The purpose of key management is to provide procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic algorithms according to the security policy in force. This part of ISO/IEC 11770 defines key establishment mechanisms using symmetric cryptographic techniques.Key establishment mechanisms using symmetric cryptographic techniques can be derived from the entity authentication mechanisms of ISO/IEC 9798-2 and ISO/IEC 9798-4 by specifying the use of text fields available in those mechanisms. Other key establishment mechanisms exist for specific environments; see, for example, ISO 8732. Besides key establishment, t
DS/ISO/IEC 11770-2/Corr. 1:2009 history
2009DS/ISO/IEC 11770-2/Corr. 1:2009 Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
2008DS/ISO/IEC 11770-2:2008 Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques