{"id":386224,"date":"2024-10-20T03:34:23","date_gmt":"2024-10-20T03:34:23","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-11770-32021\/"},"modified":"2024-10-26T06:31:02","modified_gmt":"2024-10-26T06:31:02","slug":"bs-iso-iec-11770-32021","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-11770-32021\/","title":{"rendered":"BS ISO\/IEC 11770-3:2021"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nundefined <\/td>\n<\/tr>\n
6<\/td>\nForeword <\/td>\n<\/tr>\n
7<\/td>\nIntroduction <\/td>\n<\/tr>\n
8<\/td>\n1 Scope <\/td>\n<\/tr>\n
9<\/td>\n2 Normative references
3 Terms and definitions <\/td>\n<\/tr>\n
15<\/td>\n4 Symbols and abbreviations <\/td>\n<\/tr>\n
17<\/td>\n5 Requirements <\/td>\n<\/tr>\n
18<\/td>\n6 Key derivation functions
7 Cofactor multiplication <\/td>\n<\/tr>\n
19<\/td>\n8 Key commitment
9 Key confirmation <\/td>\n<\/tr>\n
20<\/td>\n10 Framework for key management
10.1 General <\/td>\n<\/tr>\n
21<\/td>\n10.2 Key agreement between two parties
10.3 Key agreement between three parties <\/td>\n<\/tr>\n
22<\/td>\n10.4 Secret key transport
10.5 Public key transport
11 Key agreement
11.1 Key agreement mechanism 1 <\/td>\n<\/tr>\n
23<\/td>\nFigure 1 \u2014 Key agreement mechanism 1
Figure 2 \u2014 Key agreement mechanisms 2 and 8 <\/td>\n<\/tr>\n
24<\/td>\n11.2 Key agreement mechanism 2
11.3 Key agreement mechanism 3 <\/td>\n<\/tr>\n
25<\/td>\nFigure 3 \u2014 Key agreement mechanism 3
Figure 4 \u2014 Key agreement mechanisms 4, 5 and 9 <\/td>\n<\/tr>\n
26<\/td>\n11.4 Key agreement mechanism 4 <\/td>\n<\/tr>\n
27<\/td>\n11.5 Key agreement mechanism 5 <\/td>\n<\/tr>\n
28<\/td>\n11.6 Key agreement mechanism 6
Figure 5 \u2014 Key agreement mechanism 6 <\/td>\n<\/tr>\n
29<\/td>\nFigure 6 \u2014 Key agreement mechanism 7 <\/td>\n<\/tr>\n
30<\/td>\n11.7 Key agreement mechanism 7 <\/td>\n<\/tr>\n
31<\/td>\n11.8 Key agreement mechanism 8 <\/td>\n<\/tr>\n
32<\/td>\n11.9 Key agreement mechanism 9 <\/td>\n<\/tr>\n
33<\/td>\n11.10 Key agreement mechanism 10
Figure 7 \u2014 Key agreement mechanism 10
Figure 8 \u2014 Key agreement mechanism 11 <\/td>\n<\/tr>\n
34<\/td>\n11.11 Key agreement mechanism 11 <\/td>\n<\/tr>\n
35<\/td>\n11.12 Key agreement mechanism 12
Figure 9 \u2014 Key agreement mechanism 12 <\/td>\n<\/tr>\n
36<\/td>\n11.13 Key agreement mechanism 13 <\/td>\n<\/tr>\n
37<\/td>\nFigure 10 \u2014 Key agreement mechanism 13 (2-pass)
11.14 Key agreement mechanism 14 <\/td>\n<\/tr>\n
38<\/td>\nFigure 11 \u2014 Key agreement mechanism 14 (3-pass)
11.15 Key agreement mechanism 15 <\/td>\n<\/tr>\n
39<\/td>\nFigure 12 \u2014 Key agreement mechanism 15
12 Secret key transport
12.1 Secret key transport mechanism 1 <\/td>\n<\/tr>\n
40<\/td>\nFigure 13 \u2014 Secret key transport mechanism 1
Figure 14 \u2014 Secret key transport mechanism 2 <\/td>\n<\/tr>\n
41<\/td>\n12.2 Secret key transport mechanism 2 <\/td>\n<\/tr>\n
42<\/td>\n12.3 Secret key transport mechanism 3 <\/td>\n<\/tr>\n
43<\/td>\nFigure 15 \u2014 Secret key transport mechanism 3
Figure 16 \u2014 Secret key transport mechanism 4 <\/td>\n<\/tr>\n
44<\/td>\n12.4 Secret key transport mechanism 4 <\/td>\n<\/tr>\n
45<\/td>\n12.5 Secret key transport mechanism 5 <\/td>\n<\/tr>\n
46<\/td>\nFigure 17 \u2014 Secret key transport mechanism 5
Figure 18 \u2014 Secret key transport mechanism 6 <\/td>\n<\/tr>\n
48<\/td>\n12.6 Secret key transport mechanism 6 <\/td>\n<\/tr>\n
49<\/td>\n13 Public key transport
13.1 Public key transport mechanism 1
Figure 19 \u2014 Public key transport mechanism 1 <\/td>\n<\/tr>\n
50<\/td>\nFigure 20 \u2014 Public key transport mechanism 2
13.2 Public key transport mechanism 2 <\/td>\n<\/tr>\n
51<\/td>\n13.3 Public key transport mechanism 3
Figure 21 \u2014 Public key transport mechanism 3 <\/td>\n<\/tr>\n
53<\/td>\nAnnex A (normative) Object identifiers <\/td>\n<\/tr>\n
