ISO/IEC JTC 1/SC 27 11770-3:2015 – Key management – Part 3: Mechanisms using asymmetric techniques

This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. a) Establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B by key agreement. b) Establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B via key transport. c) Make an entity’s public key available to other entities via key transport. Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:11770:-3:ed-3:v1:en

Status: Published

Publication Date:

Category: Cybersecurity

Working Group:

Primary Source:

Source: https://www.standict.eu/standards-repository/standard/isoiec-jtc-1sc-27-11770-32015-key-management-part-3-mechanisms-using

Previous Article

ISO/IEC DTR 24372 Information technology - Artificial intelligence (AI) - Overview of computational approaches for AI systems

Next Article

ISO/IEC JTC 1/SC 27 9798-4:1999 Entity authentication - Part 4: Mechanisms using a cryptographic check function

StandardsGPT

Ask your questions!