Norm

ISO/IEC 11770-3:1999 en

Informatietechnologie - Beveiligingstechnieken - Sleutelbeheer - Deel 3: Mechnismen met asymmetrische technieken

  • Deze norm is ingetrokken sinds 10-07-2008

114,67

Over deze norm

Status Ingetrokken
Aantal pagina's 35
Commissie Informatiebeveiliging, Cyber security en Privacy
Gepubliceerd op 01-11-1999
Taal Engels
Defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals: 1. Establish a shared secret key for a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key afreement mechanisms the secret key is the result of a data exchange between the two entities A and B. neither of them can predetermine the value of the shared secret key. 2. Establish a shared secret key for a symmetric cryptographic technique between two entities A and B key transport. In a secret key transport mechanisms the secret key is chosen by one entity A and is transferred to another entity B, suitably protected by asymmetric techniques. 3. Make an entity's public key available to other entities by key transport. In a public key transport mechanisms, the public key of an entity A must be transferred to other entities in an authenticated way, but not requiring secrecy.

Details

ICS-code 35.040
Nederlandse titel Informatietechnologie - Beveiligingstechnieken - Sleutelbeheer - Deel 3: Mechnismen met asymmetrische technieken
Engelse titel Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques
Vervangt
Vervangen door

Winkelwagen

Subtotaal:

Ga naar winkelwagen