Defines key establishment mechanisms using symmetric cryptographic techniques. Addresses three environments for the establishment of keys: Point-to-Point, Key Distribution Centre (KDC) and Key Translation Centre (KTC). Describes the required content of messages which carry keying material or are necessary to set up the conditions under which the keying material can be established.
ISO/IEC 11770-2:1996 history
2018ISO/IEC 11770-2:2018 IT Security techniques — Key management — Part 2: Mechanisms using symmetric techniques
2009ISO/IEC 11770-2:2008/Cor 1:2009 Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques; Technical Corrigendum 1
2008ISO/IEC 11770-2:2008 Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
2005ISO/IEC 11770-2:1996/Cor 1:2005 Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques; Technical Corrigendum 1
1996ISO/IEC 11770-2:1996 Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques