ISO/IEC 11770-6:2016
Current
The latest, up-to-date edition.
Information technology Security techniques Key management Part 6: Key derivation
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
English
05-10-2016
ISO/IEC 11770-6:2016 specifies key derivation functions, i.e. functions which take secret information and other (public) parameters as input and output one or more "derived" secret keys. Key derivation functions based on MAC algorithms and on hash-functions are specified.
DocumentType |
Standard
|
Pages |
23
|
PublisherName |
International Organization for Standardization
|
Status |
Current
|
Standards | Relationship |
NEN ISO/IEC 11770-6 : 2016 | Identical |
BS ISO/IEC 11770-6:2016 | Identical |
INCITS/ISO/IEC 11770-6:2016(R2024) | Identical |
INCITS/ISO/IEC 11770-6:2016(R2024) | Identical |
INCITS/ISO/IEC 11770-6:2016(2019) | Identical |
17/30352205 DC : 0 | BS ISO/IEC 11770-3:2015/AMD 1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
BS ISO/IEC 18367:2016 | Information technology. Security techniques. Cryptographic algorithms and security mechanisms conformance testing |
ISO/IEC 18367:2016 | Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing |
BS ISO/IEC 11770-3 : 2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
18/30362144 DC : 0 | BS ISO/IEC 11770-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 2: MECHANISMS USING SYMMETRIC TECHNIQUES |
ISO/IEC 29167-16:2015 | Information technology — Automatic identification and data capture techniques — Part 16: Crypto suite ECDSA-ECDH security services for air interface communications |
CAN/CSA-ISO/IEC 11770-3:16 | Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques (Adopted ISO/IEC 11770-3:2015, third edition, 2015-08-01) |
ISO/IEC 11770-3:2015 | Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
CAN/CSA-ISO/IEC 29167-16:16 | Information technology Automatic identification and data capture techniques Part 16: Crypto suite ECDSA-ECDH security services for air interface communications (Adopted ISO/IEC 29167-16:2015, first edition, 2015-11-15) |
CAN/CSA-ISO/IEC 18367:18 | Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing (Adopted ISO/IEC 18367:2016, first edition, 2016-12-15) |
ISO/IEC 18031:2011 | Information technology Security techniques Random bit generation |
ISO/IEC 11770-2:2008 | Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques |
ISO/IEC 18033-2:2006 | Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers |
ISO/IEC 11770-4:2006 | Information technology Security techniques Key management Part 4: Mechanisms based on weak secrets |
AS ISO/IEC 9797.1:2019 | Information technology - Security techniques - Message Authentication Codes (MACs) Mechanisms using a block cipher |
ISO/IEC 11770-1:2010 | Information technology Security techniques Key management Part 1: Framework |
ISO/IEC 11770-3:2015 | Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.