62<\/td>\nAnnex B (informative) Properties of key establishment mechanisms <\/td>\n<\/tr>\n
63<\/td>\nTable B.1 \u2014 Properties of key agreement mechanisms
Table B.2 \u2014 Properties of secret key transport mechanisms <\/td>\n<\/tr>\n
64<\/td>\nTable B.3 \u2014 Properties of public key transport mechanisms <\/td>\n<\/tr>\n
65<\/td>\nAnnex C (informative) Examples of key derivation functions
C.1 ASN.1 syntax for key derivation functions
C.2 IEEE P1363 key derivation function <\/td>\n<\/tr>\n
66<\/td>\nC.3 ANSI X9.42 key derivation function <\/td>\n<\/tr>\n
67<\/td>\nC.4 ANSI X9.63 key derivation function <\/td>\n<\/tr>\n
68<\/td>\nC.5 NIST SP 800-56A concatenation key derivation function <\/td>\n<\/tr>\n
70<\/td>\nC.6 NIST SP 800-56A ASN.1 key derivation function <\/td>\n<\/tr>\n
73<\/td>\nAnnex D (informative) Examples of key establishment mechanisms
D.1 Examples of a function F, and sets S1 and S2
D.2 Non-interactive Diffie-Hellman key agreement
D.3 Identity-based mechanism <\/td>\n<\/tr>\n
74<\/td>\nD.4 ElGamal key agreement
D.5 Nyberg-Rueppel key agreement <\/td>\n<\/tr>\n
75<\/td>\nD.6 Diffie-Hellman key agreement
D.7 Matsumoto-Takashima-Imai A(0) key agreement
D.8 Beller-Yacobi protocol <\/td>\n<\/tr>\n
77<\/td>\nAnnex E (informative) Examples of elliptic curve based key establishment mechanisms
E.1 Example of a function F
E.2 Common information
E.3 Non-interactive key agreement of Diffie-Hellman type <\/td>\n<\/tr>\n
78<\/td>\nE.4 Key agreement of ElGamal type
E.5 Key agreement following Nyberg-Rueppel <\/td>\n<\/tr>\n
79<\/td>\nE.6 Key agreement of Matsumoto-Takashima-Imai type A(0)
E.7 Key agreement of Diffie-Hellman type <\/td>\n<\/tr>\n
80<\/td>\nE.8 Key agreement of Diffie-Hellman type with 2 key pairs
E.9 Key agreement of Diffie-Hellman type with 2 signatures and key confirmation <\/td>\n<\/tr>\n
82<\/td>\nE.10 Full unified model
E.11 Key agreement of MQV type with one pass <\/td>\n<\/tr>\n
83<\/td>\nE.12 Key agreement of MQV type with two passes
E.13 Key agreement of MQV type with three passes <\/td>\n<\/tr>\n
84<\/td>\nE.14 Key agreement of Diffie-Hellman type with blinded public key <\/td>\n<\/tr>\n
85<\/td>\nE.15 Key agreement of Diffie-Hellman type with blinded public key <\/td>\n<\/tr>\n
87<\/td>\nAnnex F (informative) Example of bilinear pairing based key establishment mechanisms
F.1 Example of a function FP
F.2 Joux key agreement <\/td>\n<\/tr>\n
88<\/td>\nF.3 Identity-based key agreement following Smart-Chen-Cheng <\/td>\n<\/tr>\n
89<\/td>\nF.4 Identity-based key agreement following Fujioka-Suzuki-Ustaoglu
F.5 SM9 identity-based key agreement <\/td>\n<\/tr>\n
91<\/td>\nAnnex G (informative) Secret key transport
G.1 ElGamal key transfer
G.2 ElGamal key transfer with originator’s signature
G.3 RSA key transfer <\/td>\n<\/tr>\n
92<\/td>\nG.4 Elliptic curve based key transport of ElGamal type <\/td>\n<\/tr>\n
93<\/td>\nG.5 Elliptic curve based key transport of ElGamal type with originator signature <\/td>\n<\/tr>\n
94<\/td>\nG.6 Sakai-Kasahara key transfer <\/td>\n<\/tr>\n
95<\/td>\nBibliography <\/td>\n<\/tr>\n
98<\/td>\nBlank Page <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Information security. Key management – Mechanisms using asymmetric techniques<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2021<\/td>\n100<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":386233,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-386224","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/386224","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/386233"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=386224"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=386224"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=386224"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}