INTERNATIONAL ISO/IEC STANDARD 11770-2 Third edition 2018-10 IT Security techniques - Key management - Part 2: Mechanisms using symmetric techniques Techniques de sécurite IT- Gestion de clés - Partie 2: Mécanismes utilisant des techniques symeétriques Reference number IEC IS0/IEC 11770-2:2018(E) ISO @ IS0/IEC 2018 IS0/IEC 11770-2:2018(E) COPYRIGHTPROTECTEDDOCUMENT @IS0/IEC2018 All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting beloworIso'smemberbodyinthecountryoftherequester. ISO copyright office CP 401 · Ch. de Blandonnet 8 CH-1214 Vernier, Geneva Phone: +41 22 749 01 11 Fax: +41 22 749 09 47 Email: [email protected] Website: www.iso.org Published in Switzerland ii IS0/IEC2018-Allrightsreserved IS0/IEC11770-2:2018(E) Contents Page Foreword iv Introduction V 1 Scope 1 2 Normative references .1 3 Terms and definitions .1 4 Symbols and abbreviated terms. .3 5 Requirements .4 6 Point-to-point key establishment 6 6.1 General 6 6.2 Key establishment mechanism 1 6 6.3 Key establishment mechanism 2 7 6.4 Key establishment mechanism 3 7 6.5 Key establishment mechanism 4 .8 6.6 Key establishment mechanism 5 .8 6.7 Key establishment mechanism 6 10 Mechanisms using a Key Distribution Centre .11 7.1 General 11 7.2 Key establishment mechanism 7 11 7.3 Key establishment mechanism 8 .12 7.4 Key establishment mechanism 9 14 7.5 Key establishment mechanism 10. 15 8 Mechanisms using a Key Translation Centre .17 8.1 General .17 8.2 Key establishment mechanism 11 .17 8.3 Key establishment mechanism 12 .18 8.4 Key establishment mechanism 13. .20 Annex A (normative) Object identifiers .22 Annex B (informative) Properties of key establishment mechanisms .24 Annex C (informative) Auxiliary techniques .26 Bibliography .28 @ IS0/IEC 2018 - All rights reserved iii

.pdf文档 ISO IEC 11770-2 2018 IT Security techniques — Key management — Part 2 Mechanisms using symmetric techniques

文档预览
中文文档 36 页 50 下载 1000 浏览 0 评论 309 收藏 3.0分
温馨提示:本文档共36页,可预览 3 页,如浏览全部内容或当前文档出现乱码,可开通会员下载原始文档
ISO IEC 11770-2 2018 IT Security techniques — Key management — Part 2  Mechanisms using symmetric techniques 第 1 页 ISO IEC 11770-2 2018 IT Security techniques — Key management — Part 2  Mechanisms using symmetric techniques 第 2 页 ISO IEC 11770-2 2018 IT Security techniques — Key management — Part 2  Mechanisms using symmetric techniques 第 3 页
下载文档到电脑,方便使用
本文档由 人生无常 于 2024-08-10 15:58:07上传分享
站内资源均来自网友分享或网络收集整理,若无意中侵犯到您的权利,敬请联系我们微信(点击查看客服),我们将及时删除相关资源。