• INCITS/ISO/IEC 11770-5 : 2012

    Superseded A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

    INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 5: GROUP KEY MANAGEMENT

    Available format(s):  Hardcopy, PDF

    Superseded date:  13-05-2018

    Language(s):  English

    Published date:  01-01-2012

    Publisher:  Information Technology Industry Council

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Introduction
    1 Scope
    2 Normative references
    3 Terms and definitions
    4 Symbols and abbreviations
    5 Requirements
    6 Tree based key establishment mechanisms for
      multiple entities
    7 Key chain based group key management
    8 Key chain based group key management with
      unlimited forward key chain
    9 Key chain based group key management with
      limited forward key chain
    Annex A (normative) - Object identifiers
    Annex B (informative) - Load balancing mechanism for
            general tree based structure
    Bibliography

    Abstract - (Show below) - (Hide below)

    Specifies key establishment mechanisms for multiple entities to provide procedures for handling cryptographic keying material used in symmetric or asymmetric cryptographic algorithms according to the security policy in force.

    General Product Information - (Show below) - (Hide below)

    Document Type Standard
    Publisher Information Technology Industry Council
    Status Superseded
    Superseded By

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
    ISO/IEC 19772:2009 Information technology Security techniques Authenticated encryption
    ISO/IEC 18033-3:2010 Information technology Security techniques Encryption algorithms Part 3: Block ciphers
    ISO/IEC 19790:2012 Information technology — Security techniques — Security requirements for cryptographic modules
    ISO/IEC 9798-2:2008 Information technology Security techniques Entity authentication Part 2: Mechanisms using symmetric encipherment algorithms
    ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
    ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
    ISO/IEC 9797-2:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function
    ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
    ISO/IEC 14888-2:2008 Information technology Security techniques Digital signatures with appendix Part 2: Integer factorization based mechanisms
    ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
    ISO/IEC 18033-4:2011 Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers
    ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective