{"id":403162,"date":"2024-10-20T05:04:50","date_gmt":"2024-10-20T05:04:50","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-11770-32021-tc\/"},"modified":"2024-10-26T09:02:57","modified_gmt":"2024-10-26T09:02:57","slug":"bs-iso-iec-11770-32021-tc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-11770-32021-tc\/","title":{"rendered":"BS ISO\/IEC 11770-3:2021 – TC"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
1<\/td>\n | 30452789 <\/td>\n<\/tr>\n | ||||||
147<\/td>\n | A-30435245 <\/td>\n<\/tr>\n | ||||||
148<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
152<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
153<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
154<\/td>\n | 1 Scope <\/td>\n<\/tr>\n | ||||||
155<\/td>\n | 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
161<\/td>\n | 4 Symbols and abbreviations <\/td>\n<\/tr>\n | ||||||
163<\/td>\n | 5 Requirements <\/td>\n<\/tr>\n | ||||||
164<\/td>\n | 6 Key derivation functions 7 Cofactor multiplication <\/td>\n<\/tr>\n | ||||||
165<\/td>\n | 8 Key commitment 9 Key confirmation <\/td>\n<\/tr>\n | ||||||
166<\/td>\n | 10 Framework for key management 10.1 General <\/td>\n<\/tr>\n | ||||||
167<\/td>\n | 10.2 Key agreement between two parties 10.3 Key agreement between three parties <\/td>\n<\/tr>\n | ||||||
168<\/td>\n | 10.4 Secret key transport 10.5 Public key transport 11 Key agreement 11.1 Key agreement mechanism 1 <\/td>\n<\/tr>\n | ||||||
169<\/td>\n | Figure 1 \u2014 Key agreement mechanism 1 Figure 2 \u2014 Key agreement mechanisms 2 and 8 <\/td>\n<\/tr>\n | ||||||
170<\/td>\n | 11.2 Key agreement mechanism 2 11.3 Key agreement mechanism 3 <\/td>\n<\/tr>\n | ||||||
171<\/td>\n | Figure 3 \u2014 Key agreement mechanism 3 Figure 4 \u2014 Key agreement mechanisms 4, 5 and 9 <\/td>\n<\/tr>\n | ||||||
172<\/td>\n | 11.4 Key agreement mechanism 4 <\/td>\n<\/tr>\n | ||||||
173<\/td>\n | 11.5 Key agreement mechanism 5 <\/td>\n<\/tr>\n | ||||||
174<\/td>\n | 11.6 Key agreement mechanism 6 Figure 5 \u2014 Key agreement mechanism 6 <\/td>\n<\/tr>\n | ||||||
175<\/td>\n | Figure 6 \u2014 Key agreement mechanism 7 <\/td>\n<\/tr>\n | ||||||
176<\/td>\n | 11.7 Key agreement mechanism 7 <\/td>\n<\/tr>\n | ||||||
177<\/td>\n | 11.8 Key agreement mechanism 8 <\/td>\n<\/tr>\n | ||||||
178<\/td>\n | 11.9 Key agreement mechanism 9 <\/td>\n<\/tr>\n | ||||||
179<\/td>\n | 11.10 Key agreement mechanism 10 Figure 7 \u2014 Key agreement mechanism 10 Figure 8 \u2014 Key agreement mechanism 11 <\/td>\n<\/tr>\n | ||||||
180<\/td>\n | 11.11 Key agreement mechanism 11 <\/td>\n<\/tr>\n | ||||||
181<\/td>\n | 11.12 Key agreement mechanism 12 Figure 9 \u2014 Key agreement mechanism 12 <\/td>\n<\/tr>\n | ||||||
182<\/td>\n | 11.13 Key agreement mechanism 13 <\/td>\n<\/tr>\n | ||||||
183<\/td>\n | Figure 10 \u2014 Key agreement mechanism 13 (2-pass) 11.14 Key agreement mechanism 14 <\/td>\n<\/tr>\n | ||||||
184<\/td>\n | Figure 11 \u2014 Key agreement mechanism 14 (3-pass) 11.15 Key agreement mechanism 15 <\/td>\n<\/tr>\n | ||||||
185<\/td>\n | Figure 12 \u2014 Key agreement mechanism 15 12 Secret key transport 12.1 Secret key transport mechanism 1 <\/td>\n<\/tr>\n | ||||||
186<\/td>\n | Figure 13 \u2014 Secret key transport mechanism 1 Figure 14 \u2014 Secret key transport mechanism 2 <\/td>\n<\/tr>\n | ||||||
187<\/td>\n | 12.2 Secret key transport mechanism 2 <\/td>\n<\/tr>\n | ||||||
188<\/td>\n | 12.3 Secret key transport mechanism 3 <\/td>\n<\/tr>\n | ||||||
189<\/td>\n | Figure 15 \u2014 Secret key transport mechanism 3 Figure 16 \u2014 Secret key transport mechanism 4 <\/td>\n<\/tr>\n | ||||||
190<\/td>\n | 12.4 Secret key transport mechanism 4 <\/td>\n<\/tr>\n | ||||||
191<\/td>\n | 12.5 Secret key transport mechanism 5 <\/td>\n<\/tr>\n | ||||||
192<\/td>\n | Figure 17 \u2014 Secret key transport mechanism 5 Figure 18 \u2014 Secret key transport mechanism 6 <\/td>\n<\/tr>\n | ||||||
194<\/td>\n | 12.6 Secret key transport mechanism 6 <\/td>\n<\/tr>\n | ||||||
