{"id":631988,"date":"2024-11-06T00:36:01","date_gmt":"2024-11-06T00:36:01","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/iso-iec-11770-32021\/"},"modified":"2024-11-06T00:36:01","modified_gmt":"2024-11-06T00:36:01","slug":"iso-iec-11770-32021","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/iso\/iso-iec-11770-32021\/","title":{"rendered":"ISO\/IEC 11770-3:2021"},"content":{"rendered":"<\/p>\n

This document defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals.<\/p>\n

a) Establish a shared secret key for use in a symmetric cryptographic technique between two entities A<\/em> and B<\/em> by key agreement. In a secret key agreement mechanism, the secret key is computed as the result of a data exchange between the two entities A<\/em> and B<\/em>. Neither of them is able to predetermine the value of the shared secret key.<\/p>\n

b) Establish a shared secret key for use in a symmetric cryptographic technique between two entities A<\/em> and B<\/em> via key transport. In a secret key transport mechanism, the secret key is chosen by one entity A<\/em> and is transferred to another entity B<\/em>, suitably protected by asymmetric techniques.<\/p>\n

c) Make an entity's public key available to other entities via key transport. In a public key transport mechanism, the public key of entity A<\/em> is transferred to other entities in an authenticated way, but not requiring secrecy.<\/p>\n

Some of the mechanisms of this document are based on the corresponding authentication mechanisms in ISO\/IEC\u00a09798-3.<\/p>\n

This document does not cover certain aspects of key management, such as:<\/p>\n

\u2014\u00a0\u00a0\u00a0 key lifecycle management;<\/p>\n

\u2014\u00a0\u00a0\u00a0 mechanisms to generate or validate asymmetric key pairs; and<\/p>\n

\u2014\u00a0\u00a0\u00a0 mechanisms to store, archive, delete, destroy, etc., keys.<\/p>\n

While this document does not explicitly cover the distribution of an entity's private key (of an asymmetric key pair) from a trusted third party to a requesting entity, the key transport mechanisms described can be used to achieve this. A private key can in all cases be distributed with these mechanisms where an existing, non-compromised key already exists. However, in practice the distribution of private keys is usually a manual process that relies on technological means such as smart cards, etc.<\/p>\n

This document does not specify the transformations used in the key management mechanisms.<\/p>\n

NOTE\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 To provide origin authentication for key management messages, it is possible to make provisions for authenticity within the key establishment protocol or to use a public key signature system to sign the key exchange messages.<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"

Information security – Key management – Part 3: Mechanisms using asymmetric techniques<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
ISO<\/b><\/a><\/td>\n2021-10<\/td>\n98<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":632002,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[656,2634],"product_tag":[],"class_list":{"0":"post-631988","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-030","7":"product_cat-iso","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/631988","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/632002"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=631988"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=631988"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=631988"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}