• There are no items in your cart

BS ISO/IEC 11770-6:2016

Current
Current

The latest, up-to-date edition.

Information technology. Security techniques. Key management Key derivation
Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

10-31-2016

Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviations
5 Key derivation techniques
6 One-step key derivation functions
7 Two-step key derivation functions
Annex A (normative) - Object identifiers
Annex B (informative) - Guidance on use
Bibliography

Describes key derivation functions, i.e. functions which take secret information and other (public) parameters as input and output one or more 'derived' secret keys.

Committee
IST/33/2
DevelopmentNote
Supersedes 15/30293352 DC. (10/2016)
DocumentType
Standard
Pages
34
PublisherName
British Standards Institution
Status
Current
Supersedes

Standards Relationship
ISO/IEC 11770-6:2016 Identical

ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
ISO/IEC 11770-2:2008 Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques
ISO/IEC 18033-2:2006 Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
ISO/IEC 11770-4:2006 Information technology Security techniques Key management Part 4: Mechanisms based on weak secrets
ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques

View more information
US$261.13
Excluding Tax where applicable

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.