Customer Support: 131 242

  • Shopping Cart
    There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

BS ISO/IEC 11770-3 : 2015

Current

Current

The latest, up-to-date edition.

INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES

Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

01-01-2015

Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviations
5 Requirements
6 Key derivation functions
7 Cofactor multiplication
8 Key commitment
9 Key confirmation
10 Framework for key management
11 Key agreement
12 Secret key transport
13 Public key transport
Annex A (normative) - Object identifiers
Annex B (informative) - Properties of key establishment
        mechanisms
Annex C (informative) - Examples of key derivation
        functions
Annex D (informative) - Examples of key establishment
        mechanisms
Annex E (informative) - Examples of elliptic curve based
        key establishment mechanisms
Annex F (informative) - Example of bilinear pairing based
        key establishment mechanisms
Annex G (informative) - Secret key transport
Annex H (informative) - Patent information
Bibliography

Explains key management mechanisms based on asymmetric cryptographic techniques.

Committee
IST/33
DevelopmentNote
Supersedes 96/646839 DC. (08/2005) Supersedes 07/30161232 DC. (08/2008) Supersedes BS ISO/IEC 15946-3. (09/2008) Supersedes 13/30257954 DC. (08/2015) 2015 Edition Re-Issued in January 2018 & incorporates AMD 1 2017. Supersedes 17/30352205 DC. (02/2018)
DocumentType
Standard
Pages
96
PublisherName
British Standards Institution
Status
Current
Supersedes

Standards Relationship
ISO/IEC 11770-3:2015 Identical

ISO/IEC 18031:2011 Information technology — Security techniques — Random bit generation
ISO/IEC 19772:2009 Information technology Security techniques Authenticated encryption
ISO/IEC 9798-3:1998 Information technology Security techniques Entity authentication Part 3: Mechanisms using digital signature techniques
ISO/IEC 14888-3:2016 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
ISO/IEC 11770-6:2016 Information technology Security techniques Key management Part 6: Key derivation
ISO/IEC 9796-3:2006 Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms
ISO/IEC 10181-1:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Overview
ISO/IEC 9594-8:2017 Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks
ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
ISO/IEC 29150:2011 Information technology — Security techniques — Signcryption
ISO/IEC 9796-2:2010 Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms
ANSI X9.63 : 2011 FINANCIAL SERVICES - PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY, KEY AGREEMENT AND KEY TRANSPORT USING ELLIPTIC CURVE CRYPTOGRAPHY
ISO/IEC 14888-2:2008 Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms
ANSI X9.42 : 2003(R2013) PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES: AGREEMENT OF SYMMETRIC KEYS USING DISCRETE LOGARITHM CRYPTOGRAPHY

$596.90
Including GST where applicable

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.