UNLIMITED FREE ACCESS TO THE WORLD'S BEST IDEAS

SUBMIT
Already a GlobalSpec user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your GlobalSpec Experience

Finish!
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

ISO/IEC 11770-2

IT Security techniques - Key management - Part 2: Mechanisms using symmetric techniques

active, Most Current
Buy Now
Organization: ISO
Publication Date: 1 October 2018
Status: active
Page Count: 36
ICS Code (IT Security): 35.030
scope:

This document defines key establishment mechanisms using symmetric cryptographic techniques.

This document addresses three environments for the establishment of keys: Point-to-Point, Key Distribution Centre (KDC), and Key Translation Centre (KTC). It describes the required content of messages which carry keying material or are necessary to set up the conditions under which the keying material can be established.

This document does not indicate other information which can be contained in the messages or specify other messages such as error messages. The explicit format of messages is not within the scope of this document.

This document does not specify the means to be used to establish initial secret keys; that is, all the mechanisms specified in this document require an entity to share a secret key with at least one other entity (e.g. a TTP). For general guidance on the key lifecycle, see ISO/IEC 11770-1. This document does not explicitly address the issue of inter-domain key management. This document also does not define the implementation of key management mechanisms; products complying with this document are not necessarily compatible.

Document History

ISO/IEC 11770-2
October 1, 2018
IT Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
This document defines key establishment mechanisms using symmetric cryptographic techniques. This document addresses three environments for the establishment of keys: Point-to-Point, Key...
September 15, 2009
Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques TECHNICAL CORRIGENDUM 1
The purpose of key management is to provide procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic algorithms according to the security policy in...
June 15, 2008
Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
The purpose of key management is to provide procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic algorithms according to the security policy in...
July 15, 2005
Information Technology - Security Techniques - Key Management - Part 2: Mechanisms Using Symmetric Techniques
A description is not available for this item.
April 15, 1996
Information Technology - Security Techniques - Key Management - Part 2: Mechanisms Using Symmetric Techniques
A description is not available for this item.

References

Advertisement