• Shopping Cart
    There are no items in your cart

INCITS/ISO/IEC 11770-2 : 1996

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by

INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 2: MECHANISMS USING SYMMETRIC TECHNIQUES

Available format(s)

Hardcopy , PDF

Superseded date

15-02-2020

Language(s)

English

Published date

01-01-1996

€143.64
Excluding VAT

Foreword
1 Scope
2 Normative References
3 Definitions and Notations
4 Requirements
5 Point-to-Point Key Establishment
6 Key Distribution Centre
7 Key Translation Centre
Annex A (informative) - Properties of
        Key Establishment Mechanism
Annex B (informative) - Auxiliary
        Techniques
Annex C (informative) - Bibliography

Contains procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic algorithms according to the security policy in force.

Committee
CS1
DocumentType
Standard
Pages
20
PublisherName
Information Technology Industry Council
Status
Superseded
SupersededBy

Standards Relationship
ISO/IEC 11770-2:2008 Identical

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.