INCITS/ISO/IEC 11770-3 : 1999 : R2006
Current
Current
The latest, up-to-date edition.
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES
Available format(s)
Hardcopy , PDF
Language(s)
English
Published date
01-01-2006
Publisher
€192.73
Excluding VAT
Foreword
1 Scope
2 Normative reference
3 Definitions
4 Symbols and abbreviations
5 Requirements
6 Secret key agreement
7 Secret key transport
8 Public key transport
Annex A (informative) Properties of key establishment
mechanisms
Annex B (informative) Examples of key establishment
mechanisms
Describes key management mechanisms based on asymmetric cryptographic techniques.
| Committee |
CS1
|
| DocumentType |
Standard
|
| Pages |
40
|
| ProductNote |
Reconfirmed 2006
|
| PublisherName |
Information Technology Industry Council
|
| Status |
Current
|
| Supersedes |
| Standards | Relationship |
| ISO/IEC 11770-3:2015 | Identical |
Summarise