Information technology - Security techniques - Entity authentication mechanisms - Part 1: General model

Technologies de l'information — Techniques de sécurité — Mécanismes d'authentification d'entité — Partie 1: Modèle général

General Information

Status
Withdrawn
Publication Date
28-Aug-1991
Withdrawal Date
28-Aug-1991
Current Stage
9599 - Withdrawal of International Standard
Start Date
31-Jul-1997
Completion Date
30-Oct-2025
Ref Project

Relations

Standard
ISO/IEC 9798-1:1991 - Information technology -- Security techniques -- Entity authentication mechanisms
English language
4 pages
sale 15% off
Preview
sale 15% off
Preview
Standard
ISO/IEC 9798-1:1991 - Technologies de l'information -- Techniques de sécurité -- Mécanismes d'authentification d'entité
French language
5 pages
sale 15% off
Preview
sale 15% off
Preview

Frequently Asked Questions

ISO/IEC 9798-1:1991 is a standard published by the International Organization for Standardization (ISO). Its full title is "Information technology - Security techniques - Entity authentication mechanisms - Part 1: General model". This standard covers: Information technology - Security techniques - Entity authentication mechanisms - Part 1: General model

Information technology - Security techniques - Entity authentication mechanisms - Part 1: General model

ISO/IEC 9798-1:1991 is classified under the following ICS (International Classification for Standards) categories: 35.030 - IT Security; 35.040 - Information coding. The ICS classification helps identify the subject area and facilitates finding related standards.

ISO/IEC 9798-1:1991 has the following relationships with other standards: It is inter standard links to ISO/IEC 9798-1:1997. Understanding these relationships helps ensure you are using the most current and applicable version of the standard.

You can purchase ISO/IEC 9798-1:1991 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of ISO standards.

Standards Content (Sample)


ISOIIEC
INTERNATIONAL
STANDARD
First edition
1991-09-01
Information technology - Security
techniques - Entity authentication
mechanisms -
Part 1:
General model
Technologies de l'information - Techniques de sécurité - Mécanismes
d'authentification d'entités -
Partie 1: Modèle général
Reference number
ISOllEC 9798-1:1991(E)
I Foreword
IS0 (the International Organization for Standardization) and IEC (the
International Electrotechnical Commission) forni the specialized system
for worldwide standardization. National bodies that are members of IS0
or IEC participate in the development of International Standards through
technical committees established by the respective organization to deal
with particular fields of technical activity. IS0 and IEC technical com-
mittees collaborate in fields of mutual interest. Other international or-
ganizations, governmental and non-governmental, in liaison with IS0
and IEC, also take part in the work.
In the field of information technology, IS0 and IEC have established a
~
joint technical committee, ISO/IEC JTC 1. Draft International Standards
adopted by the joint technical committee are circulated to national bod-
ies for voting. Publication as an International Standard requires ap-
proval by at least 75% of the national bodies casting a vote.
'
International Standard ISO/IEC 9798-1 was prepared by Joint Technical
Committee ISOAEC JTC 1, Information technology.
ISO/IEC 9798 consists of the following parts, under the general title In-
formation technology - Security techniques - Entity authentication
l mechanisms:
- Pari 1: General model
I
- Pari 2: Entity authentication using symmetric techniques
I
- Part 3: Entity authentication using a public key algorithm
Annex A of this part of ISO/IEC 9798 is for information only.
O ISOllEC 1991
All rights reserved. No part of this pübltcation may be reproduced or utllized In any form
