ISO/IEC 11770-2:2008
$41.60
Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques
Published By | Publication Date | Number of Pages |
ISO | 2008-06 | 32 |
If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]
ISO/IEC 11770 is concerned with the management of cryptographic keys. ISO/IEC 11770-2:2008 specifies a series of 13 mechanisms for establishing shared secret keys using symmetric cryptography. These mechanisms address three different environments for the establishment of shared secret keys: point-to-point key establishment schemes, mechanisms using a Key Distribution Centre (KDC), and techniques that use a Key Translation Centre (KTC). ISO/IEC 11770-2:2008 describes the content of messages which carry keying material or are necessary to set up the conditions under which the keying material can be established. This second edition is a technically revised version of the first edition: Mechanism 12 has been modified to address identified security shortcomings.
Published Code | ISO |
---|---|
Published By | International Organization for Standardization |
Publication Date | 2008-06 |
Pages Count | 32 |
Language | English |
Edition | 2 |
File Size | 337.9 KB |
ICS Codes | 35.030 - IT Security |
Related products
-
BS ISO/IEC 11770-3:2008:2010 Edition
Information technology. Security techniques. Key management – Mechanisms using asymmetric techniques Published By Publication Date…
-
BS ISO/IEC 19770-2:2015:2018 Edition
Information technology. Software asset management – Software identification tag Published By Publication Date Number of…
-
BS ISO/IEC 11770-4:2017
Information technology. Security techniques. Key management – Mechanisms based on weak secrets Published By Publication…
-
BS ISO/IEC 11770-3:1999:2000 Edition
Information technology. Security techniques. Key management – Mechanisms using asymmetric techniques Published By Publication Date…
-
ISO/IEC 19770-2:2009
Information technology — Software asset management — Part 2: Software identification tag Published By Publication…
-
ISO/IEC 11770-2:2018
IT Security techniques — Key management — Part 2: Mechanisms using symmetric techniques Published By…
-
AS/NZS ISO/IEC 11770.3:2008
Information technology – Security techniques – Key management – Mechanisms using asymmetric techniques Published By…
-
BS ISO/IEC 19770-2:2009:2010 Edition
Information technology. Software asset management – Software identification tag Published By Publication Date Number of…
-
CAN/CSA-ISO/IEC 11770-3:16:2016 Edition
Information technology – Security techniques – Key management – Part 3: Mechanisms using asymmetric techniques…
-
BS ISO 11870:2000
Milk and milk products. Determination of fat content. General guidance on the use of butyrometric…
-
AS/NZS ISO/IEC 11770.2:2008
Information technology – Security techniques – Key management – Mechanisms using symmetric techniques Published By…
-
BS EN ISO 11670:2000
Lasers. Test methods for laser beam parameters. Beam positional stability Published By Publication Date Number…
-
BS ISO/IEC 19770-5:2015
Information technology. IT asset management. Overview and vocabulary Published By Publication Date Number of Pages…
-
CSA ISO/IEC 10118-3:19:2019 Edition
IT Security techniques – Hash-functions -Part 3: Dedicated hash-functions Published By Publication Date Number of…
-
BS ISO/IEC 14888-2:2008:2015 Edition
Information technology. Security techniques. Digital signatures with appendix – Integer factorization based mechanisms Published By…
-
BS ISO/IEC 19770-1:2006
Software asset management – Processes Published By Publication Date Number of Pages BSI 2006 34
-
BS ISO/IEC 15946-3:2002:2003 Edition
Information technology. Security techniques. Cryptographic techniques based on elliptic curves – Key establishment Published By…
-
CAN/CSA-ISO/IEC 15946-1:18:2018 Edition
Information technology – Security techniques – Cryptographic techniques based on elliptic curves – Part 1:…
-
BS EN ISO 11070:2014+A1:2018
Sterile single-use intravascular introducers, dilators and guidewires Published By Publication Date Number of Pages BSI…
-
ISO/IEC 17960:2015
Information technology — Programming languages, their environments and system software interfaces — Code signing for…
-
BS ISO/IEC 11770-2:2018
IT Security techniques. Key management – Mechanisms using symmetric techniques Published By Publication Date Number…
-
BS ISO 11760:2005
Classification of coals Published By Publication Date Number of Pages BSI 2005 18
-
BS ISO 11870:2009
Milk and milk products. Determination of fat content. General guidance on the use of butyrometric…
-
BS ISO 11760:2018
Classification of coals Published By Publication Date Number of Pages BSI 2018 18
-
BS EN ISO 11070:2014+A1:2018
Sterile single-use intravascular introducers, dilators and guidewires Published By Publication Date Number of Pages BSI…
-
BS ISO/IEC 11770-4:2017+A2:2021
Information technology. Security techniques. Key management – Mechanisms based on weak secrets Published By Publication…
-
BS ISO/IEC 11770-4:2017+A1:2019
Information technology. Security techniques. Key management – Mechanisms based on weak secrets Published By Publication…
-
BS EN ISO 11670:2003:2005 Edition
Lasers and laser-related equipment. Test methods for laser beam parameters. Beam positional stability Published By…
-
BS EN ISO 11970:2007
Specification and approval of welding procedures for production welding of steel castings Published By Publication…
-
BS ISO/IEC 11770-2:2008:2010 Edition
Information technology. Security techniques. Key management – Mechanisms using symmetric techniques Published By Publication Date…
-
BS ISO/IEC 14888-1:2008
Information technology. Security techniques. Digital signatures with appendix – General Published By Publication Date Number…
-
BS ISO/IEC 11770-4:2006:2010 Edition
Information technology. Security techniques. Key management – Mechanisms based on weak secrets Published By Publication…
-
BSI PD ISO/IEC TR 20000-10:2015
Information technology. Service management – Concepts and terminology Published By Publication Date Number of Pages…
-
BS ISO/IEC 19770-5:2015 – TC:2020 Edition
Tracked Changes. Information technology. IT asset management. Overview and vocabulary Published By Publication Date Number…
-
ISO/IEC 11770-3:2008
Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques…
-
CSA ISO/IEC 14888-2:09 (R2019):2009 Edition
Information technology – Security techniques – Digital signatures with appendix – Part 2: Integer factorization-based…
-
BS ISO/IEC 19770-1:2012
Information technology. Software asset management – Processes and tiered assessment of conformance Published By Publication…
-
ISO/IEC 15946-5:2009
Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5:…
-
BS ISO/IEC 11770-3:2015+A1:2017:2018 Edition
Information technology. Security techniques. Key management – Part 3: Mechanisms using asymmetric techniques Published By…
-
BS ISO/IEC 15946-1:2016
Information technology. Security techniques. Cryptographic techniques based on elliptic curves – General Published By Publication…