• There are no items in your cart

INCITS/ISO/IEC 11770-3 : 1999

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by
superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES

Available format(s)

Hardcopy , PDF

Superseded date

04-24-2024

Language(s)

English

Published date

01-01-2006

Foreword
1 Scope
2 Normative reference
3 Definitions
4 Symbols and abbreviations
5 Requirements
6 Secret key agreement
7 Secret key transport
8 Public key transport
Annex A (informative) Properties of key establishment
        mechanisms
Annex B (informative) Examples of key establishment
        mechanisms

Describes key management mechanisms based on asymmetric cryptographic techniques.

Committee
CS1
DocumentType
Standard
Pages
40
ProductNote
Reconfirmed 1999
PublisherName
Information Technology Industry Council
Status
Superseded
SupersededBy

Standards Relationship
ISO/IEC 11770-3:2015 Identical

View more information

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.