BS ISO IEC 11770-3-2015 Information technology Security techniques Key management Mechanisms using asymmetric techniques《信息技术 安全技术 密钥管理 使用非对称技术的机制》.pdf
《BS ISO IEC 11770-3-2015 Information technology Security techniques Key management Mechanisms using asymmetric techniques《信息技术 安全技术 密钥管理 使用非对称技术的机制》.pdf》由会员分享,可在线阅读,更多相关《BS ISO IEC 11770-3-2015 Information technology Security techniques Key management Mechanisms using asymmetric techniques《信息技术 安全技术 密钥管理 使用非对称技术的机制》.pdf(92页珍藏版)》请在麦多课文档分享上搜索。
1、BS ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques BS ISO/IEC 11770-3:2015 Incorporating corrigendum May 2016 BSI Standards Publication WB11885_BSI_StandardCovs_2013_AW.indd 1 15/05/2013 15:06BS ISO/IEC 11770-3:2015 Inform
2、ation technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques Technologies de linformation Techniques de scurit Gestion de cls Partie 3: Mcanismes utilisant des techniques asymtriques INTERNATIONAL STANDARD ISO/IEC 11770-3 Reference number ISO/IEC 11770-3:2015(E)
3、 Third edition 2015-08-01 ISO/IEC 2015 BS ISO/IEC 11770-3:2015 BRITISH STANDARD National foreword This British Standard is the UK implementation of ISO/IEC 11770-3:2015, incorporating corrigendum May 2016. It supersedes BS ISO/IEC 11770-3:2008 which is withdrawn. The start and finish of text introdu
4、ced or altered by corrigendum is indicated in the text by tags. Text altered by ISO/IEC corrigendum May 2016 is indicated in the text by . The UK participation in its preparation was entrusted by Technical Committee IST/33, IT - Security techniques, to Subcommittee IST/33/2, Cryptography and Securit
5、y Mechanisms. A list of organizations represented on this subcommittee can be obtained on request to its secretary. This publication does not purport to include all the necessary provisions of a contract. Users are responsible for its correct application. The British Standards Institution 2016. Publ
6、ished by BSI Standards Limited 2016 ISBN 978 0 580 94641 7 ICS 35.040 Compliance with a British Standard cannot confer immunity from legal obligations. This British Standard was published under the authority of the Standards Policy and Strategy Committee on 31 August 2015. Amendments/corrigenda issu
7、ed since publication Date Text affected 31 July 2016 Implementation of ISO/IEC corrigendum May 2016Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques Technologies de linformation Techniques de scurit Gestion de cls Partie 3: Mcanismes utilisant d
8、es techniques asymtriques INTERNATIONAL STANDARD ISO/IEC 11770-3 Reference number ISO/IEC 11770-3:2015(E) Third edition 2015-08-01 ISO/IEC 2015 BS ISO/IEC 11770-3:2015ii ISO/IEC 2015 All rights reserved COPYRIGHT PROTECTED DOCUMENT ISO/IEC 2015, Published in Switzerland All rights reserved. Unless o
9、therwise specified, no part of this publication may be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the addre
10、ss below or ISOs member body in the country of the requester. ISO copyright office Ch. de Blandonnet 8 CP 401 CH-1214 Vernier, Geneva, Switzerland Tel. +41 22 749 01 11 Fax +41 22 749 09 47 copyrightiso.org www.iso.org ISO/IEC 11770-3:2015(E) BS ISO/IEC 11770-3:2015ISO/IEC 11770-3:2015(E)Foreword v
11、Introduction vi 1 Scope . 1 2 Normative references 1 3 T erms and definitions . 2 4 Symbols and abbreviations . 7 5 Requirements 9 6 Key derivation functions 9 7 Cofactor multiplication 9 8 Key commitment 10 9 Key c onfirmation .11 10 Framework for key management .12 10.1 General 12 10.2 Key agreeme
12、nt between two parties 12 10.3 Key agreement between three parties.12 10.4 Secret key transport 13 10.5 Public key transport 13 11 Key agreement .14 11.1 Key agreement mechanism 1.14 11.2 Key agreement mechanism 2.15 11.3 Key agreement mechanism 3.16 11.4 Key agreement mechanism 4.18 11.5 Key agreem
