ISO/IEC 9798-1:2010
(Main)Information technology - Security techniques - Entity authentication - Part 1: General
Information technology - Security techniques - Entity authentication - Part 1: General
ISO/IEC 9798-1:2010 specifies an authentication model and general requirements and constraints for entity authentication mechanisms which use security techniques. These mechanisms are used to corroborate that an entity is the one that is claimed. An entity to be authenticated proves its identity by showing its knowledge of a secret. The mechanisms are defined as exchanges of information between entities and, where required, exchanges with a trusted third party. The details of the mechanisms and the contents of the authentication exchanges are given in subsequent parts of ISO/IEC 9798.
Technologies de l'information — Techniques de sécurité — Authentification d'entité — Partie 1: Généralités
General Information
- Status
- Published
- Publication Date
- 15-Jun-2010
- Drafting Committee
- ISO/IEC JTC 1/SC 27/WG 2 - Cryptography and security mechanisms
- Current Stage
- 9093 - International Standard confirmed
- Start Date
- 15-Nov-2021
- Completion Date
- 30-Oct-2025
Relations
- Effective Date
- 04-Feb-2009
Overview - ISO/IEC 9798-1:2010 (Entity authentication - General)
ISO/IEC 9798-1:2010 defines the authentication model, terminology, and general requirements for entity authentication mechanisms that use security techniques. It specifies how an entity (the claimant) proves its identity by demonstrating knowledge of a secret, via standardized exchanges (tokens) between entities and, where required, with a trusted third party (TTP). Detailed protocol mechanisms are covered in subsequent parts of ISO/IEC 9798 (Parts 2–6).
Keywords: ISO/IEC 9798-1:2010, entity authentication, security techniques, authentication model, tokens, trusted third party, PKI.
Key topics and technical requirements
- Authentication model and roles
- Defines claimant, verifier, trusted third party, tokens, and message flows.
- Supports unilateral and mutual authentication.
- Exchange structure
- Tokens exchanged between entities; at least one token for unilateral, at least two for mutual authentication.
- Additional passes may be required for challenges or TTP involvement.
- Time-variant parameters
- Use of random numbers, time stamps, and sequence numbers to prevent replay attacks (see Annex B).
- Security properties to consider
- Prevention of replay, reflection, and interleaving attacks; forced-delay concerns.
- Choice of protocol depends on threats and whether a pre-established secret or TTP is available.
- Data composition and uniqueness
- Concatenation of data fields must be unambiguous so constituents can be uniquely resolved (e.g., fixed lengths or canonical encoding).
- Terminology and primitives
- Defines symmetric/asymmetric techniques, cryptographic check functions, public key certificates, tokens, and signature/encryption terminology.
- Scope constraints
- Part 1 specifies requirements and model only; concrete mechanisms and content are in Parts 2–6. Establishment of underlying infrastructure (e.g., PKI) is out of scope.
Practical applications
- Designing and evaluating authentication protocols for:
- Secure network access, client-server authentication, and mutual TLS-style flows.
- Smart cards, IoT device authentication, payment systems, and secure remote services.
- Implementing challenge–response and token-based authentication where robust replay/reflection protections are required.
- Specifying interoperability requirements between systems and vendors for authentication exchanges.
Who should use this standard
- Security architects, protocol designers, system integrators, PKI implementers, product vendors, and compliance auditors working on authentication solutions and secure communications.
Related standards
- ISO/IEC 9798 (Parts 2–6) - concrete mechanisms using symmetric encipherment, digital signatures, cryptographic check functions, zero-knowledge techniques, and manual transfer.
- ISO/IEC 8825-1 referenced for unambiguous encoding (distinguished encoding rules).
This standard is essential when you need a formal, interoperable model and general requirements to design secure entity authentication mechanisms and to reason about threats such as replay and man-in-the-middle attacks.