195<\/td>\n | 13 Public key transport 13.1 Public key transport mechanism 1 Figure 19 \u2014 Public key transport mechanism 1 <\/td>\n<\/tr>\n | ||||||
196<\/td>\n | Figure 20 \u2014 Public key transport mechanism 2 13.2 Public key transport mechanism 2 <\/td>\n<\/tr>\n | ||||||
197<\/td>\n | 13.3 Public key transport mechanism 3 Figure 21 \u2014 Public key transport mechanism 3 <\/td>\n<\/tr>\n | ||||||
199<\/td>\n | Annex A (normative) Object identifiers <\/td>\n<\/tr>\n | ||||||
208<\/td>\n | Annex B (informative) Properties of key establishment mechanisms <\/td>\n<\/tr>\n | ||||||
209<\/td>\n | Table B.1 \u2014 Properties of key agreement mechanisms Table B.2 \u2014 Properties of secret key transport mechanisms <\/td>\n<\/tr>\n | ||||||
210<\/td>\n | Table B.3 \u2014 Properties of public key transport mechanisms <\/td>\n<\/tr>\n | ||||||
211<\/td>\n | Annex C (informative) Examples of key derivation functions C.1 ASN.1 syntax for key derivation functions C.2 IEEE P1363 key derivation function <\/td>\n<\/tr>\n | ||||||
212<\/td>\n | C.3 ANSI X9.42 key derivation function <\/td>\n<\/tr>\n | ||||||
213<\/td>\n | C.4 ANSI X9.63 key derivation function <\/td>\n<\/tr>\n | ||||||
214<\/td>\n | C.5 NIST SP 800-56A concatenation key derivation function <\/td>\n<\/tr>\n | ||||||
216<\/td>\n | C.6 NIST SP 800-56A ASN.1 key derivation function <\/td>\n<\/tr>\n | ||||||
219<\/td>\n | Annex D (informative) Examples of key establishment mechanisms D.1 Examples of a function F, and sets S1 and S2 D.2 Non-interactive Diffie-Hellman key agreement D.3 Identity-based mechanism <\/td>\n<\/tr>\n | ||||||
220<\/td>\n | D.4 ElGamal key agreement D.5 Nyberg-Rueppel key agreement <\/td>\n<\/tr>\n | ||||||
221<\/td>\n | D.6 Diffie-Hellman key agreement D.7 Matsumoto-Takashima-Imai A(0) key agreement D.8 Beller-Yacobi protocol <\/td>\n<\/tr>\n | ||||||
223<\/td>\n | Annex E (informative) Examples of elliptic curve based key establishment mechanisms E.1 Example of a function F E.2 Common information E.3 Non-interactive key agreement of Diffie-Hellman type <\/td>\n<\/tr>\n | ||||||
224<\/td>\n | E.4 Key agreement of ElGamal type E.5 Key agreement following Nyberg-Rueppel <\/td>\n<\/tr>\n | ||||||
225<\/td>\n | E.6 Key agreement of Matsumoto-Takashima-Imai type A(0) E.7 Key agreement of Diffie-Hellman type <\/td>\n<\/tr>\n | ||||||
226<\/td>\n | E.8 Key agreement of Diffie-Hellman type with 2 key pairs E.9 Key agreement of Diffie-Hellman type with 2 signatures and key confirmation <\/td>\n<\/tr>\n | ||||||
228<\/td>\n | E.10 Full unified model E.11 Key agreement of MQV type with one pass <\/td>\n<\/tr>\n | ||||||
229<\/td>\n | E.12 Key agreement of MQV type with two passes E.13 Key agreement of MQV type with three passes <\/td>\n<\/tr>\n | ||||||
230<\/td>\n | E.14 Key agreement of Diffie-Hellman type with blinded public key <\/td>\n<\/tr>\n | ||||||
231<\/td>\n | E.15 Key agreement of Diffie-Hellman type with blinded public key <\/td>\n<\/tr>\n | ||||||
233<\/td>\n | Annex F (informative) Example of bilinear pairing based key establishment mechanisms F.1 Example of a function FP F.2 Joux key agreement <\/td>\n<\/tr>\n | ||||||
234<\/td>\n | F.3 Identity-based key agreement following Smart-Chen-Cheng <\/td>\n<\/tr>\n | ||||||
235<\/td>\n | F.4 Identity-based key agreement following Fujioka-Suzuki-Ustaoglu F.5 SM9 identity-based key agreement <\/td>\n<\/tr>\n | ||||||
237<\/td>\n | Annex G (informative) Secret key transport G.1 ElGamal key transfer G.2 ElGamal key transfer with originator’s signature G.3 RSA key transfer <\/td>\n<\/tr>\n | ||||||
238<\/td>\n | G.4 Elliptic curve based key transport of ElGamal type <\/td>\n<\/tr>\n | ||||||
239<\/td>\n | G.5 Elliptic curve based key transport of ElGamal type with originator signature <\/td>\n<\/tr>\n | ||||||
240<\/td>\n | G.6 Sakai-Kasahara key transfer <\/td>\n<\/tr>\n | ||||||
241<\/td>\n | Bibliography <\/td>\n<\/tr>\n | ||||||
244<\/td>\n | Blank Page <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Tracked Changes. Information security. Key management – Mechanisms using asymmetric techniques<\/b><\/p>\n |