13、ent mechanism 5.18 11.6 Key agreement mechanism 6.19 11.7 Key agreement mechanism 7.21 11.8 Key agreement mechanism 8.22 11.9 Key agreement mechanism 9.23 11.10 Key agreement mechanism 10 .24 11.11 Key agreement mechanism 11 .25 11.12 Key agreement mechanism 12 .26 12 Secret key transport .27 12.1 S
14、ecret key transport mechanism 1 .27 12.2 Secret key transport mechanism 2 .28 12.3 Secret key transport mechanism 3 .30 12.4 Secret key transport mechanism 4 .32 12.5 Secret key transport mechanism 5 .33 12.6 Secret key transport mechanism 6 .35 13 Public key transport 36 13.1 Public key transport m
15、echanism 1 .36 13.2 Public key transport mechanism 2 .37 13.3 Public key transport mechanism 3 .38 Annex A (normative) Object identifiers .40 Annex B (informative) Properties of key establishment mechanisms .47 Annex C (informative) Examples of key derivation functions .49 Annex D (informative) Exam
16、ples of key establishment mechanisms .56 Annex E (informative) Examples of elliptic curve based key establishment mechanisms60 ISO/IEC 2015 All rights reserved iii Contents PageBS ISO/IEC 11770-3:2015ii ISO/IEC 2015 All rights reserved COPYRIGHT PROTECTED DOCUMENT ISO/IEC 2015, Published in Switzerl
17、and All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior written permission. Permission can be reque
18、sted from either ISO at the address below or ISOs member body in the country of the requester. ISO copyright office Ch. de Blandonnet 8 CP 401 CH-1214 Vernier, Geneva, Switzerland Tel. +41 22 749 01 11 Fax +41 22 749 09 47 copyrightiso.org www.iso.org ISO/IEC 11770-3:2015(E) BS ISO/IEC 11770-3:2015I
19、SO/IEC 11770-3:2015(E)Foreword v Introduction vi 1 Scope . 1 2 Normative references 1 3 T erms and definitions . 2 4 Symbols and abbreviations . 7 5 Requirements 9 6 Key derivation functions 9 7 Cofactor multiplication 9 8 Key commitment 10 9 Key c onfirmation .11 10 Framework for key management .12
20、 10.1 General 12 10.2 Key agreement between two parties 12 10.3 Key agreement between three parties.12 10.4 Secret key transport 13 10.5 Public key transport 13 11 Key agreement .14 11.1 Key agreement mechanism 1.14 11.2 Key agreement mechanism 2.15 11.3 Key agreement mechanism 3.16 11.4 Key agreeme
21、nt mechanism 4.18 11.5 Key agreement mechanism 5.18 11.6 Key agreement mechanism 6.19 11.7 Key agreement mechanism 7.21 11.8 Key agreement mechanism 8.22 11.9 Key agreement mechanism 9.23 11.10 Key agreement mechanism 10 .24 11.11 Key agreement mechanism 11 .25 11.12 Key agreement mechanism 12 .26 1
22、2 Secret key transport .27 12.1 Secret key transport mechanism 1 .27 12.2 Secret key transport mechanism 2 .28 12.3 Secret key transport mechanism 3 .30 12.4 Secret key transport mechanism 4 .32 12.5 Secret key transport mechanism 5 .33 12.6 Secret key transport mechanism 6 .35 13 Public key transpo
23、rt 36 13.1 Public key transport mechanism 1 .36 13.2 Public key transport mechanism 2 .37 13.3 Public key transport mechanism 3 .38 Annex A (normative) Object identifiers .40 Annex B (informative) Properties of key establishment mechanisms .47 Annex C (informative) Examples of key derivation functio
24、ns .49 Annex D (informative) Examples of key establishment mechanisms .56 Annex E (informative) Examples of elliptic curve based key establishment mechanisms60 ISO/IEC 2015 All rights reserved iii Contents Page 10 13BS ISO/IEC 11770-3:2015ISO/IEC 11770-3:2015(E)Annex F (informative) Example of bilin
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- BSISOIEC1177032015INFORMATIONTECHNOLOGYSECURITYTECHNIQUESKEYMANAGEMENTMECHANISMSUSINGASYMMETRICTECHNIQUES

链接地址:http://www.mydoc123.com/p-396252.html