BS ISO/IEC 11770-3:2015+A1:2017 PDF

BS ISO/IEC 11770-3:2015+A1:2017 PDF

Name:
BS ISO/IEC 11770-3:2015+A1:2017 PDF

Published Date:
01/29/2018

Status:
Active

Description:

Information technology. Security techniques. Key management-Part 3: Mechanisms using asymmetric techniques

Publisher:
British Standard / ISO/IEC

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
$119.634
Need Help?
BS ISO/IEC 11770-3:2015+A1:2017 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals.
  • a) Establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key agreement mechanism, the secret key is computed as the result of a data exchange between the two entities A and B. Neither of them should be able to predetermine the value of the shared secret key.
  • b) Establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B via key transport. In a secret key transport mechanism, the secret key is chosen by one entity A and is transferred to another entity B, suitably protected by asymmetric techniques.
  • c) Make an entity's public key available to other entities via key transport. In a public key transport mechanism, the public key of entity A shall be transferred to other entities in an authenticated way, but not requiring secrecy.
Some of the mechanisms of this part of ISO/IEC 11770 are based on the corresponding authentication mechanisms in ISO/IEC 9798-3.


Cross References:
ISO/IEC 19772
ISO/IEC 11770-6
IEC 10118
IEC 15946-1
IEC 18031
IEC 11770-1
IEC 18031:2011
ISO/IEC 8824
IETF RFC 2246:1999
IEC 9796-3:2006
IEC 14888
IEEE 1363
ITU-T Rec. X.690
IETF RFC 6509:2012
IEC 29150:2011
IEC 11770-6
IEC 9798-3
IEC 9797
ANSI X9.42-2001
IEC 9594-8:2008
ANSI X9.63
ISO/IEC 8825
IEC 9796-2:2010
ITU-T Rec. X.680
ISO/IEC 10181-1:1996
ISO 7498-2:1989


Incorporates the following:
Amendment, January 2018; Corrigendum, July 2016
File Size : 1 file , 6.5 MB
ISBN(s) : 9780580965548
Note : This product is unavailable in Russia, Ukraine, Belarus
Number of Pages : 96
Product Code(s) : 30352206, 30352206, 30352206
Published : 01/29/2018

History

BS ISO/IEC 11770-3:2021
Published Date: 11/05/2021
Information security. Key management-Mechanisms using asymmetric techniques
$119.634
BS ISO/IEC 11770-3:2015+A1:2017
Published Date: 01/29/2018
Information technology. Security techniques. Key management-Part 3: Mechanisms using asymmetric techniques
$119.634
BS ISO/IEC 11770-3:2008
Published Date: 08/31/2010
Information technology. Security techniques. Key management-Mechanisms using asymmetric techniques
$119.634
BS ISO/IEC 15946-3:2002
Published Date: 02/06/2003
Information technology. Security techniques. Cryptographic techniques based on elliptic curves-Key establishment
$92.964
BS ISO/IEC 11770-3:1999
Published Date: 01/15/2000
Information technology. Security techniques. Key management-Mechanisms using asymmetric techniques
$92.964

Related products


Best-Selling Products