ISO/IEC 11770-6:2016 

Information technology - Security techniques - Key management - Part 6: Key derivation


Do you need a multi-user copy?




ISO/IEC 11770-6:2016 specifies key derivation functions, i.e. functions which take secret information and other (public) parameters as input and output one or more "derived" secret keys. Key derivation functions based on MAC algorithms and on hash-functions are specified.

Look inside

Relevant for

cyber security

smart city

Additional information

Publication typeInternational Standard
Publication date2016-10-05
Available language(s)English
TC/SCISO/IEC JTC 1/SC 27 - Information security, cybersecurity and privacy protectionrss
ICS35.030 - IT Security
File size897 KB

The following test report forms are related:

Share your publications

Learn how to share your publications with your colleagues, using networking options.

Payment information

Our prices are in Swiss francs (CHF). We accept all major credit cards (American Express, Mastercard and Visa), PayPal and bank transfers as form of payment.

Keep in touch

Keep up to date with new publication releases and announcements with our free IEC Just Published email newsletter.

Contact customer services

Please send your enquiry by email or call us on +41 22 919 02 11 between 09:00 – 17:00 CET Monday to Friday.