This standard (Part 2) specifies key establishment mechanisms using symmetric cryptography among procedures for handling cryptographic key-related information for use with symmetric or asymmetric cryptographic algorithms in accordance with valid security policies. do.
JIS X 5058-2:1998 history
1998JIS X 5058-2:1998 Information technology -- Security techniques -- Key management -- Part 2: Mechanisms using symmetric techniques