BS ISO/IEC 11770-5:2011
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
Information technology Security techniques. Key management Group key management
Hardcopy , PDF
11-17-2020
English
01-31-2012
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviations
5 Requirements
6 Tree based key establishment mechanisms for
multiple entities
7 Key chain based group key management
8 Key chain based group key management with
unlimited forward key chain
9 Key chain based group key management with
limited forward key chain
Annex A (normative) - Object identifiers
Annex B (informative) - Load balancing mechanism for
general tree based structure
Bibliography
Describes key establishment mechanisms for multiple entities to provide procedures for handling cryptographic keying material used in symmetric or asymmetric cryptographic algorithms according to the security policy in force.
Committee |
IST/33/2
|
DevelopmentNote |
Supersedes 10/30237107 DC. (01/2012)
|
DocumentType |
Standard
|
Pages |
34
|
PublisherName |
British Standards Institution
|
Status |
Superseded
|
SupersededBy | |
Supersedes |
Standards | Relationship |
ISO/IEC 11770-5:2011 | Identical |
ISO/IEC 18031:2011 | Information technology Security techniques Random bit generation |
ISO/IEC 19772:2009 | Information technology Security techniques Authenticated encryption |
ISO/IEC 18033-3:2010 | Information technology Security techniques Encryption algorithms Part 3: Block ciphers |
ISO/IEC 19790:2012 | Information technology — Security techniques — Security requirements for cryptographic modules |
ISO/IEC 9798-2:2008 | Information technology Security techniques Entity authentication Part 2: Mechanisms using symmetric encipherment algorithms |
ISO/IEC 9797-1:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher |
ISO/IEC 10118-3:2004 | Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions |
ISO/IEC 9797-2:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function |
ISO/IEC 10116:2017 | Information technology — Security techniques — Modes of operation for an n-bit block cipher |
ISO/IEC 14888-2:2008 | Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms |
ISO/IEC 11770-1:2010 | Information technology Security techniques Key management Part 1: Framework |
ISO/IEC 18033-4:2011 | Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers |
ISO/IEC 11770-3:2015 | Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.