ISO/IEC 11770-2
Information Technology - Security Techniques - Key Management - Part 2: Mechanisms Using Symmetric Techniques
inactive
Buy Now
Organization: | ISO |
Publication Date: | 15 April 1996 |
Status: | inactive |
Page Count: | 20 |
ICS Code (Information coding): | 35.040 |
Document History

October 1, 2018
IT Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
This document defines key establishment mechanisms using symmetric cryptographic techniques.
This document addresses three environments for the establishment of keys: Point-to-Point, Key...

September 15, 2009
Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques TECHNICAL CORRIGENDUM 1
The purpose of key management is to provide procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic algorithms according to the security policy in...

June 15, 2008
Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
The purpose of key management is to provide procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic algorithms according to the security policy in...

July 15, 2005
Information Technology - Security Techniques - Key Management - Part 2: Mechanisms Using Symmetric Techniques
A description is not available for this item.

ISO/IEC 11770-2
April 15, 1996
Information Technology - Security Techniques - Key Management - Part 2: Mechanisms Using Symmetric Techniques
A description is not available for this item.