CAN/CSA-ISO/IEC 11770-3-2001(R2005)

Information Technology - Security Techniques - Key Management - Part 3: Mechanisms Using Asymmetric Techniques


 

 

非常抱歉,我们暂时无法提供预览,您可以试试: 免费下载 CAN/CSA-ISO/IEC 11770-3-2001(R2005) 前三页,或者稍后再访问。

您也可以尝试购买此标准,
点击右侧 “立即购买” 按钮开始采购(由第三方提供)。

 

标准号
CAN/CSA-ISO/IEC 11770-3-2001(R2005)
发布
2001年
发布单位
SCC
替代标准
CAN/CSA-ISO/IEC 11770-3:2009
当前最新
CAN/CSA-ISO/IEC 11770-3:2016
 
 
被代替标准
CAN/CSA-ISO/IEC 11770-3-09
适用范围
This National Standard of Canada is equivalent to International Standard ISO/IEC 11770-3:1999. 1. Scope This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals: 1. Establish a shared secret key for a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key agreement mechanism the secret key is the result of a data exchange between the two entities A and B. Neither of them can predetermine the value of the shared secret key. 2. Establish a shared secret key for a symmetric cryptographic technique between two entities A and B by key transport. In a secret key transport mechanism the secret key is chosen by one entity A and is transferred to another entity B, suitably protected by asymmetric techniques. 3. Make an entity's public key available to other entities by key transport. In a public key transport mechanism, the public key of an entity A must be transferred to other entities in an authenticated way, but not requiring secrecy. Some of the mechanisms of this part of ISO/IEC 11770 are based on the corresponding authentication mechanisms in ISO/IEC 9798-3. This part of ISO/IEC 11770 does not cover aspects of key management such as - key lifecycle management, - mechanisms to generate or validate asymmetric key pairs, - mechanisms to store, archive, delete, destroy, etc. keys. While this part of ISO/IEC 11770 does not explicitly cover the distr ibution of an entity's private key (of an asymmetric key pair) from a trusted third party to a requesting entity, the key transport mechanisms described can be used to achieve this. This part of ISO/IEC 11770 does not cover the implementations of the transformations used in the key management mechanisms. NOTE - To achieve authenticity of key management messages it is possible to make provisions for authenticity within the key establishment protocol or to use a public key signature system to sign the key exchange messages.

CAN/CSA-ISO/IEC 11770-3-2001(R2005)相似标准





Copyright ©2007-2022 ANTPEDIA, All Rights Reserved
京ICP备07018254号 京公网安备1101085018 电信与信息服务业务经营许可证:京ICP证110310号