Reader DC and Pro DC, as well as other PDF Readers noted on the FileOpen website.

What can you do with a Secured PDF?

  • Print (except for IADC, ICML)
  • Search
  • Highlight
  • Bookmark

Restrictions:

  • Some Publishers do not allow printing.
  • Most Publishers do not permit copy and pasting from the PDF.
  • Sharing, Duplicating and Distribution prohibited.
  • For further information on restrictions, please click here.

PRODUCTS & SERVICES

  1. BPVC 2025
  2. BPVC Previous Editions
  3. Engineering Workbench
  4. Track It

CUSTOMER CARE

  1. Help Center
  2. Glossary
  3. Search Tips

CONNECT WITH US

  1. Contact Us

COMPANY INFORMATION

  1. About Accuris
  2. Press
  • © Copyright 2026 ACCURIS
  • Privacy Policy
  • System Information
Device/OS: Unknown
Browser: Unknown Browser 0.0
User Agent: Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com)
Store Name: css
Page: /standards/iso-iec-9798-2-2008?product_id=1594687
Referrer: Direct Navigation
IP: 216.73.216.6
Language: en
Customer #: Not Logged In
Member?: NO
Cart #: 1463794802
Order #: None
Cookies: NO
×