KS X ISO/IEC 11770-3:2013
Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques

Standard No.
KS X ISO/IEC 11770-3:2013
Release Date
2013
Published By
Korean Agency for Technology and Standards (KATS)
Status
Replace By
KS X ISO/IEC 11770-3:2019
Latest
KS X ISO/IEC 11770-3:2019
Replace
KS X ISO/IEC 11770-3:2008
Scope
This standard specifies a key management mechanism based on asymmetric cryptography. In addition, we specifically address the use of asymmetric techniques to achieve the following objectives: 1) The shared secret key used in symmetric encryption technology between two entities A and B is set as key agreement. In a secret consensus mechanism, the secret key is the result of data exchange between two entities A and B. Neither of the two entities can determine the value of the shared secret key in advance. 2) The shared secret key used in symmetric encryption technology between the two entities A and B is set by key transfer. In the secret transmission mechanism, the secret key is selected by an entity A and transmitted to another entity B while being appropriately protected by an asymmetric technique. 3) Key transmission makes the public key of the entity available to other entities. In a public key transmission mechanism, entity A's public key must be transmitted to other entities in an authenticated manner without requiring confidentiality. Some of the mechanisms in this standard are similar to the authentication mechanisms in KS X ISO/IEC 9798-3. This standard does not cover the following key management issues:  ——Key life cycle management - Mechanisms for creating or validating asymmetric key pairs - Mechanisms for storing, preserving, deleting, and discarding keys. Regarding the distribution of the entity's private key (among asymmetric key pairs) to the requesting entity in the third trust period,

KS X ISO/IEC 11770-3:2013 history

  • 2019 KS X ISO/IEC 11770-3:2019 Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques
  • 2013 KS X ISO/IEC 11770-3:2013 Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques
  • 2008 KS X ISO/IEC 11770-3:2008 Information technology-Security techniques-Key management-Part 3:Mechanisms using asymmetric techniques



Copyright ©2024 All Rights Reserved