ISO/IEC 11770-1:2010 PDF

ISO/IEC 11770-1:2010 PDF

Name:
ISO/IEC 11770-1:2010 PDF

Published Date:
12/01/2010

Status:
Active

Description:

Information technology - Security techniques - Key management - Part 1: Framework

Publisher:
International Organization for Standardization/International Electrotechnical Commission

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
$58.2
Need Help?

ISO/IEC 11770-1:2010 defines a general model of key management that is independent of the use of any particular cryptographic algorithm. However, certain key distribution mechanisms can depend on particular algorithm properties, for example, properties of asymmetric algorithms.

ISO/IEC 11770-1:2010 contains the material required for a basic understanding of subsequent parts.

Examples of the use of key management mechanisms are included in ISO 11568. If non-repudiation is required for key management, ISO/IEC 13888 is applicable.

ISO/IEC 11770-1:2010 addresses both the automated and manual aspects of key management, including outlines of data elements and sequences of operations that are used to obtain key management services. However it does not specify details of protocol exchanges that might be needed.

As with other security services, key management can only be provided within the context of a defined security policy. The definition of security policies is outside the scope of ISO/IEC 11770.

The fundamental problem is to establish keying material whose origin, integrity, timeliness and (in the case of secret keys) confidentiality can be guaranteed to both direct and indirect users. Key management includes functions such as the generation, storage, distribution, deletion and archiving of keying material in accordance with a security policy (ISO 7498-2).

ISO/IEC 11770-1:2010 has a special relationship to the security frameworks for open systems (ISO/IEC 10181). All the frameworks, including this one, identify the basic concepts and characteristics of mechanisms covering different aspects of security.


File Size : 1 file , 340 KB
Note : This product is unavailable in Russia, Ukraine, Belarus
Published : 12/01/2010
Same As : ISO/IEC 11770-1:2010

History

ISO/IEC 11770-1:2010
Published Date: 12/01/2010
Information technology - Security techniques - Key management - Part 1: Framework
$58.2
ISO/IEC 11770-1:1996
Published Date: 12/01/1996
Information technology - Security techniques - Key management - Part 1: Framework
$31.2

Related products

ISO/IEC 8859-10:1998
Published Date: 07/01/1998
Information technology - 8-bit single-byte coded graphic character sets - Part 10: Latin alphabet No. 6
$24.3
ISO/IEC 29109-5:2019
Published Date: 06/01/2019
Information technology - Conformance testing methodology for biometric data interchange formats defined in ISO/IEC 19794 - Part 5: Face image data
$49.8

Best-Selling Products