관심표준 등록 : 표준업데이트 시 알림을 받을 수 있습니다.
PDF : 직접 파일 다운로드 및 인쇄 (마이페이지 확인)
PRINT : 인쇄본 우편발송, 2~3일 소요(PDF파일 미제공)
분야 | ISO/IEC JTC 1/SC 27 : Information security, cybersecurity and privacy protection |
---|---|
적용범위 | This document defines key establishment mechanisms using symmetric cryptographic techniques. This document addresses three environments for the establishment of keys: Point-to-Point, Key Distribution Centre (KDC), and Key Translation Centre (KTC). It describes the required content of messages which carry keying material or are necessary to set up the conditions under which the keying material can be established. This document does not indicate other information which can be contained in the messages or specify other messages such as error messages. The explicit format of messages is not within the scope of this document. This document does not specify the means to be used to establish initial secret keys; that is, all the mechanisms specified in this document require an entity to share a secret key with at least one other entity (e.g. a TTP). For general guidance on the key lifecycle, see ISO/IEC 11770-1. This document does not explicitly address the issue of inter-domain key management. This document also does not define the implementation of key management mechanisms; products complying with this document are not necessarily compatible. |
국제분류(ICS)코드 | 35.030 : IT 보안 |
페이지수 | 28 |
Edition | 3 |
No. | 표준번호 | 표준명 | 발행일 | 상태 |
---|---|---|---|---|
1 | CSA ISO/IEC 11770-2:19 | IT Security techniques — Key management — Part 2: Mechanisms using symmetric techniques (Adopted ISO/IEC 11770-2:2018, third edition, 2018-10) | 2019-01-01 | 표준 |
2 | ISO/IEC 11770-2:2018 | IT Security techniques — Key management — Part 2: Mechanisms using symmetric techniques | 2018-09-28 | 표준 |
3 | ISO/IEC 11770-2:2018 | IT Security techniques - Key management - Part 2: Mechanisms using symmetric techniques | 2018-09-28 | 표준 |
4 | ISO/IEC 11770-2:2008/COR1:2009 | Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques - Technical Corrigendum 1 | 2009-09-04 | 구판 |
5 | ISO/IEC 11770-2:2008/Cor 1:2009 | 2009-09-04 | 구판 | |
6 | ISO/IEC 11770-2:2008 | Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques | 2008-06-03 | 구판 |
7 | ISO/IEC 11770-2:2008 | Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques | 2008-06-03 | 구판 |
8 | ISO/IEC 11770-2:1996/COR1:2005 | Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques - Technical Corrigendum 1 | 2005-07-15 | 구판 |
9 | ISO/IEC 11770-2:1996/Cor 1:2005 | 2005-07-15 | 구판 | |
10 | ISO/IEC 11770-2:1996 | Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques | 1996-04-18 | 구판 |
11 | ISO/IEC 11770-2:1996 | Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques | 1996-04-18 | 구판 |
ISO/IEC 11770-3:2021/FDAmd 1 - Information security — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 1: TFNS identity-based key agreement 상세보기
ISO/IEC 11770-1:2010 - Information technology - Security techniques - Key management - Part 1: Framework 상세보기
ISO/IEC 11770-1:2010 - Information technology — Security techniques — Key management — Part 1: Framework 상세보기
CSA ISO/IEC 11770-1:12 (R2021) - Information technology - Security techniques - Key management - Part 1: Framework (Adopted ISO/IEC 11770-1:2010, second edition, 2010-12-01) 상세보기
ISO/IEC 11770-6:2016 - Information technology - Security techniques - Key management - Part 6: Key derivation 상세보기
ISO/IEC 14888-2:2008 - Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms 상세보기
ISO/IEC 27032:2012 - Information technology — Security techniques — Guidelines for cybersecurity 상세보기
ISO/IEC 11770-1:2010 - Information technology — Security techniques — Key management — Part 1: Framework 상세보기
ISO/IEC 11770-6:2016 - Information technology — Security techniques — Key management — Part 6: Key derivation 상세보기
ISO/IEC 29147:2018 - Information technology — Security techniques — Vulnerability disclosure 상세보기
IEC TS 63134:2020 - Active assisted living (AAL) use cases 상세보기
IEC 60034-5:2020 RLV - Rotating electrical machines - Part 5: Degrees of protection provided by the integral design of rotating electrical machines (IP code) - Classification 상세보기
KS B ISO TS 25740-1 - 에스컬레이터 및 무빙워크에 대한 안전요건 — 제1부: 세계공통 필수 안전요건(GESRs) 상세보기
KS B ISO TS 8100-21 - 승객 및 화물 운송용 엘리베이터 —제21부: 세계공통 필수안전요건(GESRs)을 충족하는 세계공통 안전 파라미터(GSPs) 상세보기
KS C IEC TS 62872 - 산업 시설과 스마트 그리드 사이의 산업 공정 측정, 제어 및 자동화 시스템 인터페이스 상세보기