UNLIMITED FREE ACCESS TO THE WORLD'S BEST IDEAS

close
Already an Engineering360 user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your Engineering360 Experience

close
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

ISO/IEC 11770-6

Information technology - Security techniques - Key management - Part 6: Key derivation

active, Most Current
Buy Now
Organization: ISO
Publication Date: 1 October 2016
Status: active
Page Count: 30
ICS Code (Information coding): 35.040
scope:

This document specifies key derivation functions, i.e. functions which take secret information and other (public) parameters as input and output one or more "derived" secret keys. Key derivation functions based on MAC algorithms and on hash-functions are specified.

Document History

ISO/IEC 11770-6
October 1, 2016
Information technology - Security techniques - Key management - Part 6: Key derivation
This document specifies key derivation functions, i.e. functions which take secret information and other (public) parameters as input and output one or more “derived” secret keys. Key derivation...

References

Advertisement