ISO/IEC 9798-4:1999/Cor 2:2012
(Corrigendum)Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function — Technical Corrigendum 2
Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function — Technical Corrigendum 2
Technologies de l'information — Techniques de sécurité — Authentification d'entité — Partie 4: Mécanismes utilisant une fonction cryptographique de vérification — Rectificatif technique 2
General Information
Relations
Standards Content (Sample)
INTERNATIONAL STANDARD ISO/IEC 9798-4:1999
TECHNICAL CORRIGENDUM 2
Published 2012-07-15
INTERNATIONAL ORGANIZATION FOR STANDARDIZATION МЕЖДУНАРОДНАЯ ОРГАНИЗАЦИЯ ПО СТАНДАРТИЗАЦИИ ORGANISATION INTERNATIONALE DE NORMALISATION
INTERNATIONAL ELECTROTECHNICAL COMMISSION МЕЖДУНАРОДНАЯ ЭЛЕКТРОТЕХНИЧЕСКАЯ КОМИССИЯ COMMISSION ÉLECTROTECHNIQUE INTERNATIONALE
Information technology — Security techniques — Entity
authentication —
Part 4:
Mechanisms using a cryptographic check function
TECHNICAL CORRIGENDUM 2
Technologies de l'information — Techniques de sécurité — Authentification d'entité —
Partie 4: Mécanismes utilisant une fonction cryptographique de vérification
RECTIFICATIF TECHNIQUE 2
Technical Corrigendum 2 to ISO/IEC 9798-4:1999 was prepared by Joint Technical Committee ISO/IEC
JTC 1, Information technology, Subcommittee SC 27, IT Security techniques.
Page iv, Foreword
Add the following text at the end of Foreword:
Annex B of this part of ISO/IEC 9798 is normative, and defines object identifiers.
ICS 35.040 Ref. No. ISO/IEC 9798-4:1999/Cor.2:2012(E)
© ISO/IEC 2012 – All rights reserved
Published in Switzerland
---------------------- Page: 1 ----------------------
ISO/IEC 9798-4:1999/Cor.2:2012(E)
Page 2, Clause 4
Add the following text at the end of Clause 4:
d) The secret authentication key used in implementations of any of the mechanisms specified in this part of
ISO/IEC 9798 shall be distinct from the keys used for any other purposes.
e) The cryptographic check values used at various places in an authentication mechanism shall not be
interchangeable.
NOTE This could be enforced by including the following elements in the data s
...
Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.