Language:
    • Available Formats
    • Options
    • Availability
    • Priced From ( in USD )
    • Secure PDF 🔒
    • 👥
    • Immediate download
    • $398.78
    • Add to Cart
    • Printed Edition
    • Ships in 1-2 business days
    • $398.78
    • Add to Cart
    • Printed Edition + PDF
    • Immediate download
    • $538.48
    • Add to Cart

Customers Who Bought This Also Bought

 

About This Item

 

Full Description

BS ISO/IEC 11770-3:2015+A1:2017 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals.
  • a) Establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key agreement mechanism, the secret key is computed as the result of a data exchange between the two entities A and B. Neither of them should be able to predetermine the value of the shared secret key.
  • b) Establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B via key transport. In a secret key transport mechanism, the secret key is chosen by one entity A and is transferred to another entity B, suitably protected by asymmetric techniques.
  • c) Make an entity's public key available to other entities via key transport. In a public key transport mechanism, the public key of entity A shall be transferred to other entities in an authenticated way, but not requiring secrecy.
Some of the mechanisms of this part of ISO/IEC 11770 are based on the corresponding authentication mechanisms in ISO/IEC 9798-3.


Cross References:
ISO/IEC 19772
ISO/IEC 11770-6
IEC 10118
IEC 15946-1
IEC 18031
IEC 11770-1
IEC 18031:2011
ISO/IEC 8824
IETF RFC 2246:1999
IEC 9796-3:2006
IEC 14888
IEEE 1363
ITU-T Rec. X.690
IETF RFC 6509:2012
IEC 29150:2011
IEC 11770-6
IEC 9798-3
IEC 9797
ANSI X9.42-2001
IEC 9594-8:2008
ANSI X9.63
ISO/IEC 8825
IEC 9796-2:2010
ITU-T Rec. X.680
ISO/IEC 10181-1:1996
ISO 7498-2:1989


Incorporates the following:
Amendment, January 2018; Corrigendum, July 2016
 

Document History

  1. BS ISO/IEC 11770-3:2021


    Information security. Key management-Mechanisms using asymmetric techniques

    • Most Recent
  2. BS ISO/IEC 11770-3:2015+A1:2017

    👀 currently
    viewing


    Information technology. Security techniques. Key management-Part 3: Mechanisms using asymmetric techniques

    • Historical Version
  3. BS ISO/IEC 11770-3:2015


    Information technology. Security techniques. Key management. Mechanisms using asymmetric techniques

    • Historical Version
  4. BS ISO/IEC 11770-3:2008


    Information technology. Security techniques. Key management-Mechanisms using asymmetric techniques

    • Historical Version
  5. BS 07/30161232 DC


    BS ISO/IEC 11770-3. Information technology. Security techniques. Key management. Part 3. Mechanisms using asymmetric techniques

    • Historical Version
  6. BS ISO/IEC 15946-3:2002


    Information technology. Security techniques. Cryptographic techniques based on elliptic curves-Key establishment

    • Historical Version
  7. BS ISO/IEC 11770-3:1999


    Information technology. Security techniques. Key management-Mechanisms using asymmetric techniques

    • Historical Version