IT Security techniques — Key management — Part 2: Mechanisms using symmetric techniques

This document defines key establishment mechanisms using symmetric cryptographic techniques. This document addresses three environments for the establishment of keys: Point-to-Point, Key Distribution Centre (KDC), and Key Translation Centre (KTC). It describes the required content of messages which carry keying material or are necessary to set up the conditions under which the keying material can be established. This document does not indicate other information which can be contained in the messages or specify other messages such as error messages. The explicit format of messages is not within the scope of this document. This document does not specify the means to be used to establish initial secret keys; that is, all the mechanisms specified in this document require an entity to share a secret key with at least one other entity (e.g. a TTP). For general guidance on the key lifecycle, see ISO/IEC 11770-1. This document does not explicitly address the issue of inter-domain key management. This document also does not define the implementation of key management mechanisms; products complying with this document are not necessarily compatible.

Techniques de sécurité IT — Gestion de clés — Partie 2: Mécanismes utilisant des techniques symétriques

General Information

Status
Published
Publication Date
27-Sep-2018
Current Stage
9093 - International Standard confirmed
Completion Date
03-May-2024
Ref Project

Relations

Buy Standard

Standard
ISO/IEC 11770-2:2018 - IT Security techniques -- Key management
English language
28 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (Sample)

INTERNATIONAL ISO/IEC
STANDARD 11770-2
Third edition
2018-10
IT Security techniques — Key
management —
Part 2:
Mechanisms using symmetric
techniques
Techniques de sécurité IT — Gestion de clés —
Partie 2: Mécanismes utilisant des techniques symétriques
Reference number
ISO/IEC 11770-2:2018(E)
©
ISO/IEC 2018

---------------------- Page: 1 ----------------------
ISO/IEC 11770-2:2018(E)

COPYRIGHT PROTECTED DOCUMENT
© ISO/IEC 2018
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting
on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address
below or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Fax: +41 22 749 09 47
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
ii © ISO/IEC 2018 – All rights reserved

---------------------- Page: 2 ----------------------
ISO/IEC 11770-2:2018(E)

Contents Page
Foreword .iv
Introduction .v
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
4 Symbols and abbreviated terms . 3
5 Requirements . 4
6 Point-to-point key establishment . 6
6.1 General . 6
6.2 Key establishment mechanism 1 . 6
6.3 Key establishment mechanism 2 . 7
6.4 Key establishment mechanism 3 . 7
6.5 Key establishment mechanism 4 . 8
6.6 Key establishment mechanism 5 . 8
6.7 Key establishment mechanism 6 .10
7 Mechanisms using a Key Distribution Centre .11
7.1 General .11
7.2 Key establishment mechanism 7 .11
7.3 Key establishment mechanism 8 .12
7.4 Key establishment mechanism
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.