ISO/IEC 11770-2:2018 PDF

ISO/IEC 11770-2:2018 PDF

Name:
ISO/IEC 11770-2:2018 PDF

Published Date:
10/01/2018

Status:
Active

Description:

IT Security techniques - Key management - Part 2: Mechanisms using symmetric techniques

Publisher:
International Organization for Standardization/International Electrotechnical Commission

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
$58.2
Need Help?

ISO 11770-2:2018 defines key establishment mechanisms using symmetric cryptographic techniques.

This document addresses three environments for the establishment of keys: Point-to-Point, Key Distribution Centre (KDC), and Key Translation Centre (KTC). It describes the required content of messages which carry keying material or are necessary to set up the conditions under which the keying material can be established.

This document does not indicate other information which can be contained in the messages or specify other messages such as error messages. The explicit format of messages is not within the scope of this document.

This document does not specify the means to be used to establish initial secret keys; that is, all the mechanisms specified in this document require an entity to share a secret key with at least one other entity (e.g. a TTP). For general guidance on the key lifecycle, see ISO/IEC 11770-1. This document does not explicitly address the issue of inter-domain key management. This document also does not define the implementation of key management mechanisms; products complying with this document are not necessarily compatible.


Edition : 3rd
File Size : 1 file , 2.1 MB
Note : This product is unavailable in Russia, Ukraine, Belarus
Published : 10/01/2018
Same As : ISO/IEC 11770-2:2018

History

ISO/IEC 11770-2:2018
Published Date: 10/01/2018
IT Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
$58.2
ISO/IEC 11770-2 Ed. 1.0 en CORR1:2009
Published Date: 09/04/2009
Corrigendum 1 - Information technology -- Security techniques -- Key management -- Part 2: Mechanisms using symmetric techniques -
Free Download
ISO/IEC 11770-2:2008
Published Date: 06/15/2008
Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
$48.6
ISO/IEC 11770-2:1996
Published Date: 04/01/1996
Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
$27.6

Related products

ISO/IEC 18033-4:2011
Published Date: 12/15/2011
Information technology - Security techniques - Encryption algorithms - Part 4: Stream ciphers
$83.4
ISO/IEC 17825:2024
Published Date: 01/01/2024
Information technology - Security techniques - Testing methods for the mitigation of non-invasive attack classes against cryptographic modules
$66.9
ISO/IEC 27000:2018
Published Date: 02/01/2018
Information technology - Security techniques - Information security management systems - Overview and vocabulary
$58.2
ISO/IEC 20009-4:2017
Published Date: 08/01/2017
Information technology - Security techniques - Anonymous entity authentication - Part 4: Mechanisms based on weak secrets
$49.8

Best-Selling Products

FAS A-A-1270 VALID NOTICE 4
Published Date: 01/17/2012
ADHESIVE, POLYVINYL ACETATE EMULSION, GENERAL PURPOSE
$8.1
FAS A-A-1270
Published Date: 04/16/1996
ADHESIVE, POLYVINYL ACETATE EMULSION, GENERAL PURPOSE
$39.6
FAS A-A-1340A VALID NOTICE 1
Published Date: 11/06/2019
Wrench, Box, Stub End Type, Offset Handle
$8.1
FAS A-A-1340A
Published Date: 03/12/2002
WRENCH, BOX, STUD END TYPE, OFFSET HANDLE
$17.1
FAS A-A-1341A VALID NOTICE 1
Published Date: 11/06/2019
Wrench, Box, Stub End Type, Straight Handle
$8.1
FAS A-A-1341A
Published Date: 02/05/2002
WRENCH, BOX, STUD END TYPE, STRAIGHT HANDLE
$17.1