Frequently Asked Questions
ISO/IEC 9798-1:2010 is a standard published by the International Organization for Standardization (ISO). Its full title is "Information technology - Security techniques - Entity authentication - Part 1: General". This standard covers: ISO/IEC 9798-1:2010 specifies an authentication model and general requirements and constraints for entity authentication mechanisms which use security techniques. These mechanisms are used to corroborate that an entity is the one that is claimed. An entity to be authenticated proves its identity by showing its knowledge of a secret. The mechanisms are defined as exchanges of information between entities and, where required, exchanges with a trusted third party. The details of the mechanisms and the contents of the authentication exchanges are given in subsequent parts of ISO/IEC 9798.
ISO/IEC 9798-1:2010 specifies an authentication model and general requirements and constraints for entity authentication mechanisms which use security techniques. These mechanisms are used to corroborate that an entity is the one that is claimed. An entity to be authenticated proves its identity by showing its knowledge of a secret. The mechanisms are defined as exchanges of information between entities and, where required, exchanges with a trusted third party. The details of the mechanisms and the contents of the authentication exchanges are given in subsequent parts of ISO/IEC 9798.
ISO/IEC 9798-1:2010 is classified under the following ICS (International Classification for Standards) categories: 35.030 - IT Security; 35.040 - Information coding. The ICS classification helps identify the subject area and facilitates finding related standards.
ISO/IEC 9798-1:2010 has the following relationships with other standards: It is inter standard links to ISO/IEC 9798-1:1997. Understanding these relationships helps ensure you are using the most current and applicable version of the standard.
ISO/IEC 9798-1:2010 is available in PDF format for immediate download after purchase. The document can be added to your cart and obtained through the secure checkout process. Digital delivery ensures instant access to the complete standard document.
Standards Content (Sample)
INTERNATIONAL ISO/IEC
STANDARD 9798-1
Third edition
2010-07-01
Information technology — Security
techniques — Entity authentication —
Part 1:
General
Technologies de l'information — Techniques de sécurité —
Authentification d'entité —
Partie 1: Généralités
Reference number
©
ISO/IEC 2010
PDF disclaimer
This PDF file may contain embedded typefaces. In accordance with Adobe's licensing policy, this file may be printed or viewed but
shall not be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In
downloading this file, parties accept therein the responsibility of not infringing Adobe's licensing policy. The ISO Central Secretariat
accepts no liability in this area.
Adobe is a trademark of Adobe Systems Incorporated.
Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-creation
parameters were optimized for printing. Every care has been taken to ensure that the file is suitable for use by ISO member bodies. In
the unlikely event that a problem relating to it is found, please inform the Central Secretariat at the address given below.
© ISO/IEC 2010
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means,
electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or
ISO's member body in the country of the requester.
ISO copyright office
Case postale 56 • CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.org
Web www.iso.org
Published in Switzerland
ii © ISO/IEC 2010 – All rights reserved
Contents Page
Foreword .iv
Introduction.v
1 Scope.1
2 Normative references.1
3 Terms and definitions .1
4 Symbols and abbreviated terms .5
5 Authentication model.6
6 General requirements and constraints .6
Annex A (informative) Use of text field .7
Annex B (informative) Time variant parameters .8
Annex C (informative) Certificates .10
Bibliography.11
© ISO/IEC 2010 – All rights reserved iii
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are members of
ISO or IEC participate in the development of International Standards through technical committees
established by the respective organization to deal with particular fields of technical activity. ISO and IEC
technical committees collaborate in fields of mutual interest. Other international organizations, governmental
and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information
technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1.
International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2.
The main task of the joint technical committee is to prepare International Standards. Draft International
Standards adopted by the joint technical committee are circulated to national bodies for voting. Publication as
an International Standard requires approval by at least 75 % of the national bodies casting a vote.
Attention is drawn to the possibility that some of the elements of this document may be the subject of patent
rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights.
ISO/IEC 9798-1 was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology,
Subcommittee SC 27, IT Security techniques.
This third edition cancels and replaces the second edition (ISO/IEC 9798-1:1997), which has been technically
revised.
