• Shopping Cart
    There are no items in your cart

18/30362144 DC : 0

NA

NA

Status of Standard is Unknown

BS ISO/IEC 11770-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 2: MECHANISMS USING SYMMETRIC TECHNIQUES

Available format(s)

Hardcopy , PDF

Language(s)

English

€23.37
Excluding VAT

Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 Requirements
6 Point-to-point key establishment
7 Mechanisms using a Key Distribution Centre
8 Mechanisms using a Key Translation Centre
Annex A (normative) - Object identifiers
Annex B (informative) - Properties of key establishment
        mechanisms
Annex C (informative) - Auxiliary techniques
Bibliography

BS ISO/IEC 11770-2.

Committee
IST/33/2
DocumentType
Draft
Pages
36
PublisherName
British Standards Institution
Status
NA

ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
ISO/IEC 19772:2009 Information technology Security techniques Authenticated encryption
ISO/IEC 8825-1:2015 Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1:
ISO/IEC 11770-6:2016 Information technology Security techniques Key management Part 6: Key derivation
ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.