{"id":631981,"date":"2024-11-06T00:35:59","date_gmt":"2024-11-06T00:35:59","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/iso-iec-11770-32008\/"},"modified":"2024-11-06T00:35:59","modified_gmt":"2024-11-06T00:35:59","slug":"iso-iec-11770-32008","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/iso\/iso-iec-11770-32008\/","title":{"rendered":"ISO\/IEC 11770-3:2008"},"content":{"rendered":"

ISO\/IEC 11770-3:2008 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals.<\/p>\n

    \n
  1. Establish a shared secret key for a symmetric cryptographic technique between two entities A<\/i> and B<\/i> by key agreement. In a secret key agreement mechanism, the secret key is the result of a data exchange between the two entities A<\/i> and B<\/i>. Neither of them can predetermine the value of the shared secret key.<\/li>\n
  2. Establish a shared secret key for a symmetric cryptographic technique between two entities A<\/i> and B<\/i> by key transport. In a secret key transport mechanism, the secret key is chosen by one entity A<\/i> and is transferred to another entity B<\/i>, suitably protected by asymmetric techniques.<\/li>\n
  3. Make an entity's public key available to other entities by key transport. In a public key transport mechanism, the public key of entity A<\/i> must be transferred to other entities in an authenticated way, but not requiring secrecy.<\/li>\n<\/ol>\n

    Some of the mechanisms of ISO\/IEC 11770-3:2008 are based on the corresponding authentication mechanisms in ISO\/IEC 9798-3.<\/p>\n

    ISO\/IEC 11770-3:2008 does not cover aspects of key management such as<\/p>\n

      \n
    • key lifecycle management,<\/li>\n
    • mechanisms to generate or validate asymmetric key pairs,<\/li>\n
    • mechanisms to store, archive, delete, destroy, etc. keys.<\/li>\n<\/ul>\n

      While ISO\/IEC 11770-3:2008 does not explicitly cover the distribution of an entity's private key (of an asymmetric key pair) from a trusted third party to a requesting entity, the key transport mechanisms described can be used to achieve this. A private key can in all cases be distributed with these mechanisms where an existing, non-compromised key already exists. However, in practice the distribution of private keys is usually a manual process that relies on technological means like smart cards, etc.<\/p>\n

      ISO\/IEC 11770-3:2008 does not cover the implementations of the transformations used in the key management mechanisms.<\/p>\n","protected":false},"excerpt":{"rendered":"

      Information technology \u2014 Security techniques \u2014 Key management \u2014 Part 3: Mechanisms using asymmetric techniques<\/b><\/p>\n\n\n\n\n
      Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
      ISO<\/b><\/a><\/td>\n2008-07<\/td>\n90<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":631995,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[656,2634],"product_tag":[],"class_list":{"0":"post-631981","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-030","7":"product_cat-iso","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/631981","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/631995"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=631981"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=631981"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=631981"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}