• BS ISO/IEC 11770-3 : 2015

    Current The latest, up-to-date edition.

    INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES

    Available format(s):  Hardcopy, PDF

    Language(s):  English

    Published date:  01-01-2015

    Publisher:  British Standards Institution

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Introduction
    1 Scope
    2 Normative references
    3 Terms and definitions
    4 Symbols and abbreviations
    5 Requirements
    6 Key derivation functions
    7 Cofactor multiplication
    8 Key commitment
    9 Key confirmation
    10 Framework for key management
    11 Key agreement
    12 Secret key transport
    13 Public key transport
    Annex A (normative) - Object identifiers
    Annex B (informative) - Properties of key establishment
            mechanisms
    Annex C (informative) - Examples of key derivation
            functions
    Annex D (informative) - Examples of key establishment
            mechanisms
    Annex E (informative) - Examples of elliptic curve based
            key establishment mechanisms
    Annex F (informative) - Example of bilinear pairing based
            key establishment mechanisms
    Annex G (informative) - Secret key transport
    Annex H (informative) - Patent information
    Bibliography

    Abstract - (Show below) - (Hide below)

    Explains key management mechanisms based on asymmetric cryptographic techniques.

    General Product Information - (Show below) - (Hide below)

    Committee IST/33
    Development Note Supersedes 96/646839 DC. (08/2005) Supersedes 07/30161232 DC. (08/2008) Supersedes BS ISO/IEC 15946-3. (09/2008) Supersedes 13/30257954 DC. (08/2015) 2015 Edition Re-Issued in January 2018 & incorporates AMD 1 2017. Supersedes 17/30352205 DC. (02/2018)
    Document Type Standard
    Publisher British Standards Institution
    Status Current
    Supersedes

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
    ISO/IEC 19772:2009 Information technology Security techniques Authenticated encryption
    ISO/IEC 9798-3:1998 Information technology Security techniques Entity authentication Part 3: Mechanisms using digital signature techniques
    ISO/IEC 14888-3:2016 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
    ISO/IEC 11770-6:2016 Information technology Security techniques Key management Part 6: Key derivation
    ISO/IEC 9796-3:2006 Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms
    ISO/IEC 10181-1:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Overview
    ISO/IEC 9594-8:2017 Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks
    ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
    ISO/IEC 29150:2011 Information technology — Security techniques — Signcryption
    ISO/IEC 9796-2:2010 Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms
    ANSI X9.63 : 2011 FINANCIAL SERVICES - PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY, KEY AGREEMENT AND KEY TRANSPORT USING ELLIPTIC CURVE CRYPTOGRAPHY
    ISO/IEC 14888-2:2008 Information technology Security techniques Digital signatures with appendix Part 2: Integer factorization based mechanisms
    ANSI X9.42 : 2003(R2013) PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES: AGREEMENT OF SYMMETRIC KEYS USING DISCRETE LOGARITHM CRYPTOGRAPHY
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective