DS/ISO/IEC 11770-3:2008
Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques

Standard No.
DS/ISO/IEC 11770-3:2008
Release Date
2008
Published By
Danish Standards Foundation
Status
 2009-10
Replace By
DS/ISO/IEC 11770-3/Corr. 1:2009
Latest
DS/ISO/IEC 11770-3:2015
Replace
DS/ISO/IEC 11770-3:2000 DS/ISO/IEC 15946-3:2003
Scope
This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals.1) Establish a shared secret key for a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key agreement mechanism, the secret key is the result of a data exchange between the two entities A and B. Neither of them can predetermine the value of the shared secret key.2) Establish a shared secret key for a symmetric cryptographic technique between two entities A and B by key transport. In a secret key transport mechanism, the

DS/ISO/IEC 11770-3:2008 history

  • 2021 DS/ISO/IEC 11770-3:2021 Information security – Key management – Part 3: Mechanisms using asymmetric techniques
  • 0000 DS/ISO/IEC 11770-3:2015
  • 2009 DS/ISO/IEC 11770-3/Corr. 1:2009 Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques
  • 2008 DS/ISO/IEC 11770-3:2008 Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques
  • 0000 DS/ISO/IEC 15946-3:2003
  • 0000 DS/ISO/IEC 11770-3:2000



Copyright ©2024 All Rights Reserved