Full Description BS ISO/IEC 11770-3:2015+A1:2017 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. a) Establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key agreement mechanism, the secret key is computed as the result of a data exchange between the two entities A and B. Neither of them should be able to predetermine the value of the shared secret key. b) Establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B via key transport. In a secret key transport mechanism, the secret key is chosen by one entity A and is transferred to another entity B, suitably protected by asymmetric techniques. c) Make an entity\'s public key available to other entities via key transport. In a public key transport mechanism, the public key of entity A shall be transferred to other entities in an authenticated way, but not requiring secrecy. Some of the mechanisms of this part of ISO/IEC 11770 are based on the corresponding authentication mechanisms in ISO/IEC 9798-3.
Cross References:
ISO/IEC 19772
ISO/IEC 11770-6
IEC 10118
IEC 15946-1
IEC 18031
IEC 11770-1
IEC 18031:2011
ISO/IEC 8824
IETF RFC 2246:1999
IEC 9796-3:2006
IEC 14888
IEEE 1363
ITU-T Rec. X.690
IETF RFC 6509:2012
IEC 29150:2011
IEC 11770-6
IEC 9798-3
IEC 9797
ANSI X9.42-2001
IEC 9594-8:2008
ANSI X9.63
ISO/IEC 8825
IEC 9796-2:2010
ITU-T Rec. X.680
ISO/IEC 10181-1:1996
ISO 7498-2:1989
Incorporates the following:
Amendment, January 2018; Corrigendum, July 2016