BS ISO/IEC 11770-3:2015+A1:2017 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals.
- a) Establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key agreement mechanism, the secret key is computed as the result of a data exchange between the two entities A and B. Neither of them should be able to predetermine the value of the shared secret key.
- b) Establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B via key transport. In a secret key transport mechanism, the secret key is chosen by one entity A and is transferred to another entity B, suitably protected by asymmetric techniques.
- c) Make an entity's public key available to other entities via key transport. In a public key transport mechanism, the public key of entity A shall be transferred to other entities in an authenticated way, but not requiring secrecy.
Some of the mechanisms of this part of ISO/IEC 11770 are based on the corresponding authentication mechanisms in ISO/IEC 9798-3.
Cross References:ISO/IEC 19772
ISO/IEC 11770-6
IEC 10118
IEC 15946-1
IEC 18031
IEC 11770-1
IEC 18031:2011
ISO/IEC 8824
IETF RFC 2246:1999
IEC 9796-3:2006
IEC 14888
IEEE 1363
ITU-T Rec. X.690
IETF RFC 6509:2012
IEC 29150:2011
IEC 11770-6
IEC 9798-3
IEC 9797
ANSI X9.42-2001
IEC 9594-8:2008
ANSI X9.63
ISO/IEC 8825
IEC 9796-2:2010
ITU-T Rec. X.680
ISO/IEC 10181-1:1996
ISO 7498-2:1989
Incorporates the following:Amendment, January 2018; Corrigendum, July 2016
| File Size : | 1
file
, 6.5 MB |
| ISBN(s) : | 9780580965548 |
| Note : | This product is unavailable in Russia, Ukraine, Belarus |
| Number of Pages : | 96 |
| Product Code(s) : | 30352206, 30352206, 30352206 |
| Published : | 01/29/2018 |