ISO/IEC 9798 consists of the following parts, under the general title Information technology — Security
techniques — Entity authentication:
⎯ Part 1: General
⎯ Part 2: Mechanisms using symmetric encipherment algorithms
⎯ Part 3: Mechanisms using digital signature techniques
⎯ Part 4: Mechanisms using a cryptographic check function
⎯ Part 5: Mechanisms using zero-knowledge techniques
⎯ Part 6: Mechanisms using manual data transfer
iv © ISO/IEC 2010 – All rights reserved
Introduction
In systems involving real-time communication, entity authentication is a fundamentally important security
service. Depending on the specific application and security goals, entity authentication can involve the use of
a simple one-pass protocol providing unilateral authentication, or a multi-pass protocol providing unilateral or
mutual authentication between the communicating parties.
The goal of entity authentication is to establish whether the claimant of a certain identity is in fact who it claims
to be. In order to achieve this goal, there should be a pre-existing infrastructure which links the entity to a
cryptographic secret (for instance a Public Key Infrastructure). The establishment of such an infrastructure is
beyond the scope of ISO/IEC 9798.
A variety of entity authentication protocols are specified in ISO/IEC 9798 in order to cater for different security
systems and security goals. For instance, when replay attacks are not practical or not an issue for a specific
system, simple protocols with fewer passes between claimant and verifier may suffice. However, in more
complex communication systems, man-in-the-middle attacks and replay attacks are a real threat. In such
cases one of the more involved protocols of ISO/IEC 9798 will be necessary to achieve the security goals of
the system.
There are two main models for authentication protocols. In one model, the claimant and verifier communicate
directly in order to establish the authenticity of the claimant identity. In the other model, entities establish
authenticity of identities using a common trusted third party.
The security properties of a scheme that must be considered before choosing an authentication protocol
include the following:
⎯ replay attack prevention;
⎯ reflection attack prevention;
⎯ forced delay prevention;
⎯ mutual/unilateral authentication;
⎯ whether a pre-established secret can be used, or a trusted third party needs to be involved to help
establish such a shared secret.
© ISO/IEC 2010 – All rights reserved v
INTERNATIONAL STANDARD ISO/IEC 9798-1:2010(E)
Information technology — Security techniques — Entity
authentication —
Part 1:
General
1 Scope
This part of ISO/IEC 9798 specifies an authentication model and general requirements and constraints for
entity authentication mechanisms which use security techniques. These mechanisms are used to corroborate
that an entity is the one that is claimed. An entity to be authenticated proves its identity by showing its
knowledge of a secret. The mechanisms are defined as exchanges of information between entities and, where
required, exchanges with a trusted third party.
The details of the mechanisms and the contents of the authentication exchanges are given in subsequent
parts of ISO/IEC 9798.
2 Normative references
There are no normative references for this part of ISO/IEC 9798.
3 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
3.1
asymmetric cryptographic technique
cryptographic technique that uses two related transformations: a public transformation (defined by the public
key) and a private transformation (defined by the private key)
NOTE The two transformations have the property that, given the public transformation, it is computationally infeasible
to derive the private transformation.
3.2
asymmetric encryption system
system based on asymmetric cryptographic techniques whose public operation is used for encryption and
whose private operation is used for decryption
3.3
asymmetric key pair
pair of related keys where the private key defines the private transformation and the public key defines the
public transformation
3.4
asymmetric signature system
system based on asymmetric cryptographic techniques whose private transformation is used for signing and
whose public transformation is used for verification
© ISO/IEC 2010 – All rights reserved 1
3.5
challenge
data item chosen at random and sent by the verifier to the claimant, which is used by the claimant, in
conjunction with secret information held by the claimant, to generate a response which is sent to the verifier
3.6
claimant
entity which is or represents a principal for the purposes of authentication
NOTE A claimant includes the functions and the private data necessary for engaging in authentication exchanges on
behalf of a principal.
