BS ISO/IEC 11770-1:2010
Current
The latest, up-to-date edition.
Information technology. Security techniques. Key management Framework
Hardcopy , PDF
English
31-12-2010
Foreword
Introduction
1 Scope
2 Terms and definitions
3 Symbols and abbreviated terms
4 General model of key management
5 Basic concepts of key management
6 Conceptual models for key distribution for two entities
7 Specific service providers
Annex A (informative) - Threats to key management
Annex B (informative) - Key management information objects
Annex C (informative) - Classes of cryptographic applications
Annex D (informative) - Certificate lifecycle management
Bibliography
Describes a general model of key management that is independent of the use of any particular cryptographic algorithm.
Committee |
IST/33/2
|
DevelopmentNote |
Supersedes 09/30204756 DC. (12/2010)
|
DocumentType |
Standard
|
Pages |
42
|
PublisherName |
British Standards Institution
|
Status |
Current
|
Supersedes |
This part of ISO/IEC11770 establishes the general model on which key management mechanisms are based, defines the basic concepts of key management which are common to all the parts of ISO/IEC11770, specifies the characteristics of key management services, establishes general principles on the management of keying material during its life cycle, and establishes the conceptual model of key distribution.
Standards | Relationship |
ISO/IEC 11770-1:2010 | Identical |
ISO/IEC 18031:2011 | Information technology Security techniques Random bit generation |
ISO/IEC 19772:2009 | Information technology Security techniques Authenticated encryption |
ISO/IEC 11770-5:2011 | Information technology Security techniques Key management Part 5: Group key management |
ISO/IEC 11770-2:2008 | Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques |
ISO/IEC 11770-4:2006 | Information technology Security techniques Key management Part 4: Mechanisms based on weak secrets |
ISO/IEC 19790:2012 | Information technology — Security techniques — Security requirements for cryptographic modules |
ISO/IEC 9594-8:2017 | Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks |
ISO 7498-2:1989 | Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture |
ISO/IEC 29150:2011 | Information technology — Security techniques — Signcryption |
ISO/IEC 11770-3:2015 | Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.