Categories

AS/NZS ISO/IEC 11770.3:2008

AS/NZS ISO/IEC 11770.3:2008

Information technology - Security techniques - Key management Mechanisms using asymmetric techniques

Standards Australia

More details

Download

PDF AVAILABLE FORMATS IMMEDIATE DOWNLOAD
$34.32

$78.00

(price reduced by 56 %)

Table of Contents

<toc>
<bookmarktable>
<bookmark index=&apos;0&apos;>
<pageno>1</pageno>
<text>AS/NZS ISO/IEC 11770.3:2008 Information technology&#132;Security techniques&#132;Key management Part 3: Mechanisms using asymmetric tec</text>
<bookmark index=&apos;1&apos;>
<pageno>4</pageno>
<text>PREFACE</text>
</bookmark>
<bookmark index=&apos;2&apos;>
<pageno>7</pageno>
<text>1. Scope</text>
</bookmark>
<bookmark index=&apos;3&apos;>
<pageno>7</pageno>
<text>2. Normative references</text>
</bookmark>
<bookmark index=&apos;4&apos;>
<pageno>8</pageno>
<text>3. Definitions</text>
</bookmark>
<bookmark index=&apos;5&apos;>
<pageno>10</pageno>
<text>4. Symbols and abbreviations</text>
</bookmark>
<bookmark index=&apos;6&apos;>
<pageno>10</pageno>
<text>5. Requirements</text>
</bookmark>
<bookmark index=&apos;7&apos;>
<pageno>11</pageno>
<text>6. Secret key agreement</text>
<bookmark index=&apos;8&apos;>
<pageno>11</pageno>
<text>6.1 Key agreement mechanism 1</text>
</bookmark>
<bookmark index=&apos;9&apos;>
<pageno>12</pageno>
<text>6.2 Key agreement mechanism 2</text>
</bookmark>
<bookmark index=&apos;10&apos;>
<pageno>13</pageno>
<text>6.3 Key agreement mechanism 3</text>
</bookmark>
<bookmark index=&apos;11&apos;>
<pageno>14</pageno>
<text>6.4 Key agreement mechanism 4</text>
</bookmark>
<bookmark index=&apos;12&apos;>
<pageno>15</pageno>
<text>6.5 Key agreement mechanism 5</text>
</bookmark>
<bookmark index=&apos;13&apos;>
<pageno>16</pageno>
<text>6.6 Key agreement mechanism 6</text>
</bookmark>
<bookmark index=&apos;14&apos;>
<pageno>17</pageno>
<text>6.7 Key agreement mechanism 7</text>
</bookmark>
</bookmark>
<bookmark index=&apos;15&apos;>
<pageno>18</pageno>
<text>7. Secret key transport</text>
<bookmark index=&apos;16&apos;>
<pageno>19</pageno>
<text>7.1. Key transport mechanism 1</text>
</bookmark>
<bookmark index=&apos;17&apos;>
<pageno>19</pageno>
<text>7.2. Key transport mechanism 2</text>
</bookmark>
<bookmark index=&apos;18&apos;>
<pageno>21</pageno>
<text>7.3. Key transport mechanism 3</text>
</bookmark>
<bookmark index=&apos;19&apos;>
<pageno>22</pageno>
<text>7.4. Key transpor tmechanism 4</text>
</bookmark>
<bookmark index=&apos;20&apos;>
<pageno>23</pageno>
<text>7.5. Key transport mechanism 5</text>
</bookmark>
<bookmark index=&apos;21&apos;>
<pageno>25</pageno>
<text>7.6. Key transport mechanism 6</text>
</bookmark>
</bookmark>
<bookmark index=&apos;22&apos;>
<pageno>26</pageno>
<text>8. Public key transport</text>
<bookmark index=&apos;23&apos;>
<pageno>27</pageno>
<text>8.1. Public key distribution with-out a trusted third party</text>
</bookmark>
<bookmark index=&apos;24&apos;>
<pageno>28</pageno>
<text>8.2. Public key distribution using a trusted third party</text>
</bookmark>
</bookmark>
<bookmark index=&apos;25&apos;>
<pageno>30</pageno>
<text>Annex A (informative) Properties of key establishment mechanisms</text>
</bookmark>
<bookmark index=&apos;26&apos;>
<pageno>31</pageno>
<text>Annex B (informative) Examples of key establishment mechanisms</text>
</bookmark>
<bookmark index=&apos;27&apos;>
<pageno>36</pageno>
<text>Annex C (informative) Examples of elliptic curve based key establishment mechanisms</text>
</bookmark>
<bookmark index=&apos;28&apos;>
<pageno>40</pageno>
<text>Annex D (informative) Bibliography</text>
</bookmark>
<bookmark index=&apos;29&apos;>
<pageno>41</pageno>
<text>Annex E (informative) Patent Information</text>
</bookmark>
</bookmark>
</bookmarktable>
</toc>

Abstract

Adopts ISO/IEC 11770-3:1999 which defines key management mechanisms based on asymmetric cryptographic techniques.

General Product Information

Document Type Standard
Status Current
Publisher Standards Australia
Committee IT-012
Supersedes
  • DR 07104 CP

Contact us