Defines key management mechanisms using asymmetric cryptographic techniques; addresses the use of asymmetric techniques to establish a shared secret key for a symmetric cryptographic technique between two entities A and B by key agreement; establishes a shared secret key for a symmetric cryptographic technique between two entities A and B by key transport and makes an entity's public key available to other entities by key transport.