torna su
close Close

CEI membership discount

Dear customer,
our systems show that your name is connected to a company associated with CEI: you would therefore be entitled to thediscount reserved for our members for CEI products and services. To check the validity of the association and benefit from the discounts, it is necessary to enter the register number assigned to your company in the box below.

You can continue shopping even without entering the membership register number, but you will not have access to dedicated discounts.

CONTINUE WITHOUT DISCOUNTS

The membership register number has been correctly entered.
From now on, after logging into your MyNorma account, you can purchase our products at the price reserved for our members.

doneCONTINUE PURCHASING
Replaced help_outline

ISO/IEC 11770-3:2008

Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques
standard
IEC
IEC
Standard help_outline
Publication Date:  2008-07
Commitee:  IEC-ISO/IECJTC1/SC27
Language:  EN
Last Modification Date:  2024-12
Stability Date:  2015-08

ISO/IEC 11770-3:2008 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals.

  1. Establish a shared secret key for a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key agreement mechanism, the secret key is the result of a data exchange between the two entities A and B. Neither of them can predetermine the value of the shared secret key.
  2. Establish a shared secret key for a symmetric cryptographic technique between two entities A and B by key transport. In a secret key transport mechanism, the secret key is chosen by one entity A and is transferred to another entity B, suitably protected by asymmetric techniques.
  3. Make an entity's public key available to other entities by key transport. In a public key transport mechanism, the public key of entity A must be transferred to other entities in an authenticated way, but not requiring secrecy.

Some of the mechanisms of ISO/IEC 11770-3:2008 are based on the corresponding authentication mechanisms in ISO/IEC 9798-3.

ISO/IEC 11770-3:2008 does not cover aspects of key management such as

  • key lifecycle management,
  • mechanisms to generate or validate asymmetric key pairs,
  • mechanisms to store, archive, delete, destroy, etc. keys.

While ISO/IEC 11770-3:2008 does not explicitly cover the distribution of an entity's private key (of an asymmetric key pair) from a trusted third party to a requesting entity, the key transport mechanisms described can be used to achieve this. A private key can in all cases be distributed with these mechanisms where an existing, non-compromised key already exists. However, in practice the distribution of private keys is usually a manual process that relies on technological means like smart cards, etc.

ISO/IEC 11770-3:2008 does not cover the implementations of the transformations used in the key management mechanisms.

Relations

International Coding Standard (ICS)

35.030
IT Security
* Including encryption

Annotation

PLEASE NOTE: links will be automatically recognized and made clickable when the annotation will be published

Standard Evolution

close

ICS

International Classification for Standards (ICS) is an international classification system for technical standards.

The ICS is a hierarchical classification organized on three levels.

Level 1 covers the main fields of activity in standardization, e.g. road vehicle engineering, agriculture, metallurgy.

Each field has a two-digit notation, e.g.

  43    Road Vehicle Engineering

The main fields are subdivided into groups (level 2). The notation of a group consists of the field notation and a three-digit group number, separated by a point, e.g.

  43.040    Road vehicle systems

Some groups are further divided into sub-groups (level 3). The notation of a sub-group consists of the group notation and a two-digit number, separated by a point, e.g.

  43.040.20 Lighting, signaling and warning devices

You can identify the ICS code of your interest by typing the code or a keywordword in the dropdown ICS field, and by selecting one of the filtered results.

Search also in the summary/description of the standard

By flagging this control, the search for keywords will not be limited to the Standard Number and Title fields, but will also be performed in the Abstract of the standard.

This way, you will get more results.

You should use this option when you can not find the desired result with the standard approach and it is necessary to extend the scope of the search: by increasing the number of results, you will increase the number of non-relevant elements, as well.