Language:
    • Available Formats
    •  
    • Availability
    • Priced From ( in USD )
    • Secure PDF 🔒
    • Immediate download
    • $115.00
    • Add to Cart
    • Printed Edition
    • Ships in 1-2 business days
    • $115.00
    • Add to Cart

Customers Who Bought This Also Bought

 

About This Item

 

Full Description

1. Scope

This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals:

1. Establish a shared secret key for a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key agreement mechanism the secret key is the result of a data exchange between the two entities A and B. Neither of them can predetermine the value of the shared secret key.

2. Establish a shared secret key for a symmetric cryptographic technique between two entities A and B by key transport. In a secret key transport mechanism the secret key is chosen by one entity A and is transferred to another entity B, suitably protected by asymmetric techniques.

3. Make an entity's public key available to other entities by key transport. In a public key transport mechanism, the public key of an entity A must be transferred to other entities in an authenticated way, but not requiring secrecy.

Some of the mechanisms of this part of ISO/IEC 11770 are based on the corresponding authentication mechanisms in ISO/IEC 9798-3.

This part of ISO/IEC 11770 does not cover aspects of key management such as

- key lifecycle management, - mechanisms to generate or validate asymmetric key pairs, - mechanisms to store, archive, delete, destroy, etc. keys.

While this part of ISO/IEC 11770 does not explicitly cover the distr ibution of an entity's private key (of an asymmetric key pair) from a trusted third party to a requesting entity, the key transport mechanisms described can be used to achieve this.

This part of ISO/IEC 11770 does not cover the implementations of the transformations used in the key management mechanisms.

NOTE - To achieve authenticity of key management messages it is possible to make provisions for authenticity within the key establishment protocol or to use a public key signature system to sign the key exchange messages.
 

Document History

  1. CAN/CSA-ISO/IEC 11770-3:22


    Information security - Key management - Part 3: Mechanisms using asymmetric techniques (Adopted ISO/IEC 11770-3:2021, fourth edition, 2021-10)

    • Most Recent
  2. CAN/CSA-ISO/IEC 11770-3:16 (R2021)


    Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques (Adopted ISO/IEC 11770-3:2015, third edition, 2015-08-01)

    • Historical Version
  3. CAN/CSA-ISO/IEC 11770-3-09 (R2014)


    Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques (Adopted ISO/IEC 11770-3:2008, second edition, 2008-07-15)

    • Historical Version
  4. CAN/CSA-ISO/IEC 11770-3-01

    👀 currently
    viewing


    Information Technology - Security Techniques - Key Management - Part 3: Mechanisms Using Asymmetric Techniques (Adopted ISO/IEC 11770-3:1999, first edition, 1999-11-01)

    • Historical Version