ISO/IEC 11770-3-2008 信息技术.安全技术.密钥管理.第3部分:使用不对称技术的机制

百检网 2021-08-05
标准号:ISO/IEC 11770-3-2008
中文标准名称:信息技术.安全技术.密钥管理.第3部分:使用不对称技术的机制
英文标准名称:Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques
标准类型:L04
发布日期:1999/12/31 12:00:00
实施日期:1999/12/31 12:00:00
中国标准分类号:L04
引用标准:ISO/IEC 10118;ISO/IEC 14888
适用范围:This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographictechniques. It specifically addresses the use of asymmetric techniques to achieve the following goals.1) Establish a shared secret key for a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key agreement mechanism, the secret key is the result of a data exchange between the two entities A and B. Neither of them can predetermine the value of the shared secret key.2) Establish a shared secret key for a symmetric cryptographic technique between two entities A and B by key transport. In a secret key transport mechanism, the secret key is chosen by one entity A and is transferred to another entity B, suitably protected by asymmetric techniques.3) Make an entity's public key available to other entities by key transport. In a public key transport mechanism, the public key of entity A must be transferred to other entities in an authenticated way, but not requiring secrecy.Some of the mechanisms of this part of ISO/IEC 11770 are based on the corresponding authenticationmechanisms in ISO/IEC 9798-3.This part of ISO/IEC 11770 does not cover aspects of key management such as-- keylifecycle management,-- mechanisms to generate or validate asymmetric key pairs,-- mechanisms to store, archive, delete, destroy, etc. keys.While this part of ISO/IEC 11770 does not explicitly cover the distribution of an entity's private key (of anasymmetric key pair) from a trusted third party to a requesting entity, the key transport mechanisms describedcan be used to achieve this. A private key can in all cases be distributed with these mechanisms where anexisting, non-compromised key already exists. However, in practice the distribution of private keys is usually amanual process that relies on technological means like smart cards, etc.This part of ISO/IEC 11770 does not cover the implementations of the transformations used in the keymanagement mechanisms.NOTE To achieve authenticity of key management messages, it is possible to make provisions for authenticity withinthe key establishment protocol or to use a public key signature system to sign the key exchange messages.

百检能给您带来哪些改变?

1、检测行业全覆盖,满足不同的检测;

2、实验室全覆盖,就近分配本地化检测;

3、工程师一对一服务,让检测更精准;

4、免费初检,初检不收取检测费用;

5、自助下单 快递免费上门取样;

6、周期短,费用低,服务周到;

7、拥有CMA、CNAS、CAL等权威资质;

8、检测报告权威有效、中国通用;

客户案例展示

  • 上海朗波王服饰有限公司
  • 浙江圣达生物药业股份有限公司
  • 天津市长庆电子科技有限公司
  • 上海纽特丝纺织品有限公司
  • 无锡露米娅纺织有限公司
  • 东方电气风电(凉山)有限公司
相关问答