{"id":349063,"date":"2024-10-20T00:34:34","date_gmt":"2024-10-20T00:34:34","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-11770-32008\/"},"modified":"2024-10-26T00:13:19","modified_gmt":"2024-10-26T00:13:19","slug":"bs-iso-iec-11770-32008","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-11770-32008\/","title":{"rendered":"BS ISO\/IEC 11770-3:2008"},"content":{"rendered":"
This part of ISO\/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals.<\/p>\n
Establish a shared secret key for a symmetric cryptographic technique between two entities A<\/i> and B<\/i> by key agreement. In a secret key agreement mechanism, the secret key is the result of a data exchange between the two entities A<\/i> and B<\/i>. Neither of them can predetermine the value of the shared secret key.<\/p>\n<\/li>\n Establish a shared secret key for a symmetric cryptographic technique between two entities A<\/i> and B<\/i> by key transport. In a secret key transport mechanism, the secret key is chosen by one entity A<\/i> and is transferred to another entity B<\/i>, suitably protected by asymmetric techniques.<\/p>\n<\/li>\n Make an entity’s public key available to other entities by key transport. In a public key transport mechanism, the public key of entity A<\/i> must be transferred to other entities in an authenticated way, but not requiring secrecy.<\/p>\n<\/li>\n<\/ol>\n Some of the mechanisms of this part of ISO\/IEC 11770 are based on the corresponding authentication mechanisms in ISO\/IEC 9798-3.<\/p>\n This part of ISO\/IEC 11770 does not cover aspects of key management such as<\/p>\n key lifecycle management,<\/p>\n<\/li>\n mechanisms to generate or validate asymmetric key pairs,<\/p>\n<\/li>\n mechanisms to store, archive, delete, destroy, etc. keys.<\/p>\n<\/li>\n<\/ul>\n While this part of ISO\/IEC 11770 does not explicitly cover the distribution of an entity’s private key (of an asymmetric key pair) from a trusted third party to a requesting entity, the key transport mechanisms described can be used to achieve this. A private key can in all cases be distributed with these mechanisms where an existing, non-compromised key already exists. However, in practice the distribution of private keys is usually a manual process that relies on technological means like smart cards, etc.<\/p>\n This part of ISO\/IEC 11770 does not cover the implementations of the transformations used in the key management mechanisms.<\/p>\n NOTE To achieve authenticity of key management messages, it is possible to make provisions for authenticity within the key establishment protocol or to use a public key signature system to sign the key exchange messages.<\/p>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":" Information technology. Security techniques. Key management – Mechanisms using asymmetric techniques<\/b><\/p>\n\n
\n
\n\n
\n Published By<\/td>\n Publication Date<\/td>\n Number of Pages<\/td>\n<\/tr>\n \n BSI<\/b><\/a><\/td>\n 2010<\/td>\n 94<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":349070,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-349063","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/349063","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/349070"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=349063"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=349063"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=349063"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}