ISO IEC 9798-5-2009 Information technology - Security techniques - Entity authentication - Part 5 Mechanisms using zero-knowledge techniques《信息技术 安全技术 实体鉴别 第5部分.pdf
《ISO IEC 9798-5-2009 Information technology - Security techniques - Entity authentication - Part 5 Mechanisms using zero-knowledge techniques《信息技术 安全技术 实体鉴别 第5部分.pdf》由会员分享,可在线阅读,更多相关《ISO IEC 9798-5-2009 Information technology - Security techniques - Entity authentication - Part 5 Mechanisms using zero-knowledge techniques《信息技术 安全技术 实体鉴别 第5部分.pdf(60页珍藏版)》请在麦多课文档分享上搜索。
1、 Reference number ISO/IEC 9798-5:2009(E) ISO/IEC 2009INTERNATIONAL STANDARD ISO/IEC 9798-5 Third edition 2009-12-15 Information technology Security techniques Entity authentication Part 5: Mechanisms using zero-knowledge techniques Technologies de linformation Techniques de scurit Authentification d
2、entit Partie 5: Mcanismes utilisant des techniques divulgation nulle ISO/IEC 9798-5:2009(E) PDF disclaimer This PDF file may contain embedded typefaces. In accordance with Adobes licensing policy, this file may be printed or viewed but shall not be edited unless the typefaces which are embedded are
3、licensed to and installed on the computer performing the editing. In downloading this file, parties accept therein the responsibility of not infringing Adobes licensing policy. The ISO Central Secretariat accepts no liability in this area. Adobe is a trademark of Adobe Systems Incorporated. Details
4、of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-creation parameters were optimized for printing. Every care has been taken to ensure that the file is suitable for use by ISO member bodies. In the unlikely event that a problem relat
5、ing to it is found, please inform the Central Secretariat at the address given below. COPYRIGHT PROTECTED DOCUMENT ISO/IEC 2009 All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including
6、photocopying and microfilm, without permission in writing from either ISO at the address below or ISOs member body in the country of the requester. ISO copyright office Case postale 56 CH-1211 Geneva 20 Tel. + 41 22 749 01 11 Fax + 41 22 749 09 47 E-mail copyrightiso.org Web www.iso.org Published in
7、 Switzerland ii ISO/IEC 2009 All rights reservedISO/IEC 9798-5:2009(E) ISO/IEC 2009 All rights reserved iiiContents Page Foreword iv Introduction.v 1 Scope1 2 Terms and definitions .1 3 Notation, symbols and abbreviated terms4 4 Mechanisms based on identities .7 4.1 Security requirements for the env
8、ironment7 4.2 Key production 8 4.3 Unilateral authentication exchange.10 5 Mechanisms based on integer factorization.12 5.1 Security requirements for the environment12 5.2 Key production 12 5.3 Unilateral authentication exchange.13 6 Mechanisms based on discrete logarithms with respect to prime numb
9、ers 15 6.1 Security requirements for the environment15 6.2 Key production 15 6.3 Unilateral authentication exchange.16 7 Mechanisms based on discrete logarithms with respect to composite numbers17 7.1 Security requirements for the environment17 7.2 Key production 18 7.3 Unilateral authentication exc
10、hange.19 8 Mechanisms based on asymmetric encryption systems20 8.1 Security requirements for the environment20 8.2 Unilateral authentication exchange.21 8.3 Mutual authentication exchange22 9 Mechanism based on discrete logarithms with respect to elliptic curves 23 9.1 Security requirements for the
11、environment23 9.2 Key production 24 9.3 Unilateral authentication exchange.24 Annex A (normative) Object identifiers 26 Annex B (informative) Principles of zero-knowledge techniques28 Annex C (informative) Guidance on parameter choice and comparison of the mechanisms 31 Annex D (informative) Numeric
12、al examples.41 Bibliography52 ISO/IEC 9798-5:2009(E) iv ISO/IEC 2009 All rights reservedForeword ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) form the specialized system for worldwide standardization. National bodies that are member
13、s of ISO or IEC participate in the development of International Standards through technical committees established by the respective organization to deal with particular fields of technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international organ
14、izations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1. International Standards are drafted in accordance with the rules given in the ISO/IEC
15、 Directives, Part 2. The main task of the joint technical committee is to prepare International Standards. Draft International Standards adopted by the joint technical committee are circulated to national bodies for voting. Publication as an International Standard requires approval by at least 75 %
16、of the national bodies casting a vote. ISO/IEC 9798-5 was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology, Subcommittee SC 27, IT Security techniques. This third edition cancels and replaces the second edition (ISO/IEC 9798-5:2004), which has been technically revised. Thi
17、s edition adds a new mechanism based on elliptic curve discrete logarithm. ISO/IEC 9798 consists of the following parts, under the general title Information technology Security techniques Entity authentication: Part 1: General Part 2: Mechanisms using symmetric encipherment algorithms Part 3: Mechan
18、isms using digital signature techniques Part 4: Mechanisms using a cryptographic check function Part 5: Mechanisms using zero-knowledge techniques Part 6: Mechanisms using manual data transfer ISO/IEC 9798-5:2009(E) ISO/IEC 2009 All rights reserved vIntroduction This part of ISO/IEC 9798 specifies a
19、uthentication mechanisms that involve exchanges of information between a claimant and a verifier. In accordance with the types of calculations that need to be performed by the claimant and the verifier, the mechanisms can be classified into the following four main groups (see Annex C). The first gro
20、up (see Clauses 4 and 5) is characterized by the performance of short modular exponentiations. The challenge size needs to be optimized since it has a proportional impact on workloads. The second group (see Clauses 6 and 7 and 8) is characterized by the possibility of a “coupon strategy” for the cla
21、imant. A verifier can authenticate a claimant with very limited computational power. The challenge size has no practical impact on workloads. The third group (see 9.2) is characterized by the possibility of a coupon strategy for the verifier. A verifier with very limited computational power can auth
22、enticate a claimant. The challenge size has no impact on workloads. The fourth group (see 9.3) has no possibility of a coupon strategy. ISO and IEC draw attention to the fact that it is claimed that compliance with this part of ISO/IEC 9798 may involve the use of the following patents and their coun
23、terparts in other countries. US 4 995 082 issued 1991-02-19, Inventor: C.P. Schnorr, US 5 140 634 issued 1992-08-18, Inventors: L.C. Guillou and J-J. Quisquater, EP 0 311 470 issued 1992-12-16, Inventors: L.C. Guillou and J-J. Quisquater, EP 0 666 664 issued 1995-02-02, Inventor: M. Girault, ISO and
24、 IEC take no position concerning the evidence, validity and scope of these patent rights. The holders of these patent rights have assured ISO and IEC that they are willing to negotiate licenses under reasonable and non-discriminatory terms and conditions with applications throughout the world. In th
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ISOIEC979852009INFORMATIONTECHNOLOGYSECURITYTECHNIQUESENTITYAUTHENTICATIONPART5MECHANISMSUSINGZEROKNOWLEDGETECHNIQUES

链接地址:http://www.mydoc123.com/p-1257321.html