• CSA ISO/IEC 11770-1 : 2012

    Superseded A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

    INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 1: FRAMEWORK

    Available format(s):  Hardcopy, PDF

    Superseded date:  16-07-2021

    Language(s):  English

    Published date:  31-12-2015

    Publisher:  Canadian Standards Association

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Introduction
    1 Scope
    2 Terms and definitions
    3 Symbols and abbreviated terms
    4 General model of key management
    5 Basic concepts of key management
    6 Conceptual models for key distribution for two
      entities
    7 Specific service providers
    Annex A (informative) - Threats to key management
    Annex B (informative) - Key management information
            objects
    Annex C (informative) - Classes of cryptographic
            applications
    Annex D (informative) - Certificate lifecycle
            management
    Bibliography

    Abstract - (Show below) - (Hide below)

    Defines: a) the general model on which key management mechanisms are based, b) the basic concepts of key management which are common to all the parts of ISO/IEC 11770, c) the characteristics of key management services, d) general principles on the management of keying material during its life cycle, and e) the conceptual model of key distribution.

    General Product Information - (Show below) - (Hide below)

    Document Type Standard
    Product Note Reconfirmed EN
    Publisher Canadian Standards Association
    Status Superseded
    Superseded By

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
    ISO/IEC 19772:2009 Information technology Security techniques Authenticated encryption
    ISO/IEC 11770-5:2011 Information technology Security techniques Key management Part 5: Group key management
    ISO/IEC 11770-2:2008 Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques
    ISO/IEC 11770-4:2006 Information technology Security techniques Key management Part 4: Mechanisms based on weak secrets
    ISO/IEC 19790:2012 Information technology — Security techniques — Security requirements for cryptographic modules
    ISO/IEC 9594-8:2017 Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks
    ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
    ISO/IEC 29150:2011 Information technology — Security techniques — Signcryption
    ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective