ISO/IEC JTC 1/SC 27 11770-3:2015 - Key management - Part 3: Mechanisms using asymmetric techniques

  • Home
  • ISO/IEC JTC 1/SC 27 11770-3:2015 - Key management - Part 3: Mechanisms using asymmetric techniques

Error message

User warning: The following module is missing from the file system: cascading_grants_services. For information about how to fix this, see the documentation page. in _drupal_trigger_error_with_delayed_logging() (line 1184 of /var/www/html/web/includes/bootstrap.inc).


ISO/IEC JTC 1/SC 27 11770-3:2015 - Key management - Part 3: Mechanisms using asymmetric techniques

SCOPE

This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals.

a) Establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B by key agreement.

b) Establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B via key transport.

c) Make an entity's public key available to other entities via key transport.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:11770:-3:ed-3:v1:en

COMMITTEE / WG
WIKI WATCH

Insert here: activities, gaps, opportunities, and other user driven comments

Back to the search results