-
-
Available Formats
- Options
- Availability
- Priced From ( in USD )
-
Available Formats
-
- Secure PDF 🔒
- Immediate download
- $309.88
- Add to Cart
-
- Printed Edition
- Ships in 1-2 business days
- $309.88
- Add to Cart
-
- Printed Edition + PDF
- Immediate download
- $417.83
- Add to Cart
Customers Who Bought This Also Bought
-
ISO/IEC 11770-3:2021
Priced From $278.00 -
ISO/IEC 11770-6:2016
Priced From $166.00 -
BS BIP 0074:2006
Priced From $44.45 -
BS ISO/IEC 9798-6:2010
Priced From $350.52
About This Item
Full Description
This document addresses three environments for the establishment of keys: Point-to-Point, Key Distribution Centre (KDC), and Key Translation Centre (KTC). It describes the required content of messages which carry keying material or are necessary to set up the conditions under which the keying material can be established.
This document does not indicate other information which can be contained in the messages or specify other messages such as error messages. The explicit format of messages is not within the scope of this document.
This document does not specify the means to be used to establish initial secret keys; that is, all the mechanisms specified in this document require an entity to share a secret key with at least one other entity (e.g. a TTP). For general guidance on the key lifecycle, see ISO/IEC 11770?1. This document does not explicitly address the issue of inter-domain key management. This document also does not define the implementation of key management mechanisms; products complying with this document are not necessarily compatible.
Cross References:
ISO/IEC 11770-1
ISO/IEC 9798 (all parts)
ISO/IEC 19772
ISO/IEC 18033 (all parts)
ISO/IEC 10116
ISO/IEC 8825-1
ISO/IEC 29192 (all parts)
ISO/IEC 10118 (all parts)
ISO/IEC 18031
ISO/IEC 9797 (all parts)
ISO/IEC 11770-6:2016
ISO/IEC 11770-3:2015
All current amendments available at time of purchase are included with the purchase of this document.
Document History
-
BS ISO/IEC 11770-2:2018
viewing
IT Security techniques. Key management-Mechanisms using symmetric techniques- Most Recent
-
BS ISO/IEC 11770-2:2008
Information technology. Security techniques. Key management-Mechanisms using symmetric techniques- Historical Version
-
BS 07/30167508 DC
BS ISO/IEC 11770-2. Information technology. Security techniques. Key management. Part 2. Mechanisms using symmetric techniques- Historical Version