ISO/IEC (E). PDF disclaimer. This PDF file may contain embedded typefaces. In accordance with Adobe’s licensing policy, this file. ISO/IEC (E) This is a preview – click here to buy the full ISO/IEC , Information technology — Security techniques. ISO’s member body in the country of the requester. .. For general guidance on the key lifecycle see ISO/IEC This part of. ISO/IEC.
|Published (Last):||28 February 2007|
|PDF File Size:||19.77 Mb|
|ePub File Size:||15.79 Mb|
|Price:||Free* [*Free Regsitration Required]|
Key management includes functions such as the generation, storage, distribution, deletion and archiving of keying material in accordance with a security policy ISO It specifically addresses the use of asymmetric techniques to achieve the following goals.
In a secret key agreement mechanism, the secret key is the result of a data exchange between the two entities A and B. Therefore this version remains current.
BS ISO/IEC – Information technology. Security techniques. Key management. Framework
Proof sent to secretariat or FDIS ballot initiated: Life cycle A standard is reviewed every 5 years 00 Preliminary. Check out our FAQs.
However it does not specify details of protocol isso that might be needed. Information technology — Security techniques — Key management– Part 3: Establish a shared secret key for a symmetric cryptographic technique between two entities A and B by key agreement.
Final text received or FDIS registered for formal approval.
Examples of the use of key management mechanisms are included in ISO A private key can in all cases be distributed with these mechanisms where an existing, non-compromised key already exists. Neither of them can predetermine the value of the shared secret key.
Monday to Friday – However, in practice the distribution of private keys is usually a manual process that relies on technological means like smart cards, etc. As with other security services, key management can only be provided within the context of a defined security policy.
The fundamental problem is to establish keying material whose origin, integrity, timeliness and in the case of secret keys confidentiality can be guaranteed to both direct and indirect users. In a secret key transport mechanism, the secret key is chosen by ido entity A and is transferred to another entity Bsuitably protected by asymmetric techniques.
All the frameworks, including this one, identify the basic concepts and characteristics 11707-1 mechanisms covering different aspects of security. Make an entity’s public key available to other entities by key transport.
Mechanisms using asymmetric techniques. Establish a shared secret key for a symmetric cryptographic technique between 1170-1 entities A and B by key transport.
However, certain key distribution mechanisms can depend on particular algorithm properties, for example, properties of asymmetric algorithms. In a public key transport mechanism, the public key of entity A must be transferred to other entities in an authenticated way, but not requiring secrecy.