ISO/IEC 9798-6:2005 specifies four entity authentication mechanisms based on manual data transfer between authenticating devices. Such mechanisms may be appropriate in a variety of circumstances. One such application occurs in Personal Area Networks, where the owner of two personal devices capable of wireless communications wishes them to perform an entity authentication procedure as part of the process of preparing them for use in the network. These mechanisms may also be used to support key management functions.
ISO/IEC 9798-6:2005 specifies mechanisms in which entity authentication is achieved by
- manually transferring short data strings from one device to the other, or
- manually comparing short data strings output by the two devices.
In ISO/IEC 9798-6:2005, the meaning of the term entity authentication is different to the meaning applied in other parts of ISO/IEC 9798. Instead of one device verifying that the other device has a claimed identity (and vice versa), both devices in possession of a user verify that they correctly share a data string with the other device at the time of execution of the mechanism. Of course, this data string could contain identifiers for one or both of the devices.
Status: WithdrawnPublication date: 2005-08
Edition: 1Number of pages: 20
Technical Committee: ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection
- ICS :
- 35.030 IT Security
ISO/IEC 9798-6:2005Stage: 95.99
Corrigenda / AmendmentsWithdrawn
ISO/IEC 9798-6:2005/Cor 1:2009
Got a question?
Check out our FAQs
Monday to Friday - 09:00-12:00, 14:00-17:00 (UTC+1)
Keep up to date with ISO
Sign up to our newsletter for the latest news, views and product information.