{"id":403162,"date":"2024-10-20T05:04:50","date_gmt":"2024-10-20T05:04:50","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-11770-32021-tc\/"},"modified":"2024-10-26T09:02:57","modified_gmt":"2024-10-26T09:02:57","slug":"bs-iso-iec-11770-32021-tc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-11770-32021-tc\/","title":{"rendered":"BS ISO\/IEC 11770-3:2021 – TC"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
1<\/td>\n30452789 <\/td>\n<\/tr>\n
147<\/td>\nA-30435245 <\/td>\n<\/tr>\n
148<\/td>\nundefined <\/td>\n<\/tr>\n
152<\/td>\nForeword <\/td>\n<\/tr>\n
153<\/td>\nIntroduction <\/td>\n<\/tr>\n
154<\/td>\n1 Scope <\/td>\n<\/tr>\n
155<\/td>\n2 Normative references
3 Terms and definitions <\/td>\n<\/tr>\n
161<\/td>\n4 Symbols and abbreviations <\/td>\n<\/tr>\n
163<\/td>\n5 Requirements <\/td>\n<\/tr>\n
164<\/td>\n6 Key derivation functions
7 Cofactor multiplication <\/td>\n<\/tr>\n
165<\/td>\n8 Key commitment
9 Key confirmation <\/td>\n<\/tr>\n
166<\/td>\n10 Framework for key management
10.1 General <\/td>\n<\/tr>\n
167<\/td>\n10.2 Key agreement between two parties
10.3 Key agreement between three parties <\/td>\n<\/tr>\n
168<\/td>\n10.4 Secret key transport
10.5 Public key transport
11 Key agreement
11.1 Key agreement mechanism 1 <\/td>\n<\/tr>\n
169<\/td>\nFigure 1 \u2014 Key agreement mechanism 1
Figure 2 \u2014 Key agreement mechanisms 2 and 8 <\/td>\n<\/tr>\n
170<\/td>\n11.2 Key agreement mechanism 2
11.3 Key agreement mechanism 3 <\/td>\n<\/tr>\n
171<\/td>\nFigure 3 \u2014 Key agreement mechanism 3
Figure 4 \u2014 Key agreement mechanisms 4, 5 and 9 <\/td>\n<\/tr>\n
172<\/td>\n11.4 Key agreement mechanism 4 <\/td>\n<\/tr>\n
173<\/td>\n11.5 Key agreement mechanism 5 <\/td>\n<\/tr>\n
174<\/td>\n11.6 Key agreement mechanism 6
Figure 5 \u2014 Key agreement mechanism 6 <\/td>\n<\/tr>\n
175<\/td>\nFigure 6 \u2014 Key agreement mechanism 7 <\/td>\n<\/tr>\n
176<\/td>\n11.7 Key agreement mechanism 7 <\/td>\n<\/tr>\n
177<\/td>\n11.8 Key agreement mechanism 8 <\/td>\n<\/tr>\n
178<\/td>\n11.9 Key agreement mechanism 9 <\/td>\n<\/tr>\n
179<\/td>\n11.10 Key agreement mechanism 10
Figure 7 \u2014 Key agreement mechanism 10
Figure 8 \u2014 Key agreement mechanism 11 <\/td>\n<\/tr>\n
180<\/td>\n11.11 Key agreement mechanism 11 <\/td>\n<\/tr>\n
181<\/td>\n11.12 Key agreement mechanism 12
Figure 9 \u2014 Key agreement mechanism 12 <\/td>\n<\/tr>\n
182<\/td>\n11.13 Key agreement mechanism 13 <\/td>\n<\/tr>\n
183<\/td>\nFigure 10 \u2014 Key agreement mechanism 13 (2-pass)
11.14 Key agreement mechanism 14 <\/td>\n<\/tr>\n
184<\/td>\nFigure 11 \u2014 Key agreement mechanism 14 (3-pass)
11.15 Key agreement mechanism 15 <\/td>\n<\/tr>\n
185<\/td>\nFigure 12 \u2014 Key agreement mechanism 15
12 Secret key transport
12.1 Secret key transport mechanism 1 <\/td>\n<\/tr>\n
186<\/td>\nFigure 13 \u2014 Secret key transport mechanism 1
Figure 14 \u2014 Secret key transport mechanism 2 <\/td>\n<\/tr>\n
187<\/td>\n12.2 Secret key transport mechanism 2 <\/td>\n<\/tr>\n
188<\/td>\n12.3 Secret key transport mechanism 3 <\/td>\n<\/tr>\n
189<\/td>\nFigure 15 \u2014 Secret key transport mechanism 3
Figure 16 \u2014 Secret key transport mechanism 4 <\/td>\n<\/tr>\n
190<\/td>\n12.4 Secret key transport mechanism 4 <\/td>\n<\/tr>\n
191<\/td>\n12.5 Secret key transport mechanism 5 <\/td>\n<\/tr>\n
192<\/td>\nFigure 17 \u2014 Secret key transport mechanism 5
Figure 18 \u2014 Secret key transport mechanism 6 <\/td>\n<\/tr>\n
194<\/td>\n12.6 Secret key transport mechanism 6 <\/td>\n<\/tr>\n
195<\/td>\n13 Public key transport
13.1 Public key transport mechanism 1
Figure 19 \u2014 Public key transport mechanism 1 <\/td>\n<\/tr>\n
196<\/td>\nFigure 20 \u2014 Public key transport mechanism 2
13.2 Public key transport mechanism 2 <\/td>\n<\/tr>\n
197<\/td>\n13.3 Public key transport mechanism 3
Figure 21 \u2014 Public key transport mechanism 3 <\/td>\n<\/tr>\n