or by any means, electronic or mechanical, including photocopying and microfilm, without
permlsslon In wrltlng from the publisher.
ISO/IEC Copyright Office * Case Postale 56 CH-1211 Genève 20 Switzerland
Printed in Switzerland
ii
ISO/IEC 9798 - 1 : 1991 (E)
Introduction
Entity authentication mechanisms allow the verification, of an entity’s claimed
identity, by another entity.
The authenticity of the entity can be ascertained only for the instant of the
authentication exchange. To guarantee the authenticity of subsequent
communicated data, the authentication exchange must be used in conjunction with
a secure means of communication (e.g. an integrity service).
An impersonator may replay, at a later date, a valid authentication exchange (this is
a form of masquerade). To preven! such a replay, a time variant parameter, such as
a time stamp, a sequence number, or a challenge may be used.
Generally, for authentication purposes, the entities generate and exchange
standardized messages, called tokens. It takes at least the exchange of one token
for one of the entities to be authenticated by the other entity and at least the
exchange of two tokens for mutual authentication. An additional token may be
needed, if a challenge has to be sent to initiate the authentication exchange.
Unilateral authentication provides one entity with assurance of the other’s identity
but not vice versa. Mutual authentication provides both entities with assurance of
each other’s identity.
~ ~~
ISO/IEC 9798 - 1 : 1991 (E)
INTERNATIONAL STANDARD
- Entity
Information technology - Security techniques
authentication mechanisms -
Part 1: General model
3.1.1 credentials.
1 Scope
3.1.2 key.
This part of ISOllEC 9798 specifies entity authentication
mechanisms which use security techniques. These
3.1.3 signature.
mechanisms are used to corroborate that an entity is the
one that is claimed. An entity to be authenticated proves its
3.2 This part of ISO/IEC 9798 makes use of the following
aidentity by showing its knowledge of a secret. The
general security - related term defined in ISO/IEC 9594 - 8.
mechanisms are defined as exchanges of information
between entities and, where required, exchanges with a
3.2.1 user certificate (certificate) (to include the ASN.l
trusted third party.
definition).
The details of the mechanisms and the contents of the
3.3 For the purpose of this part of ISOllEC 9798, the
authentication exchanges are not specified in this part of
following definitions apply.
ISOllEC 9798 but in the following parts of this multi -part
International Standard.
3.3.1 authentication initiator: The entity that initiates the
authentication exchange.
2 Normative references
3.3.2 authentication responder: The entity that responds
to the initiator of the authentication exchange.
The following standards contain provisions which, through
reference in this text, constitute provisions of this part of 3.3.3 distinguishing identifier: Information which un -
ISOllEC 9798. At the time of publication, the editions ambiguously distinguishes an entity in the authentication
indicated were valid. All standards are subject to revision,
process.
and parties to agreements based on this part of ISOlIEC
9798 are encouraged to investigate the possibility of 3.3.4 entity authentication: The corroboration that an
applying the most recent editions of the standards entity is the one claimed.
indicated below. Members of IEC and IS0 maintain
registers of currently valid International Standards. 3.3.5 time variant parameter: A data item used by an
entity to verify that a message is not a replay.
IS0 7498 - 2 : 1989, Information processing systems -
Open Sysîems Interconnection - Basic Reference Model
3.3.6 token (exchange Al): Exchange authentication
- Part 2: Security Architecture.
information conveyed during an authentication exchange.
ISOlIEC 9594-8 : 1990, lnfo
...


