金融行业标准网
INTERNATIONAL ISO/IEC STANDARD 11770-3 Fourth edition 2021-10 Information security Key management - Part 3: Mechanisms using asymmetric techniques Sécurité de I'information - Gestion de clés - Partie 3: Mécanismes utilisant des techniques asymétriques Reference number IEC IS0/IEC 11770-3:2021(E) ISO @IS0/IEC2021 IS0/IEC 11770-3:2021(E) COPYRIGHT PROTECTED DOCUMENT @IS0/IEC2021 All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may the internet or an intranet, withoutpriorwrittenpermission.Permission can be requested from eitherIso at the addressbelow orIso's memberbody inthe country oftherequester ISO copyright office CP 401 · Ch. de Blandonnet 8 CH-1214Vernier,Geneva Phone: +41 22 749 01 11 Email: [email protected] Website: www.iso.org PublishedinSwitzerland i @ IS0/IEC 2021 - All rights reserved IS0/IEC 11770-3:2021(E) Contents Page Foreword. Introduction... .6 1 Scope .. 2 Normative references .. 3 Terms and definitions... 4 Symbols and abbreviations... 5 Requirements.... ..10 6 Key derivation functions... 7 Cofactor multiplication.. .11 8 Key commitment. 12 9 Key confirmation .. 10 Framework for key management . 13 10.1 General ...... 13 10.2 .Key agreement between two parties... 14 10.3 Key agreement between three parties... 14 10.4 Secret key transport. 15 10.5 Public key transport. 15 11 Key agreement... 11.1 Key agreement mechanism 1 15 11.2 Key agreement mechanism 2 17 11.3 Key agreement mechanism 3 17 11.4 Key agreement mechanism 4. 19 11.5 Key agreement mechanism 5. 20 11.6 Key agreement mechanism 6 .. 21 11.7 Key agreement mechanism 7 .... 23 11.8 Key agreement mechanism 8 .. 24 11.9 Key agreement mechanism 9 . 25 11.10 Key agreement mechanism 10. 26 11.11 Key agreement mechanism 11. 27 11.12 Key agreement mechanism 12 28 11.13 Key agreement mechanism 13. 29 11.14 Key agreement mechanism 14. 30 11.15 Key agreement mechanism 15. 31 12 Secret key transport.. 32 12.1 Secret key transport mechanism 1 32 12.2 Secret key transport mechanism 2. .34 12.3 Secret key transport mechanism 3. 35 12.4 Secret key transport mechanism 4.. 37 12.5 Secret key transport mechanism 5. .38 12.6 Secret key transport mechanism 6.... 13 Public key transport. 42 13.1 Public key transport mechanism 1 13.2 Public key transport mechanism 2 43 13.3 Public key transport mechanism 3 @IS0/IEC2021-All rightsreserved ii IS0/IEC 11770-3:2021(E) Annex A (normative) Object identifiers Annex B (informative) Properties of key establishment mechanisms 55 Annex C (informative) Examples of key derivation functions . ..58 Annex D (informative) Examples of key establishment mechanisms .. ..66 Annex E (informative) Examples of elliptic curve based key establishment mechanisms... 7o. Annex F (informative) Example of bilinear pairing based key establishment mechanisms .... 80 Annex G (informative) Secret key transport. .84 Bibliography.. iv @IS0/IEC2021-All rights reserved IS0/IEC 11770-3:2021(E) Foreword ISo (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) form the specialized system for worldwide standardization. National bodies that are members of ISO or IEC participate in the development of International Standards through technical committees established by the respective organization to deal with particular fields of technical activity. Iso and IEC technical committees collaborate in fields of mutual interest. Other international organizations, governmental and non-governmental, in liaison with Iso and IEC, also take part in the work. The procedures used to develop this document and those intended for its further maintenance are described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed for the different types of document should be noted. This document was drafted in accordance with the editorial rules of ISO/IEC Directives, Part 2 (see www.iso.org/directives or www.iec.ch/members

.pdf文档 ISO IEC 11770-3 2021 Information security — Key management — Part 3 Mechanisms using asymmetric techniques

文档预览
中文文档 5 页 50 下载 1000 浏览 0 评论 309 收藏 3.0分
温馨提示:本文档共5页,可预览 3 页,如浏览全部内容或当前文档出现乱码,可开通会员下载原始文档
ISO IEC 11770-3 2021 Information security — Key management — Part 3  Mechanisms using asymmetric techniques 第 1 页 ISO IEC 11770-3 2021 Information security — Key management — Part 3  Mechanisms using asymmetric techniques 第 2 页 ISO IEC 11770-3 2021 Information security — Key management — Part 3  Mechanisms using asymmetric techniques 第 3 页
下载文档到电脑,方便使用
本文档由 人生无常 于 2026-01-05 17:11:29上传分享
友情链接
站内资源均来自网友分享或网络收集整理,若无意中侵犯到您的权利,敬请联系我们微信(点击查看客服),我们将及时删除相关资源。