PRICES include / exclude VAT
Homepage>BS Standards>35 INFORMATION TECHNOLOGY. OFFICE MACHINES>35.030 IT Security>BS ISO/IEC 11770-2:2018 IT Security techniques. Key management Mechanisms using symmetric techniques
Sponsored link
immediate downloadReleased: 2018-10-08
BS ISO/IEC 11770-2:2018 IT Security techniques. Key management Mechanisms using symmetric techniques

BS ISO/IEC 11770-2:2018

IT Security techniques. Key management Mechanisms using symmetric techniques

Format
Availability
Price and currency
English Secure PDF
Immediate download
317.20 USD
English Hardcopy
In stock
317.20 USD
Standard number:BS ISO/IEC 11770-2:2018
Pages:38
Released:2018-10-08
ISBN:978 0 580 98910 0
Status:Standard
DESCRIPTION

BS ISO/IEC 11770-2:2018


This standard BS ISO/IEC 11770-2:2018 IT Security techniques. Key management is classified in these ICS categories:
  • 35.030 IT Security

This document defines key establishment mechanisms using symmetric cryptographic techniques.

This document addresses three environments for the establishment of keys: Point-to-Point, Key Distribution Centre (KDC), and Key Translation Centre (KTC). It describes the required content of messages which carry keying material or are necessary to set up the conditions under which the keying material can be established.

This document does not indicate other information which can be contained in the messages or specify other messages such as error messages. The explicit format of messages is not within the scope of this document.

This document does not specify the means to be used to establish initial secret keys; that is, all the mechanisms specified in this document require an entity to share a secret key with at least one other entity (e.g. a TTP). For general guidance on the key lifecycle, see ISO/IEC 11770‑1. This document does not explicitly address the issue of inter-domain key management. This document also does not define the implementation of key management mechanisms; products complying with this document are not necessarily compatible.