DS/ISO/IEC 11770-2:2008
Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques

Standard No.
DS/ISO/IEC 11770-2:2008
Release Date
2008
Published By
Danish Standards Foundation
Status
 2009-10
Replace By
DS/ISO/IEC 11770-2/Corr. 1:2009
Latest
DS/ISO/IEC 11770-2/Corr. 1:2009
Replace
DS/ISO/IEC 11770-2:1997 DS/ISO/IEC 11770-2/Corr. 1:2005
Scope
The purpose of key management is to provide procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic algorithms according to the security policy in force. This part of ISO/IEC 11770 defines key establishment mechanisms using symmetric cryptographic techniques.Key establishment mechanisms using symmetric cryptographic techniques can be derived from the entity authentication mechanisms of ISO/IEC 9798-2 and ISO/IEC 9798-4 by specifying the use of text fields available in those mechanisms. Other key establishment mechanisms exist for specific environments; see, for example, ISO 8732. Besides key establishment, t

DS/ISO/IEC 11770-2:2008 history

  • 2009 DS/ISO/IEC 11770-2/Corr. 1:2009 Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
  • 2008 DS/ISO/IEC 11770-2:2008 Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
  • 0000 DS/ISO/IEC 11770-2/Corr. 1:2005
  • 0000 DS/ISO/IEC 11770-2:1997



Copyright ©2024 All Rights Reserved