I NTERNAT I O NAL
ISOJIEC
STAN DAR D 9798-3
First edition
1993-1 1-15
O
Information technology - Security
techniques - Entity authentication
mechanisms -
Part 3:
Entity authentication using a public key
algorithm
Technologies de l'information - Techniques de sécurité -
Mécanismes d'authentification d'entité -
Partie 3: Authentification d'entité utilisant un algorithme à clé
publique
O
Reference number
ISO/IEC 9798-3: 1993(E)
ISO/IEC 9798-3:1993(E)
Foreword
IS0 (the International Organization for Standardization) and IEC (the Inter-
national Electrotechnical Commission) form the specialized system for worldwide
standardization. National bodies that are members of IS0 or IEC participate in
the development of International Standards through technical committees estab-
lished by the respective organization to deal with particular fields of technical
activity. IS0 and IEC technical committees collaborate in fields of mutual inter-
est. Other international organizations, governmental and non-governmental, in
liaison with IS0 and IEC, also take part in the work.
In the field of information technology, IS0 and IEC have established a joint
technical committee, ISOAEC JTC 1. Draft International Standards adopted by
the joint technical committee are circulated to national bodies for voting. Publi-
cation as an International Standard requires approval by at least 75 % of the na-
tional bodies casting a vote.
International Standard ISOAEC 9798-3 was prepared by Joint Technical Com-
mittee ISO/IEC JTC 1, Information technology, Subcommittee SC 27, IT Se-
curity techniques.
ISO/IEC 9798 consists of the following parts, under the general title Information
technology - Security techniques - Entity authentication mechanisms:
- Part 1: General model
- Part 2: Entity authentication using symmetric techniques
- Part 3: Entity authentication using a public key algorithm
Further parts may follow.
Annexes A, B, C and D of this part of ISOAEC 9798 are for information only.
Q ISO/IEC 1993
A11 rights reserved. Unless otherwise specified, no part of this publication may be
reproduced or utilized in any form or by any means, electronic or mechanical, including
photocopying and microfilm, without permission in writing from the publisher.
ISO/IEC Copyright Office Case postale 56 CH-1211 Genève 20 Switzcrland
Printed in Switzerland
Il
O lSO/iEC
INTERNATIONAL STANDARD ISO/IEC 9798-3:1993(E)
Information technology - Security techniques -
Entity authentication mechanisms -
Part 3: Entity authentication using a public key algorithm
3 Definitions and notation
1 Scope
For the purposes of this part of TSO/IEC 9798 the defini-
This part of ISO/TEC 9798 specifies entity authentica-
tions and notation described in ISO/IEC 9798-1 apply.
tion mechanisms using a public key algorithm. Two
a
mechanisms are concerned with the authentication of
single entity (unilateral authentication), while the re-
4 Requirements
maining are mechanisms for mutual authentication of
two entities. A digital signature is used to verify the
In the authentication mechanisms specified in this part
identity of an entity. A trusted third party may be in-
of ISO/IEC 0798 an entity to be authenticated corrob-
volved.
orates its identiy by demonstrating its knowledge of its
The mechanisms specified in this part of ISO/IEC 9798
secret signat,ure key. This is achieved by the entity us-
use time variant parameters such as time stamps, se-
ing its secret signature key to sign specific data. The
quence numbers, or random numbers, to prevent valid
signature can be verified hy anyone using the entity's
authentication information from being accepted at a
public verification key.
later time.
The authentication mechanisms have the following re-
If a time stamp or a sequence number is used, one pass quirements. If any of these is not met then the authen-
is needed for unilateral authentication, while two passes tication process may be compromised or it cannot be
are needed to achieve mutual authentication. If a chal- implemented.
lenge and response method employing random numbers
a) A verifier shall possess the valid public key of the
is used, two passes are needed for unilateral authen-
claimant.
tication, while three or four passes (depending on the
mechanism employed) are required to achieve mutual
b) A claimant, shall have a secret signature key known
a authentication.
and used only by itself.
NOTE - One way of obtaining a valid public key is by
2 Normative reference
means of a certificate (see annex B). The generation,
distribii tion, and revocation of certificates are outside
The following standard contains provisions which,
scope of this part of ISO/IEC 9798. There may exist
the
through reference in this text, constitute provisions of a trusted third party for this purpose. Another way of
this part of ISO/IEC 9798. At the time of publica- obtaining a valid public key is by trusted courier.
tion, the edition indicated was valid. All standards are
subject to revision, and parties to agreements based on
5 Mechanisms
this part of ISO/IEC 9798 are encouraged to investi-
gate the possibility of applying the most recent edition
of the standard indicated below. Members of IEC and
The specified ent,ity authentication mechanisms make
IS0 maintain registers of currently valid International use of time variant parameters such as time stamps, se-
Standards. quence numbers or random numbers (see annex c).
In this part of ISO/IEC 9798, given a token defined as
ISO/TEC 9798-1: 1001, Information technology - Se-
curity techniques - Entity aufhentication mechanisms -
Pari 1: General model.
@ ISO/IEC
ISO/IEC 9798-3: 1993 (E)
TokenAB is necessary to prevent the token from being
the “signed data” refers to ‘‘Yl(1 .II%” used as input
accepted by anyone other than the intended verifier.
to the signature scheme and the “unsigned data” refers
to “xl I I . . . I 1~~77.
2 In general, Text2 is not authenticated by this pro-
cess.
If information contained in the signed data of the token
3 One application of this mechanism could be key dis-
can be recovered from the signature, then it need not
tribution (see annex A).
be contained in the unsigned data of the token (see, for
example, ISO/IEC 9796).
(1) A sends TokenAB and, optionally, its certificate to
If information in the signed data of the token (e. g., a
B.
random number) is already known to the verifier, then it
need not be contained in the unsigned data of the token (2) On receipt of the message containing TokenAB, B
sent by the claimant. performs the following steps:
All text fields specified in the following mechanisms are (i) It ensures that it is in possession of a valid
public key of A either by verifying the certifi-
available for use in applications outside the scope of this
part of ISO/IEC 9798 (they may be empty). Their re- cate of A or by some other means.
lationship and contents depend upon the specific appli-
(ii) It verifies TokenAB by checking the time
cation. See annex A for information on the use of text
stamp or the sequence number, by verifying
fields.
e
the signature of A contained in the token and
by checking that the value of the identifier field
NOTE - As the distribution of certificates is outside
(B) in the signed data of TokenAB is equal to
the scope of this part of ISO/IEC 9798, the sending of
entity R’s distinguishing identifier.
certificates is optional in all mechanisms.
5.1 Unilateral authentication
Unilateral authentication means that only one of the
two entities is authenticated by use of the mechanism.
5.1.1 One pass authentication
In this authentication mechanism the claimant A initi-
ates the process and is authenticated by the verifier B.
Uniqueness / timeliness is controlled by generating and
- (1) RgIITextl
checking a time stamp or a sequence number (see annex
A c B (3)
(2) Cert AllTokenAB
Cl.
The authentication mechanism is illustrated in figure 1.
(1) Cert A I ITokenA B
B (2)
A c
Figure 1
The inclusion of the parameter B in TokenAB is op-
The form of the token (TokenAB), sent by the claimant
tional. It depends on the environment in which this
A to the verifier B is:
authentication mechanism is used.
NOTE - The random number RA is present in Token
AB to prevent R from obtaining the signature of A on
B prior to the start of the authenti-
where the claimant A uses either a sequence number data chosen by
cation mechanism. This prevention may be required,
NA or a time stamp TA as the time variant parameter.
for example, when the same key is used by A for other
The choice depends on the technical capabilities of the
purposes in addition to entity authentication.
claimant and the verifier as well as on the environment.
NOTES
(1) B sends a random number RB and, optionally, a
1 The inclusion of the identifier B in the signed dat,a of text field Text1 to A.
@ ISO/IEC ISO/IEC 9798-3: 1993 (E)
(2) A sends TokenAB and, optionally, its certificate to NOTE 1 - The inclusion of identifiers A and B in the
signed dat,a of TokenBA and TokenAB, respectively, is
B.
necessary to prevent the tokens from being accepted by
(3) On receipt of the message containing TokenAB, B anyone other than the intended verifier.
performs the following steps:
Steps (1) and (2) are identical to those specified in 5.1.1,
(i) It ensures that it is in possession of a valid
one pass authentication.
public key of A either by verifying the certifi-
cate of A or by some other means.
(3) B sends TokenBA and, optionally, its certificate to
(ii) It verifies TokenAB by checking the signature
A.
of A contained in the token and by checking
(4) The message in step (3) is handled in a manner
that the random number RB, sent to A in step
analogous to step (2) of 5.1.1.
(l), agrees with the random number contained
in the signed data of TokenAB.
NOTE 2 - The two messages of this mechanism are
not bound together in any way, other than implicitly
by timeliness; the mechanism involves independent use
5.2 Mutual authentication
of mechanism 5.1.1 twice. If it is desired to bind these
messages further, appropriate use could be made of text
Mutual authentication means that the two communicat-
fields (see annex A).
0 ing entities are authenticated to each other by use of the
mechanism.
5.2.2 Three pass authentication
The two mechanisms described in 5.1.1 and 5.1.2 are
In this authent,ication mechanism uniqueness / timeli-
extended in 5.2.1 and 5.2.2, respectively, to achieve mu-
ness is controlled by generating and checking random
tual authentication. This is done by transmitting one
numbers (see annex C).
further message resulting in two additional steps.
The authenticatmion mechanism is illustrated in figure 4.
(1) RsllTextl
2) CertAllTokenAB
(5) A B (3)
Figure 4
The tokens are of the following form:
c
(4) A 4 B (2)
The inclusion of t4he parameter B in TokenAB and the
(3) CertBllTokenBA
inclusion of t,he parameter A in TokenBA are optional.
They depend on the environment in which this authen-
tication mechanism is used.
NOTE - The random number RA is present in
TokenAB to prevent B from obtaining the signature
of A on data chosen by B prior to the start of the au-
thentication mechanism. This prevention may be re-
quired, for example, when the same key is used by A
The form of the token (TokenBA), sent by B to A, is:
for other piirposes in addition to entity authentication.
For similar reasons the random number RB is present
in TokenBA. Furthermore, checking that this random
number is the same as the random number in the first
message is necessary for security considerations.
The choice of using either time stamps or sequence num-
bers in this mechanism depends on the technical capa-
(1) B sends a random number RB and, optionally, a
bilities of the claimant and the verifier as well as on the
environment. text field Text1 to A.
@ TSO/IEC
ISO/IEC 9798-3: 1993 (E)
The inclusion of the parameter B in TokenAB and the
(2) A sends TokenAB and, optionally, its certificate to
B. inclusion of the parameter A in TokenBA are optional.
They depend on the environment in which this authen-
(3) On receipt of the message containing TokenAB, B
tication mechanism is used.
performs the following steps:
NOTE 1 - The random number RA is present in
a valid
(i) It ensures that it is in possession of
TokenAB to prevent B from obtaining the signature
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.

Loading comments...