IEC - International Electrotechnical Commission - ISO/IEC 11770-2:2008

Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques

revised
Buy Now
Organization: IEC - International Electrotechnical Commission
Publication Date: 3 June 2008
Status: revised
Page Count: 27
ICS Code (IT Security): 35.030
abstract:

ISO/IEC 11770 is concerned with the management of cryptographic keys. ISO/IEC 11770-2:2008 specifies a series of 13 mechanisms for establishing shared secret keys using symmetric cryptography.... View More

Document History

September 28, 2018
IT Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
ISO/IEC 11770-2:2018 This document defines key establishment mechanisms using symmetric cryptographic techniques. This document addresses three environments for the establishment of keys:...
September 4, 2009
Corrigendum 1 - Information technology -- Security techniques -- Key management -- Part 2: Mechanisms using symmetric techniques -
A description is not available for this item.
ISO/IEC 11770-2:2008
June 3, 2008
Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
ISO/IEC 11770 is concerned with the management of cryptographic keys. ISO/IEC 11770-2:2008 specifies a series of 13 mechanisms for establishing shared secret keys using symmetric cryptography. These...
Advertisement