|Reference||ISO/IEC 11770-3 ed2.0 withdrawn corrigendum||
|Title||Information technology -- Security techniques -- Key management -- Part 3: Mechanisms using asymmetric techniques|
|Abstract||ISO/IEC 11770-3:2008 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals.
Some of the mechanisms of ISO/IEC 11770-3:2008 are based on the corresponding authentication mechanisms in ISO/IEC 9798-3.
ISO/IEC 11770-3:2008 does not cover aspects of key management such as
While ISO/IEC 11770-3:2008 does not explicitly cover the distribution of an entity's private key (of an asymmetric key pair) from a trusted third party to a requesting entity, the key transport mechanisms described can be used to achieve this. A private key can in all cases be distributed with these mechanisms where an existing, non-compromised key already exists. However, in practice the distribution of private keys is usually a manual process that relies on technological means like smart cards, etc.
ISO/IEC 11770-3:2008 does not cover the implementations of the transformations used in the key management mechanisms.
|Technical Committee||JTC 1/SC 27 - IT security techniques|
|Work in progress||
Quick access by ref. number
|Your basket is empty|
|Accepted credit cards:|
|Prices in CHF (Swiss francs)|
|Request a pro forma to pay by bank transfer or cheque|
|Learn how to share your publications with your colleagues, using networking options|
- IEC 60884-2-7-am1 Ed. 1.0
- IEC 60255-121 Ed. 1.0
- IEC 61300-2-35 Ed. 2.0
- IEC 60728-1-1 Ed. 2.0
- IEC 60728-1-2 Ed. 2.0
- IEC/TR 60269-5 Ed. 2.0
- IEC 60728-14 Ed. 1.0