Customer Support: 131 242

  • There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

INCITS/ISO/IEC 11770-2 : 1996

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by
superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 2: MECHANISMS USING SYMMETRIC TECHNIQUES

Available format(s)

Hardcopy , PDF

Superseded date

15-02-2020

Language(s)

English

Published date

01-01-1996

Foreword
1 Scope
2 Normative References
3 Definitions and Notations
4 Requirements
5 Point-to-Point Key Establishment
6 Key Distribution Centre
7 Key Translation Centre
Annex A (informative) - Properties of
        Key Establishment Mechanism
Annex B (informative) - Auxiliary
        Techniques
Annex C (informative) - Bibliography

Contains procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic algorithms according to the security policy in force.

Committee
CS1
DocumentType
Standard
Pages
20
PublisherName
Information Technology Industry Council
Status
Superseded
SupersededBy

Standards Relationship
ISO/IEC 11770-2:2008 Identical

View more information
$142.41
Including GST where applicable

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.

Need help?
Call us on 131 242, then click here to start a Screen Sharing session
so we can help right away! Learn more