18/30362144 DC : 0
NA
Status of Standard is Unknown
BS ISO/IEC 11770-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 2: MECHANISMS USING SYMMETRIC TECHNIQUES
Hardcopy , PDF
English
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 Requirements
6 Point-to-point key establishment
7 Mechanisms using a Key Distribution Centre
8 Mechanisms using a Key Translation Centre
Annex A (normative) - Object identifiers
Annex B (informative) - Properties of key establishment
mechanisms
Annex C (informative) - Auxiliary techniques
Bibliography
BS ISO/IEC 11770-2.
Committee |
IST/33/2
|
DocumentType |
Draft
|
Pages |
36
|
PublisherName |
British Standards Institution
|
Status |
NA
|
ISO/IEC 18031:2011 | Information technology Security techniques Random bit generation |
ISO/IEC 19772:2009 | Information technology Security techniques Authenticated encryption |
ISO/IEC 8825-1:2015 | Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1: |
ISO/IEC 11770-6:2016 | Information technology Security techniques Key management Part 6: Key derivation |
ISO/IEC 10116:2017 | Information technology — Security techniques — Modes of operation for an n-bit block cipher |
ISO/IEC 11770-1:2010 | Information technology Security techniques Key management Part 1: Framework |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.