ISO/IEC 11770-3:2008 PDF

ISO/IEC 11770-3:2008 PDF

Name:
ISO/IEC 11770-3:2008 PDF

Published Date:
07/15/2008

Status:
[ Withdrawn ]

Description:

Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques

Publisher:
International Organization for Standardization/International Electrotechnical Commission

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
$79.5
Need Help?

ISO/IEC 11770-3:2008 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals.

  1. Establish a shared secret key for a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key agreement mechanism, the secret key is the result of a data exchange between the two entities A and B. Neither of them can predetermine the value of the shared secret key.
  2. Establish a shared secret key for a symmetric cryptographic technique between two entities A and B by key transport. In a secret key transport mechanism, the secret key is chosen by one entity A and is transferred to another entity B, suitably protected by asymmetric techniques.
  3. Make an entity's public key available to other entities by key transport. In a public key transport mechanism, the public key of entity A must be transferred to other entities in an authenticated way, but not requiring secrecy.

Some of the mechanisms of ISO/IEC 11770-3:2008 are based on the corresponding authentication mechanisms in ISO/IEC 9798-3.

ISO/IEC 11770-3:2008 does not cover aspects of key management such as

  • key lifecycle management,
  • mechanisms to generate or validate asymmetric key pairs,
  • mechanisms to store, archive, delete, destroy, etc. keys.

While ISO/IEC 11770-3:2008 does not explicitly cover the distribution of an entity's private key (of an asymmetric key pair) from a trusted third party to a requesting entity, the key transport mechanisms described can be used to achieve this. A private key can in all cases be distributed with these mechanisms where an existing, non-compromised key already exists. However, in practice the distribution of private keys is usually a manual process that relies on technological means like smart cards, etc.

ISO/IEC 11770-3:2008 does not cover the implementations of the transformations used in the key management mechanisms.


File Size : 1 file , 550 KB
Note : This product is unavailable in Russia, Ukraine, Belarus
Published : 07/15/2008
Same As : ISO/IEC 11770-3:2008

History

ISO/IEC 11770-3:2021
Published Date: 10/01/2021
Information security - Key management - Part 3: Mechanisms using asymmetric techniques
$83.4
ISO/IEC 11770-3:2015/Amd1:2017
Published Date: 11/01/2017
- Amendment 1: Blinded Diffie-Hellman key agreement
$5.7
ISO/IEC 11770-3:2008
Published Date: 07/15/2008
Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques
$79.5
ISO/IEC 11770-3:1999
Published Date: 11/01/1999
Information technology -- Security techniques -- Key management -- Part 3: Mechanisms using asymmetric techniques
$38.7

Related products

ISO/IEC 11770-4:2017
Published Date: 11/01/2017
Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets
$66.9
ISO/IEC 11770-2:2018
Published Date: 10/01/2018
IT Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
$58.2
ISO/IEC 18047-6:2017
Published Date: 10/01/2017
Information technology - Radio frequency identification device conformance test methods - Part 6: Test methods for air interface communications at 860 MHz to 960 MHz
$83.4
ISO/IEC 23005-5:2019
Published Date: 03/01/2019
Information technology - Media context and control - Part 5: Data formats for interaction devices
$83.4

Best-Selling Products

VDI/VDE/DGZfP 2633
Published Date: 10/01/2004
Optical form measurement - System requirements - Standard form