• Shopping Cart
    There are no items in your cart

ISO/IEC 11770-6:2016

Current

Current

The latest, up-to-date edition.

Information technology — Security techniques — Key management — Part 6: Key derivation

Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

05-10-2016

€127.00
Excluding VAT

ISO/IEC 11770-6:2016 specifies key derivation functions, i.e. functions which take secret information and other (public) parameters as input and output one or more "derived" secret keys. Key derivation functions based on MAC algorithms and on hash-functions are specified.

Committee
ISO/IEC JTC 1/SC 27
DocumentType
Standard
Pages
23
PublisherName
International Organization for Standardization
Status
Current

17/30352205 DC : 0 BS ISO/IEC 11770-3:2015/AMD 1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES
BS ISO/IEC 18367:2016 Information technology. Security techniques. Cryptographic algorithms and security mechanisms conformance testing
ISO/IEC 18367:2016 Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing
BS ISO/IEC 11770-3 : 2015 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES
18/30362144 DC : 0 BS ISO/IEC 11770-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 2: MECHANISMS USING SYMMETRIC TECHNIQUES
ISO/IEC 29167-16:2015 Information technology — Automatic identification and data capture techniques — Part 16: Crypto suite ECDSA-ECDH security services for air interface communications
ISO/IEC 11770-3:2015 Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques
INCITS/ISO/IEC 10118-3:2018(2019) IT Security techniques -- Hash-functions -- Part 3: Dedicated hash-functions<br>
INCITS/ISO/IEC 24727-3:2008(R2019) Identification cards — Integrated circuit card programming interfaces — Part 3: Application interface
INCITS/ISO/IEC 9798-3:2019(2019) IT Security techniques -- Entity authentication -- Part 3: Mechanisms using digital signature techniques
INCITS/ISO/IEC 11770-2:2018(2019) IT Security techniques -- Key management -- Part 2: Mechanisms using symmetric techniques
INCITS/ISO/IEC 14888-2:2008(R2019) Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms<br>

ISO/IEC 18031:2011 Information technology — Security techniques — Random bit generation
ISO/IEC 11770-2:2008 Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques
ISO/IEC 18033-2:2006 Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
ISO/IEC 11770-4:2006 Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets
AS ISO/IEC 9797.1:2019 Information technology - Security techniques - Message Authentication Codes (MACs) Mechanisms using a block cipher
ISO/IEC 11770-1:2010 Information technology — Security techniques — Key management — Part 1: Framework
ISO/IEC 11770-3:2015 Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques

Access your standards online with a subscription

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.

€127.00
Excluding VAT