{"id":350148,"date":"2024-10-20T00:40:41","date_gmt":"2024-10-20T00:40:41","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-11770-32015a12017\/"},"modified":"2024-10-26T00:25:42","modified_gmt":"2024-10-26T00:25:42","slug":"bs-iso-iec-11770-32015a12017","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-11770-32015a12017\/","title":{"rendered":"BS ISO\/IEC 11770-3:2015+A1:2017"},"content":{"rendered":"
This part of ISO\/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals.<\/p>\n
Establish a shared secret key for use in a symmetric cryptographic technique between two entities A<\/i> and B<\/i> by key agreement. In a secret key agreement mechanism, the secret key is computed as the result of a data exchange between the two entities A<\/i> and B<\/i>. Neither of them should be able to predetermine the value of the shared secret key.<\/p>\n<\/li>\n Establish a shared secret key for use in a symmetric cryptographic technique between two entities A<\/i> and B<\/i> via key transport. In a secret key transport mechanism, the secret key is chosen by one entity A<\/i> and is transferred to another entity B<\/i>, suitably protected by asymmetric techniques.<\/p>\n<\/li>\n Make an entity’s public key available to other entities via key transport. In a public key transport mechanism, the public key of entity A<\/i> shall be transferred to other entities in an authenticated way, but not requiring secrecy.<\/p>\n<\/li>\n<\/ol>\n Some of the mechanisms of this part of ISO\/IEC 11770 are based on the corresponding authentication mechanisms in ISO\/IEC 9798-3.[<\/sup>6<\/sup>]<\/sup><\/p>\n This part of ISO\/IEC 11770 does not cover certain aspects of key management, such as<\/p>\n key lifecycle management,<\/p>\n<\/li>\n mechanisms to generate or validate asymmetric key pairs, and<\/p>\n<\/li>\n mechanisms to store, archive, delete, destroy, etc. keys.<\/p>\n<\/li>\n<\/ul>\n While this part of ISO\/IEC 11770 does not explicitly cover the distribution of an entity’s private key (of an asymmetric key pair) from a trusted third party to a requesting entity, the key transport mechanisms described can be used to achieve this. A private key can in all cases be distributed with these mechanisms where an existing, non-compromised key already exists. However, in practice the distribution of private keys is usually a manual process that relies on technological means such as smart cards, etc.<\/p>\n This part of ISO\/IEC 11770 does not specify the transformations used in the key management mechanisms.<\/p>\n NOTE To provide origin authentication for key management messages, it is possible to make provisions for authenticity within the key establishment protocol or to use a public key signature system to sign the key exchange messages.<\/p>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":" Information technology. Security techniques. Key management – Part 3: Mechanisms using asymmetric techniques<\/b><\/p>\n\n
\n
\n\n
\n Published By<\/td>\n Publication Date<\/td>\n Number of Pages<\/td>\n<\/tr>\n \n BSI<\/b><\/a><\/td>\n 2018<\/td>\n 96<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":350155,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-350148","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/350148","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/350155"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=350148"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=350148"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=350148"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}