Customer Support: 131 242

  • Shopping Cart
    There are no items in your cart
Please Select Your Option.
It seems you are away from your “home” country. Do you wish to be re-directed to your “home” store? If you choose “YES”, you will see product, taxation, and shipping information relevant to your country. If you select “NO”, the current store's conditions will apply.
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

10/30237107 DC : DRAFT DEC 2010

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by

BS ISO/IEC 11770-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 5: GROUP KEY MANAGEMENT

Superseded date

31-01-2012

Superseded by

BS ISO/IEC 11770-5:2011

Published date

23-11-2012

Foreword
Introduction
1 Scope
2 Normative References
3 Terms and Definitions
4 Symbols and Abbreviations
5 Requirements
6 Tree based Key Establishment Mechanisms for Multiple
   Entities
7 Key Chain based Group Key Management
8 Key Chain based Group Key Management with Unlimited
   Forward Key Chain
9 Key Chain based Group Key Management with Limited
   Forward Key Chain
10 Key Chains with Tree based Key Distribution
Annex A (normative) - OID and ASN.1 Module
Annex B (informative) - Optimization mechanism
Bibliography

Committee
IST/33
DocumentType
Draft
PublisherName
British Standards Institution
Status
Superseded
SupersededBy

ISO/IEC 9798-2:2008 Information technology Security techniques Entity authentication Part 2: Mechanisms using symmetric encipherment algorithms
ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
ISO/IEC 9797-2:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function
ISO/IEC 14888-2:2008 Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms
ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework

Sorry this product is not available in your region.

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.