관심표준 등록 : 표준업데이트 시 알림을 받을 수 있습니다.
PDF : 직접 파일 다운로드 및 인쇄 (마이페이지 확인)
PRINT : 인쇄본 우편발송, 2~3일 소요(PDF파일 미제공)
분야 | ISO/IEC JTC 1/SC 27 : Information security, cybersecurity and privacy protection |
---|---|
적용범위 | ISO/IEC 11770-1:2010 defines a general model of key management that is independent of the use of any particular cryptographic algorithm. However, certain key distribution mechanisms can depend on particular algorithm properties, for example, properties of asymmetric algorithms. ISO/IEC 11770-1:2010 contains the material required for a basic understanding of subsequent parts. Examples of the use of key management mechanisms are included in ISO 11568. If non-repudiation is required for key management, ISO/IEC 13888 is applicable. ISO/IEC 11770-1:2010 addresses both the automated and manual aspects of key management, including outlines of data elements and sequences of operations that are used to obtain key management services. However it does not specify details of protocol exchanges that might be needed. As with other security services, key management can only be provided within the context of a defined security policy. The definition of security policies is outside the scope of ISO/IEC 11770. The fundamental problem is to establish keying material whose origin, integrity, timeliness and (in the case of secret keys) confidentiality can be guaranteed to both direct and indirect users. Key management includes functions such as the generation, storage, distribution, deletion and archiving of keying material in accordance with a security policy (ISO 7498-2). ISO/IEC 11770-1:2010 has a special relationship to the security frameworks for open systems (ISO/IEC 10181). All the frameworks, including this one, identify the basic concepts and characteristics of mechanisms covering different aspects of security. |
국제분류(ICS)코드 | 35.030 : IT 보안 |
페이지수 | 30 |
Edition | 2.0 |
No. | 표준번호 | 표준명 | 발행일 | 상태 |
---|---|---|---|---|
1 | CSA ISO/IEC 11770-1:12 (R2021) | Information technology - Security techniques - Key management - Part 1: Framework (Adopted ISO/IEC 11770-1:2010, second edition, 2010-12-01) | 2012-01-01 | 표준 |
2 | ISO/IEC 11770-1:2010 | Information technology — Security techniques — Key management — Part 1: Framework | 2010-11-22 | 표준 |
3 | ISO/IEC 11770-1:2010 | Information technology - Security techniques - Key management - Part 1: Framework | 2010-11-22 | 표준 |
4 | ISO/IEC 11770-1:1996 | Information technology - Security techniques - Key management - Part 1: Framework | 1996-12-26 | 구판 |
5 | ISO/IEC 11770-1:1996 | Information technology — Security techniques — Key management — Part 1: Framework | 1996-12-26 | 구판 |
ISO/IEC 11770-3:2021/FDAmd 1 - Information security — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 1: TFNS identity-based key agreement 상세보기
ISO/IEC 11770-1:2010 - Information technology — Security techniques — Key management — Part 1: Framework 상세보기
CSA ISO/IEC 11770-1:12 (R2021) - Information technology - Security techniques - Key management - Part 1: Framework (Adopted ISO/IEC 11770-1:2010, second edition, 2010-12-01) 상세보기
ISO/IEC 11770-6:2016 - Information technology - Security techniques - Key management - Part 6: Key derivation 상세보기
ISO/IEC 11770-6:2016 - Information technology — Security techniques — Key management — Part 6: Key derivation 상세보기
함께 구입한 상품이 존재하지 않습니다.
IEC TS 63134:2020 - Active assisted living (AAL) use cases 상세보기
IEC 60034-5:2020 RLV - Rotating electrical machines - Part 5: Degrees of protection provided by the integral design of rotating electrical machines (IP code) - Classification 상세보기
KS B ISO TS 25740-1 - 에스컬레이터 및 무빙워크에 대한 안전요건 — 제1부: 세계공통 필수 안전요건(GESRs) 상세보기
KS B ISO TS 8100-21 - 승객 및 화물 운송용 엘리베이터 —제21부: 세계공통 필수안전요건(GESRs)을 충족하는 세계공통 안전 파라미터(GSPs) 상세보기
KS C IEC TS 62872 - 산업 시설과 스마트 그리드 사이의 산업 공정 측정, 제어 및 자동화 시스템 인터페이스 상세보기