IEC > Webstore > Search > Register > Check out > Payment > Order confirmation

Publication detail

 
Reference ISO/IEC 11770-1 ed2.0 withdrawn corrigendum
> preview
Title Information technology -- Security techniques -- Key management -- Part 1: Framework
Publication date 2010-11-22
Format, price
(Swiss francs)
and language
138.- 30 pages
138.- 585 Kb
 
Abstract ISO/IEC 11770-1:2010 defines a general model of key management that is independent of the use of any particular cryptographic algorithm. However, certain key distribution mechanisms can depend on particular algorithm properties, for example, properties of asymmetric algorithms.

ISO/IEC 11770-1:2010 contains the material required for a basic understanding of subsequent parts.

Examples of the use of key management mechanisms are included in ISO 11568. If non-repudiation is required for key management, ISO/IEC 13888 is applicable.

ISO/IEC 11770-1:2010 addresses both the automated and manual aspects of key management, including outlines of data elements and sequences of operations that are used to obtain key management services. However it does not specify details of protocol exchanges that might be needed.

As with other security services, key management can only be provided within the context of a defined security policy. The definition of security policies is outside the scope of ISO/IEC 11770.

The fundamental problem is to establish keying material whose origin, integrity, timeliness and (in the case of secret keys) confidentiality can be guaranteed to both direct and indirect users. Key management includes functions such as the generation, storage, distribution, deletion and archiving of keying material in accordance with a security policy (ISO 7498-2).

ISO/IEC 11770-1:2010 has a special relationship to the security frameworks for open systems (ISO/IEC 10181). All the frameworks, including this one, identify the basic concepts and characteristics of mechanisms covering different aspects of security.
Technical Committee JTC 1/SC 27 - IT security techniques  RSS
ICS Codes
35.040 Character sets and information coding
*Including coding of audio, picture, multimedia and hypermedia information, IT security techniques, encryption, bar coding, electronic signatures, etc.
 
Replaced by
 
Work in progress
ProjectStage codeForecast publication date
No project under development--


Search

>> Advanced search

Quick access by ref. number



Basket

Your basket is empty
Your country is :
Your TVA is : You must login...

Payment

Accepted credit cards:
Prices in CHF (Swiss francs)
Request a pro forma to pay by bank transfer or cheque
Learn how to share your publications with your colleagues, using networking options
Prices in CHF (Swiss francs)
We accept the following credit cards:
To pay by bank transfer: request a pro forma
If you purchase regularly through the IEC Webstore you can open a corporate account

Just Published

>> Published in the last 30 days

Bestsellers

  1. IEC 60601-1-2 Ed. 4.0
  2. IEC 60825-1 Ed. 3.0
  3. IEC 61010-1 Ed. 3.0
  4. IEC 60529 Ed. 2.2
  5. IEC 62682 Ed. 1.0
  6. IEC 61000-4-5 Ed. 3.0
  7. IEC 61439-1 Ed. 2.0
  8. IEC 60079-0 Ed. 6.0
  9. IEC 61000-3-2 Ed. 4.0
  10. IEC 61439-2 Ed. 2.0