해외표준 상세정보
관심표준 등록 : 표준업데이트 시 알림서비스
제공형태 더보기-
폐지
판매
CAN/CSA-ISO/IEC 11770-2-09 (R2014)
Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques (Adopted ISO/IEC 11770-2:2008, second edition, 2008-06-15)- 발행일 : 2009-01-01
- 발행기관 : CSA
상세정보
분야 | |
---|---|
적용범위 | Preface Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the Canadian Advisory Committee (CAC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T). This Standard supersedes CAN/CSA-ISO/IEC 11770-2-01 (adoption of ISO/IEC 11770-2:1996). At the time of publication, ISO/IEC 11770-2:2008 is available from ISO and IEC in English only. CSA will publish the French version when it becomes available from ISO and IEC. Scope The purpose of key management is to provide procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic algorithms according to the security policy in force. This part of ISO/IEC 11770 defines key establishment mechanisms using symmetric cryptographic techniques. Key establishment mechanisms using symmetric cryptographic techniques can be derived from the entity authentication mechanisms of ISO/IEC 9798-2 and ISO/IEC 9798-4 by specifying the use of text fields available in those mechanisms. Other key establishment mechanisms exist for specific environments; see, for example, ISO 8732. Besides key establishment, the goals of such a mechanism might include unilateral or mutual authentication of the communicating entities. Further goals might be the verification of the integrity of the established key, or key confirmation. This part of ISO/IEC 11770 addresses three environments for the establishment of keys: Point-to-Point, Key Distribution Centre (KDC), and Key Translation Centre (KTC). This part of ISO/IEC 11770 describes the required content of messages which carry keying material or are necessary to set up the conditions under which the keying material can be established. It does not indicate other information which can be contained in the messages or specify other messages such as error messages. The explicit format of messages is not within the scope of this part of ISO/IEC 11770. This part of ISO/IEC 11770 does not specify the means to be used to establish initial secret keys; that is, all the mechanisms specified in this part of ISO/IEC 11770 require an entity to share a secret key with at least one other entity (e.g. a TTP). For general guidance on the key lifecycle see ISO/IEC 11770-1. This part of ISO/IEC 11770 does not explicitly address the issue of interdomain key management. This part of ISO/IEC 11770 also does not define the implementation of key management mechanisms; products complying with this part of ISO/IEC 11770 might not be compatible. |
국제분류(ICS)코드 | |
페이지수 | 50 |
Edition |
이력정보
No. | 표준번호 | 표준명 | 발행일 | 상태 |
---|---|---|---|---|
1 | CSA ISO/IEC 11770-2:19상세보기 | IT Security techniques — Key management — Part 2: Mechanisms using symmetric techniques (Adopted ISO/IEC 11770-2:2018, third edition, 2018-10) | 2019-01-01 | 표준 |
2 | CAN/CSA-ISO/IEC 11770-2-09 (R2014)상세보기 | Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques (Adopted ISO/IEC 11770-2:2008, second edition, 2008-06-15) | 2009-01-01 | 폐지 |
관련상품
- ISO/IEC 11770-3:2015/DAmd 2 - Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 2: SM9 key agreement protocol
- ISO/IEC 11770-1:2010 - Information technology - Security techniques - Key management - Part 1: Framework
- ISO/IEC 11770-1:2010 - Information technology — Security techniques — Key management — Part 1: Framework
- CSA ISO/IEC 11770-1:12 (R2021) - Information technology - Security techniques - Key management - Part 1: Framework (Adopted ISO/IEC 11770-1:2010, second edition, 2010-12-01)
- ISO/IEC 11770-6:2016 - Information technology - Security techniques - Key management - Part 6: Key derivation
다른 사람이 함께 구입한 상품
- 함께 구입한 상품이 존재하지 않습니다.
추천 상품
- IEC TS 63134:2020 - Active assisted living (AAL) use cases
- IEC 60034-5:2020 RLV - Rotating electrical machines - Part 5: Degrees of protection provided by the integral design of rotating electrical machines (IP code) - Classification
- KS B ISO TS 25740-1 - 에스컬레이터 및 무빙워크에 대한 안전요건 — 제1부: 세계공통 필수 안전요건(GESRs)
- KS B ISO TS 8100-21 - 승객 및 화물 운송용 엘리베이터 —제21부: 세계공통 필수안전요건(GESRs)을 충족하는 세계공통 안전 파라미터(GSPs)
- KS C IEC TS 62872 - 산업 시설과 스마트 그리드 사이의 산업 공정 측정, 제어 및 자동화 시스템 인터페이스
제공형태 닫기
PDF :
직접 파일 다운로드 및 인쇄(마이페이지 확인)보안PDF :
직접 파일 다운로드 및 인쇄(마이페이지 확인)* 단, 파일이동 및 복사 불가, 1회 다운로드 및 인쇄가능PRINT :
인쇄본 우편발송, 2~3일 소요(PDF파일 미제공)BOOK :
인쇄본 우편발송, 2~3일 소요(PDF파일 미제공)ZIP :
압축파일형태로 제공 (PDF, HTML, TXT, XLS 등으로 구성), 직접 파일 다운로드(마이페이지 확인)CD/DVD :
직접 파일 다운로드 및 인쇄(마이페이지 확인)DB :
별도 정보 제공HARDCOPY :
해외 배송 상품, 최대 3주 소요바인더 :
바인더 우편발송, 2~3일 소요온라인구독 :
WEB 접속 후 실시간 열람, 출력(1년간)