• There are no items in your cart

BS ISO/IEC 11770-1:2010

Current
Current

The latest, up-to-date edition.

Information technology. Security techniques. Key management Framework
Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

12-31-2010

Foreword
Introduction
1 Scope
2 Terms and definitions
3 Symbols and abbreviated terms
4 General model of key management
5 Basic concepts of key management
6 Conceptual models for key distribution for two entities
7 Specific service providers
Annex A (informative) - Threats to key management
Annex B (informative) - Key management information objects
Annex C (informative) - Classes of cryptographic applications
Annex D (informative) - Certificate lifecycle management
Bibliography

Describes a general model of key management that is independent of the use of any particular cryptographic algorithm.

This part of ISO/IEC11770 establishes the general model on which key management mechanisms are based, defines the basic concepts of key management which are common to all the parts of ISO/IEC11770, specifies the characteristics of key management services, establishes general principles on the management of keying material during its life cycle, and establishes the conceptual model of key distribution.

Committee
IST/33/2
DevelopmentNote
Supersedes 09/30204756 DC. (12/2010)
DocumentType
Standard
Pages
42
PublisherName
British Standards Institution
Status
Current
Supersedes

Standards Relationship
ISO/IEC 11770-1:2010 Identical

ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
ISO/IEC 19772:2009 Information technology Security techniques Authenticated encryption
ISO/IEC 11770-5:2011 Information technology Security techniques Key management Part 5: Group key management
ISO/IEC 11770-2:2008 Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques
ISO/IEC 11770-4:2006 Information technology Security techniques Key management Part 4: Mechanisms based on weak secrets
ISO/IEC 19790:2012 Information technology Security techniques Security requirements for cryptographic modules
ISO/IEC 9594-8:2017 Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks
ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
ISO/IEC 29150:2011 Information technology — Security techniques — Signcryption
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques

View more information
US$277.90
Excluding Tax where applicable

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.