199<\/td>\nAnnex A (normative) Object identifiers <\/td>\n<\/tr>\n
208<\/td>\nAnnex B (informative) Properties of key establishment mechanisms <\/td>\n<\/tr>\n
209<\/td>\nTable B.1 \u2014 Properties of key agreement mechanisms
Table B.2 \u2014 Properties of secret key transport mechanisms <\/td>\n<\/tr>\n
210<\/td>\nTable B.3 \u2014 Properties of public key transport mechanisms <\/td>\n<\/tr>\n
211<\/td>\nAnnex C (informative) Examples of key derivation functions
C.1 ASN.1 syntax for key derivation functions
C.2 IEEE P1363 key derivation function <\/td>\n<\/tr>\n
212<\/td>\nC.3 ANSI X9.42 key derivation function <\/td>\n<\/tr>\n
213<\/td>\nC.4 ANSI X9.63 key derivation function <\/td>\n<\/tr>\n
214<\/td>\nC.5 NIST SP 800-56A concatenation key derivation function <\/td>\n<\/tr>\n
216<\/td>\nC.6 NIST SP 800-56A ASN.1 key derivation function <\/td>\n<\/tr>\n
219<\/td>\nAnnex D (informative) Examples of key establishment mechanisms
D.1 Examples of a function F, and sets S1 and S2
D.2 Non-interactive Diffie-Hellman key agreement
D.3 Identity-based mechanism <\/td>\n<\/tr>\n
220<\/td>\nD.4 ElGamal key agreement
D.5 Nyberg-Rueppel key agreement <\/td>\n<\/tr>\n
221<\/td>\nD.6 Diffie-Hellman key agreement
D.7 Matsumoto-Takashima-Imai A(0) key agreement
D.8 Beller-Yacobi protocol <\/td>\n<\/tr>\n
223<\/td>\nAnnex E (informative) Examples of elliptic curve based key establishment mechanisms
E.1 Example of a function F
E.2 Common information
E.3 Non-interactive key agreement of Diffie-Hellman type <\/td>\n<\/tr>\n
224<\/td>\nE.4 Key agreement of ElGamal type
E.5 Key agreement following Nyberg-Rueppel <\/td>\n<\/tr>\n
225<\/td>\nE.6 Key agreement of Matsumoto-Takashima-Imai type A(0)
E.7 Key agreement of Diffie-Hellman type <\/td>\n<\/tr>\n
226<\/td>\nE.8 Key agreement of Diffie-Hellman type with 2 key pairs
E.9 Key agreement of Diffie-Hellman type with 2 signatures and key confirmation <\/td>\n<\/tr>\n
228<\/td>\nE.10 Full unified model
E.11 Key agreement of MQV type with one pass <\/td>\n<\/tr>\n
229<\/td>\nE.12 Key agreement of MQV type with two passes
E.13 Key agreement of MQV type with three passes <\/td>\n<\/tr>\n
230<\/td>\nE.14 Key agreement of Diffie-Hellman type with blinded public key <\/td>\n<\/tr>\n
231<\/td>\nE.15 Key agreement of Diffie-Hellman type with blinded public key <\/td>\n<\/tr>\n
233<\/td>\nAnnex F (informative) Example of bilinear pairing based key establishment mechanisms
F.1 Example of a function FP
F.2 Joux key agreement <\/td>\n<\/tr>\n
234<\/td>\nF.3 Identity-based key agreement following Smart-Chen-Cheng <\/td>\n<\/tr>\n
235<\/td>\nF.4 Identity-based key agreement following Fujioka-Suzuki-Ustaoglu
F.5 SM9 identity-based key agreement <\/td>\n<\/tr>\n
237<\/td>\nAnnex G (informative) Secret key transport
G.1 ElGamal key transfer
G.2 ElGamal key transfer with originator’s signature
G.3 RSA key transfer <\/td>\n<\/tr>\n
238<\/td>\nG.4 Elliptic curve based key transport of ElGamal type <\/td>\n<\/tr>\n
239<\/td>\nG.5 Elliptic curve based key transport of ElGamal type with originator signature <\/td>\n<\/tr>\n
240<\/td>\nG.6 Sakai-Kasahara key transfer <\/td>\n<\/tr>\n
241<\/td>\nBibliography <\/td>\n<\/tr>\n
244<\/td>\nBlank Page <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Tracked Changes. Information security. Key management – Mechanisms using asymmetric techniques<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2022<\/td>\n246<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":403171,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-403162","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/403162","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/403171"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=403162"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=403162"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=403162"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}