CAN/CSA-ISO/IEC 11770-1:12 (R2016)
Current
The latest, up-to-date edition.
Information technology - Security techniques - Key management - Part 1: Framework (Adopted ISO/IEC 11770-1:2010, second edition, 2010-12-01)
Hardcopy , PDF
English
01-01-2012
Foreword
Introduction
1 Scope
2 Terms and definitions
3 Symbols and abbreviated terms
4 General model of key management
5 Basic concepts of key management
6 Conceptual models for key distribution for two
entities
7 Specific service providers
Annex A (informative) - Threats to key management
Annex B (informative) - Key management information
objects
Annex C (informative) - Classes of cryptographic
applications
Annex D (informative) - Certificate lifecycle
management
Bibliography
This part of ISO/IEC 11770 a) establishes the general model on which key management mechanisms are based, b) defines the basic concepts of key management which are common to all the parts of ISO/IEC 11770, c) specifies the characteristics of key management services, d) establishes general principles on the management of keying material during its life cycle, and e) establishes the conceptual model of key distribution.
DocumentType |
Standard
|
Pages |
0
|
ProductNote |
Reconfirmed EN
|
PublisherName |
Canadian Standards Association
|
Status |
Current
|
Supersedes |
Preface Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the Canadian Advisory Committee (CAC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T). This Standard supersedes CAN/CSA-ISO/IEC 11770-1-01 (adoption of ISO/IEC 11770-1:1996, first edition, 1996-12-15). At the time of publication, ISO/IEC 11770-1:2010 is available from ISO and IEC in English only. CSA will publish the French version when it becomes available from ISO and IEC. Scope This part of ISO/IEC 11770 a) establishes the general model on which key management mechanisms are based, b) defines the basic concepts of key management which are common to all the parts of ISO/IEC 11770, c) specifies the characteristics of key management services, d) establishes general principles on the management of keying material during its life cycle, and e) establishes the conceptual model of key distribution.
Standards | Relationship |
ISO/IEC 11770-1:2010 | Identical |
ISO/IEC 18031:2011 | Information technology Security techniques Random bit generation |
ISO/IEC 19772:2009 | Information technology Security techniques Authenticated encryption |
ISO/IEC 11770-5:2011 | Information technology Security techniques Key management Part 5: Group key management |
ISO/IEC 11770-2:2008 | Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques |
ISO/IEC 11770-4:2006 | Information technology Security techniques Key management Part 4: Mechanisms based on weak secrets |
ISO/IEC 19790:2012 | Information technology — Security techniques — Security requirements for cryptographic modules |
ISO/IEC 9594-8:2017 | Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks |
ISO 7498-2:1989 | Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture |
ISO/IEC 29150:2011 | Information technology — Security techniques — Signcryption |
ISO/IEC 11770-3:2015 | Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.