ANSI INCITS ISO IEC 9798-1-1997 Information technology Security techniques Entity authentication Part 1 General.pdf
《ANSI INCITS ISO IEC 9798-1-1997 Information technology Security techniques Entity authentication Part 1 General.pdf》由会员分享,可在线阅读,更多相关《ANSI INCITS ISO IEC 9798-1-1997 Information technology Security techniques Entity authentication Part 1 General.pdf(12页珍藏版)》请在麦多课文档分享上搜索。
1、ANSI/INCITS/ISO/IEC 9798-1:19972008(ISO/IEC 9798-1:1997, IDT) Information technology Security techniques Entity authentication Part 1: GeneralANSI/INCITS/ISO/IEC 9798-1:19972008(ISO/IEC 9798-1:1997, IDT)ANSI/INCITS/ISO/IEC 9798-1:19972008 ii ITIC 2008 All rights reserved PDF disclaimer This PDF file
2、 may contain embedded typefaces. In accordance with Adobes licensing policy, this file may be printed or viewed but shall not be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In downloading this file, parties accept therein the r
3、esponsibility of not infringing Adobes licensing policy. The ISO Central Secretariat accepts no liability in this area. Adobe is a trademark of Adobe Systems Incorporated. Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-cre
4、ation parameters were optimized for printing. Every care has been taken to ensure that the file is suitable for use by ISO member bodies. In the unlikely event that a problem relating to it is found, please inform the Central Secretariat at the address given below. Adopted by INCITS (InterNational C
5、ommittee for Information Technology Standards) as an American National Standard. Date of ANSI Approval: 7/2/2008 Published by American National Standards Institute, 25 West 43rd Street, New York, New York 10036 Copyright 2008 by Information Technology Industry Council (ITI). All rights reserved. The
6、se materials are subject to copyright claims of International Standardization Organization (ISO), International Electrotechnical Commission (IEC), American National Standards Institute (ANSI), and Information Technology Industry Council (ITI). Not for resale. No part of this publication may be repro
7、duced in any form, including an electronic retrieval system, without the prior written permission of ITI. All requests pertaining to this standard should be submitted to ITI, 1250 Eye Street NW, Washington, DC 20005. Printed in the United States of America Information technology - Security techniaue
8、s - Entity authentication - Part 1: General 1 Scope This part of ISO/IEC 9798 specifies an authentication model and general requirements and constraints for en- tity authentication mechanisms which use security tech- niques. These mechanisms are used to corroborate that an entity is the one that is
9、claimed. An entity to be au- thenticated proves its identity by showing its knowledge of a secret. The mechanisms are defined as exchanges of information between entities, and where required, ex- changes with a trusted third party. The details of the mechanisms and the contents of the authentication
10、 exchanges are not specified in this part of ISO/IEC 9798 but in the subsequent parts. Certain of the mechanisms specified in subsequent parts of ISO/IEC 9798 can be used to help provide non- repudiation services, mechanisms for which are specified in ISO/IEC 13888. The provision of non-repudiation
11、services is beyond the scope of ISO/IEC 9798. 2 Normative references The following standards contain provisions which, through reference in this text, constitute provisions of this part of ISO/IEC 9798. At the time of publication, the editions indicated were valid. All standards are sub- ject to rev
12、ision, and parties to agreements based on this part of ISO/IEC 9798 are encouraged to investigate the possibility of applying the most recent editions of the standards indicated below. Members of IEC and IS0 maintain registers of currently valid International Stan- dards. IS0 7498-2: 1989, Informati
13、on processing systems - Open Systems Interconnection _ Basic Reference Model - Part 2: Security Architecture. ISO/IEC 9594-8: 1995, Information technology - Open Systems Interconnection - The Directory - Part 8: Authentication framework. ISO/IEC 10181-2: 1996, Information technology - Open Systems I
14、nterconnection - Security frameworks for open systems: Authentication framework. ISO/IEC 13888-1 -I: Information technology - Secu- rity techniques - Non-repudiation- Part I: General. 3 Definitions 3.1 ISO/IEC 9798 makes use of the following general security-related terms defined in IS0 7498-2: 3.1.
15、1 cryptographic check value: information which is derived by performing a cryptographic transforl mation on the data unit. 3.1.2 masquerade: the pretence by an entity to be a different entity. 3.1.3 digital signature (signature): data appended to, or a cryptographic transformation of, a data unit th
16、at allows the recipient of the data unit to prove the source and integrity of the data unit and protect against forgery e.g. by the recipient. 3.2 ISO/IEC 9798 makes use of the following general security-related terms defined in ISO/IEC 10181-2: 3.2.1 claimant: an entity which is or represents a pri
17、ncipal for the purposes of authentication. A claimant includes the functions necessary for en- gaging in authentication exchanges on behalf of a principal. 3.2.2 principal: an entity whose identity can be au- thenticated. lto be published AMERICAN NATIONAL STANDARD ANSI/INCITS/ISO/IEC 9798-1:1997200
18、8 ITIC 2008 All rights reserved3.2 3 trusted third party: a security authority or its agent, trusted by other entities with respect to security-related activities. In the context of ISO/IEC 9798, a trusted third party is trusted by a claimant and/or a verifier for the purposes of au- thentication. 3
19、.2.4 verifier: an entity which is or represents the en- tity requiring an authenticated identity. A verifier includes the functions necessary for engaging in au- thentication exchanges. 3.3 For the purposes of ISO/IEC 9798 the following definitions apply: 3.3.1 asymmetric cryptographic technique: a
20、cryptographic technique that uses two related transformations, a public transformation (defined by the public key) and a private transformation (de- fined by the private key). The two transformations have the property that, given the public transfor- mation, it is computationally infeasible to deriv
21、e the private transformation. NOTE A system based on asymmetric crypto- graphic techniques can either be an encipherment system, a signature system, a combined encipher- ment and signature system, or a key agreement system. With asymmetric cryptographic tech- niques there are four elementary transfo
22、rmations: sign and verify for signature systems, encipher and decipher for encipherment systems. The signature and decipherment transformation are kept private by the owning entity, whereas the corresponding verification and encipherment transformation are published. There exist asymmetric cryptosys
23、tems (e.g. RSA) where the four elementary functions may be achieved by only two transformations: one private transformation suffices for both signing and decrypting messages, and one public transfor- mation suffices for both verifying and encrypting messages. However, since this is not the general c
24、ase, throughout ISO/IEC 9798 the four elemen- tary transformations and the corresponding keys are kept separate. 3.3.2 asymmetric encipherment system: a system based on asymmetric cryptographic techniques whose public transformation is used for encipher- ment and whose private transformation is used
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ANSIINCITSISOIEC979811997INFORMATIONTECHNOLOGYSECURITYTECHNIQUESENTITYAUTHENTICATIONPART1GENERALPDF

链接地址:http://www.mydoc123.com/p-436586.html