• There are no items in your cart

CSA ISO/IEC 11770-1 : 2012

Superseded
Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by
superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 1: FRAMEWORK
Available format(s)

Hardcopy , PDF

Superseded date

07-16-2021

Language(s)

English

Published date

01-01-2016

Foreword
Introduction
1 Scope
2 Terms and definitions
3 Symbols and abbreviated terms
4 General model of key management
5 Basic concepts of key management
6 Conceptual models for key distribution for two
  entities
7 Specific service providers
Annex A (informative) - Threats to key management
Annex B (informative) - Key management information
        objects
Annex C (informative) - Classes of cryptographic
        applications
Annex D (informative) - Certificate lifecycle
        management
Bibliography

Defines: a) the general model on which key management mechanisms are based, b) the basic concepts of key management which are common to all the parts of ISO/IEC 11770, c) the characteristics of key management services, d) general principles on the management of keying material during its life cycle, and e) the conceptual model of key distribution.

DocumentType
Standard
Pages
48
ProductNote
Reconfirmed EN
PublisherName
Canadian Standards Association
Status
Superseded
SupersededBy

Standards Relationship
ISO/IEC 11770-1:2010 Identical

ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
ISO/IEC 19772:2009 Information technology Security techniques Authenticated encryption
ISO/IEC 11770-5:2011 Information technology Security techniques Key management Part 5: Group key management
ISO/IEC 11770-2:2008 Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques
ISO/IEC 11770-4:2006 Information technology Security techniques Key management Part 4: Mechanisms based on weak secrets
ISO/IEC 19790:2012 Information technology Security techniques Security requirements for cryptographic modules
ISO/IEC 9594-8:2017 Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks
ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
ISO/IEC 29150:2011 Information technology — Security techniques — Signcryption
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques

View more information

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.