ISO/IEC 11770-2:2008 PDF

ISO/IEC 11770-2:2008 PDF

Name:
ISO/IEC 11770-2:2008 PDF

Published Date:
06/15/2008

Status:
Active

Description:

Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques

Publisher:
International Organization for Standardization/International Electrotechnical Commission

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
$48.6
Need Help?

ISO/IEC 11770 is concerned with the management of cryptographic keys. ISO/IEC 11770-2:2008 specifies a series of 13 mechanisms for establishing shared secret keys using symmetric cryptography. These mechanisms address three different environments for the establishment of shared secret keys: point-to-point key establishment schemes, mechanisms using a Key Distribution Centre (KDC), and techniques that use a Key Translation Centre (KTC). ISO/IEC 11770-2:2008 describes the content of messages which carry keying material or are necessary to set up the conditions under which the keying material can be established. This second edition is a technically revised version of the first edition: Mechanism 12 has been modified to address identified security shortcomings.


File Size : 1 file , 320 KB
Note : This product is unavailable in Russia, Ukraine, Belarus
Published : 06/15/2008
Same As : ISO/IEC 11770-2:2008

History

ISO/IEC 11770-2:2018
Published Date: 10/01/2018
IT Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
$58.2
ISO/IEC 11770-2 Ed. 1.0 en CORR1:2009
Published Date: 09/04/2009
Corrigendum 1 - Information technology -- Security techniques -- Key management -- Part 2: Mechanisms using symmetric techniques -
Free Download
ISO/IEC 11770-2:2008
Published Date: 06/15/2008
Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
$48.6
ISO/IEC 11770-2:1996
Published Date: 04/01/1996
Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
$27.6

Related products

ISO/IEC 11770-4:2017
Published Date: 11/01/2017
Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets
$66.9

Best-Selling Products

SN-CLC/TS 45545-5:2009
Published Date: 01/28/2009
Railway applications — Fire protection on railway vehicles — Part 5: Fire safety requirements for electrical equipment including that of trolley buses, track guided buses and magnetic levitation vehicles