Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function — Technical Corrigendum 2

Technologies de l'information — Techniques de sécurité — Authentification d'entité — Partie 4: Mécanismes utilisant une fonction cryptographique de vérification — Rectificatif technique 2

General Information

Status
Published
Publication Date
12-Jul-2012
Current Stage
6060 - International Standard published
Due Date
12-Dec-2014
Completion Date
13-Jul-2012
Ref Project

Relations

Buy Standard

Standard
ISO/IEC 9798-4:1999/Cor 2:2012
English language
3 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (Sample)

INTERNATIONAL STANDARD ISO/IEC 9798-4:1999
TECHNICAL CORRIGENDUM 2
Published 2012-07-15
INTERNATIONAL ORGANIZATION FOR STANDARDIZATION  МЕЖДУНАРОДНАЯ ОРГАНИЗАЦИЯ ПО СТАНДАРТИЗАЦИИ  ORGANISATION INTERNATIONALE DE NORMALISATION
INTERNATIONAL ELECTROTECHNICAL COMMISSION  МЕЖДУНАРОДНАЯ ЭЛЕКТРОТЕХНИЧЕСКАЯ КОМИССИЯ  COMMISSION ÉLECTROTECHNIQUE INTERNATIONALE


Information technology — Security techniques — Entity
authentication —
Part 4:
Mechanisms using a cryptographic check function
TECHNICAL CORRIGENDUM 2
Technologies de l'information — Techniques de sécurité — Authentification d'entité —
Partie 4: Mécanismes utilisant une fonction cryptographique de vérification
RECTIFICATIF TECHNIQUE 2
Technical Corrigendum 2 to ISO/IEC 9798-4:1999 was prepared by Joint Technical Committee ISO/IEC
JTC 1, Information technology, Subcommittee SC 27, IT Security techniques.

Page iv, Foreword
Add the following text at the end of Foreword:
Annex B of this part of ISO/IEC 9798 is normative, and defines object identifiers.

ICS 35.040 Ref. No. ISO/IEC 9798-4:1999/Cor.2:2012(E)
©  ISO/IEC 2012 – All rights reserved
Published in Switzerland

---------------------- Page: 1 ----------------------
ISO/IEC 9798-4:1999/Cor.2:2012(E)
Page 2, Clause 4
Add the following text at the end of Clause 4:
d) The secret authentication key used in implementations of any of the mechanisms specified in this part of
ISO/IEC 9798 shall be distinct from the keys used for any other purposes.
e) The cryptographic check values used at various places in an authentication mechanism shall not be
interchangeable.
NOTE This could be enforced by including the following elements in the data s
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.