3.7
ciphertext
data which has been transformed to hide its information content
3.8
cryptographic check function
cryptographic transformation which takes as input a secret key and an arbitrary string, and which gives a
cryptographic check value as output
NOTE The computation of a correct check value without knowledge of the secret key shall be infeasible.
3.9
cryptographic check value
information which is derived by performing a cryptographic transformation on the data unit
3.10
decryption
reversal of a corresponding encryption
3.11
digital signature (signature)
data appended to, or a cryptographic transformation of, a data unit that allows the recipient of the data unit to
prove the source and integrity of the data unit and protect against forgery, e.g. by the recipient
3.12
distinguishing identifier
information which unambiguously distinguishes an entity in the context of an authentication exchange
3.13
encryption
reversible operation by a cryptographic algorithm converting data into ciphertext so as to hide the information
content of the data
3.14
entity authentication
corroboration that an entity is the one claimed
3.15
interleaving attack
masquerade which involves use of information derived from one or more ongoing or previous authentication
exchanges
3.16
key
sequence of symbols that controls the operation of a cryptographic transformation
NOTE Examples are encryption, decryption, cryptographic check function computation, signature generation, or
signature verification.
2 © ISO/IEC 2010 – All rights reserved
3.17
masquerade
pretence by an entity to be a different entity
3.18
mutual authentication
entity authentication which provides both entities with assurance of each other's identity
3.19
plaintext
unenciphered information
3.20
principal
entity whose identity can be authenticated
3.21
private decryption key
private key which defines the private decryption transformation
3.22
private key
key of an entity's asymmetric key pair that is kept secret and which should only be used by that entity
3.23
private signature key
private key which defines the private signature transformation
NOTE This is sometimes referred to as a secret signature key.
3.24
public encryption key
public key which defines the public encryption transformation
3.25
public key
key of an entity's asymmetric key pair which can be made public
3.26
public key certificate (certificate)
public key information of an entity signed by the certification authority and thereby rendered unforgeable
NOTE See also Annex C.
3.27
public key information
information specific to a single entity and which contains at least the entity's distinguishing identifier and a
public key for this entity
NOTE Other information regarding the certification authority, the entity, and the public key may be included in the
public key certificate, such as the validity period of the public key, the validity period of the associated private key, or the
identifier of the involved algorithms (see also Annex C).
3.28
public verification key
public key which defines the public verification transformation
3.29
random number
time variant parameter whose value is unpredictable (see also Annex B)
© ISO/IEC 2010 – All rights reserved 3
3.30
reflection attack
masquerade which involves sending a previously transmitted message back to its originator
3.31
replay attack
masquerade which involves use of previously transmitted messages
3.32
sequence number
time variant parameter whose value is taken from a specified sequence which is non-repeating within a certain
time period
NOTE See also Annex B.
3.33
symmetric cryptographic technique
cryptographic technique that uses the same secret key for both the originator's and the recipient's
transformation
NOTE Without knowledge of the secret key, it is computationally infeasible to compute either the originator's or the
recipient's transformation.
3.34
symmetric encryption algorithm
encryption algorithm that uses the same secret key for both the originator's and the recipient's transformation
3.35
time stamp
time variant parameter which denotes a point in time with respect to a common reference
NOTE See also Annex B.
3.36
time variant parameter
data item used to verify that a message is not a replay, such as a random number, a time stamp or a
sequence number
NOTE See also Annex B.
3.37
token
message consisting of data fields relevant to a particular communication and which contains information that
has been transformed using a cryptographic technique
3.38
trusted third party
security authority or its agent, trusted by other entities with respect to security related activities
NOTE In the context of ISO/IEC 9798, a trusted third party is trusted by a claimant and/or a verifier for the purposes
of authentication.
3.39
unilateral authentication
entity authentication which provides one entity with assurance of the other's identity but not vice versa
3.40
verifier
entity which is or represents the entity requiring an authenticated identity
NOTE A verifier includes the functions necessary for engaging in authentication exchanges.
4 © ISO/IEC 2010
...




Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.
Loading comments...