Skip to main content

ISO/IEC 11770-3:2008

Withdrawn Date published:

Warning: Withdrawn Standard. This document has been replaced by:

Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques

ISO/IEC 11770-3:2008 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals.

  1. Establish a shared secret key for a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key agreement mechanism, the secret key is the result of a data exchange between the two entities A and B. Neither of them can predetermine the value of the shared secret key.
  2. Establish a shared secret key for a symmetric cryptographic technique between two entities A and B by key transport. In a secret key transport mechanism, the secret key is chosen by one entity A and is transferred to another entity B, suitably protected by asymmetric techniques.
  3. Make an entity's public key available to other entities by key transport. In a public key transport mechanism, the public key of entity A must be transferred to other entities in an authenticated way, but not requiring secrecy.

Some of the mechanisms of ISO/IEC 11770-3:2008 are based on the corresponding authentication mechanisms in ISO/IEC 9798-3.

ISO/IEC 11770-3:2008 does not cover aspects of key management such as

  • key lifecycle management,
  • mechanisms to generate or validate asymmetric key pairs,
  • mechanisms to store, archive, delete, destroy, etc. keys.

While ISO/IEC 11770-3:2008 does not explicitly cover the distribution of an entity's private key (of an asymmetric key pair) from a trusted third party to a requesting entity, the key transport mechanisms described can be used to achieve this. A private key can in all cases be distributed with these mechanisms where an existing, non-compromised key already exists. However, in practice the distribution of private keys is usually a manual process that relies on technological means like smart cards, etc.

ISO/IEC 11770-3:2008 does not cover the implementations of the transformations used in the key management mechanisms.

Get this standard Prices exclude GST
PDF ( Single user document)
$126.00 NZD
HardCopy
$173.00 NZD
Networkable PDF
Price varies
Preview only close
Prev {{ page }}/ {{ numPages }} Next
Preview only close
Prev {{ page }}/ {{ numPages }} Next

Keep me up-to-date

Sign up to receive updates when there are changes to this standard

Related Information

Similar Standards

  • AS/NZS ISO/IEC 27001:2023

    Information security, cybersecurity and privacy protection – Information security management systems – Requirements

  • AS/NZS ISO/IEC 27001:2023 A1

    Information security, cybersecurity and privacy protection - Privacy enhancing data de-identification framework

  • AS/NZS ISO/IEC 27002:2022

    Information security, cybersecurity and privacy protection — Information security controls

  • AS/NZS ISO/IEC 27011:2025

    Information security, cybersecurity and privacy protection – Information security controls based on ISO/IEC 27002 for telecommunications organizations

Preview only close
Prev {{ page }}/ {{ numPages }} Next
Preview only close
Prev {{ page }}/ {{ numPages }} Next

ISO/IEC 11770-3:2008

Get this standard Prices exclude GST
PDF ( Single user document)
$126.00 NZD
HardCopy
$173.00 NZD
Networkable PDF
Price varies

Request to add this standard to your subscription

ISO/IEC 11770-3:2008

Price varies
Online library subscription

Your organisation’s Account Administrator must approve a request to add a standard to your subscription.

You may add a comment to the administrator below.

Cancel