• Shopping Cart
    There are no items in your cart

ISO/IEC 11770-6:2016

Current

Current

The latest, up-to-date edition.

Information technology Security techniques Key management Part 6: Key derivation

Available format(s)

Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users

Language(s)

English

Published date

05-10-2016

€123.00
Excluding VAT

ISO/IEC 11770-6:2016 specifies key derivation functions, i.e. functions which take secret information and other (public) parameters as input and output one or more "derived" secret keys. Key derivation functions based on MAC algorithms and on hash-functions are specified.

DocumentType
Standard
Pages
23
PublisherName
International Organization for Standardization
Status
Current

Standards Relationship
NEN ISO/IEC 11770-6 : 2016 Identical
BS ISO/IEC 11770-6:2016 Identical
INCITS/ISO/IEC 11770-6:2016(2019) Identical

17/30352205 DC : 0 BS ISO/IEC 11770-3:2015/AMD 1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES
BS ISO/IEC 18367:2016 Information technology. Security techniques. Cryptographic algorithms and security mechanisms conformance testing
ISO/IEC 18367:2016 Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing
BS ISO/IEC 11770-3 : 2015 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES
18/30362144 DC : 0 BS ISO/IEC 11770-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 2: MECHANISMS USING SYMMETRIC TECHNIQUES
ISO/IEC 29167-16:2015 Information technology — Automatic identification and data capture techniques — Part 16: Crypto suite ECDSA-ECDH security services for air interface communications
CAN/CSA-ISO/IEC 11770-3:16 Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques (Adopted ISO/IEC 11770-3:2015, third edition, 2015-08-01)
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
CAN/CSA-ISO/IEC 29167-16:16 Information technology Automatic identification and data capture techniques Part 16: Crypto suite ECDSA-ECDH security services for air interface communications (Adopted ISO/IEC 29167-16:2015, first edition, 2015-11-15)
CAN/CSA-ISO/IEC 18367:18 Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing (Adopted ISO/IEC 18367:2016, first edition, 2016-12-15)

ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
ISO/IEC 11770-2:2008 Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques
ISO/IEC 18033-2:2006 Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
ISO/IEC 11770-4:2006 Information technology Security techniques Key management Part 4: Mechanisms based on weak secrets
AS ISO/IEC 9797.1:2019 Information technology - Security techniques - Message Authentication Codes (MACs) Mechanisms using a block cipher
ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.