{"id":386224,"date":"2024-10-20T03:34:23","date_gmt":"2024-10-20T03:34:23","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-11770-32021\/"},"modified":"2024-10-26T06:31:02","modified_gmt":"2024-10-26T06:31:02","slug":"bs-iso-iec-11770-32021","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-11770-32021\/","title":{"rendered":"BS ISO\/IEC 11770-3:2021"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | 1 Scope <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 4 Symbols and abbreviations <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 5 Requirements <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 6 Key derivation functions 7 Cofactor multiplication <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 8 Key commitment 9 Key confirmation <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 10 Framework for key management 10.1 General <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 10.2 Key agreement between two parties 10.3 Key agreement between three parties <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 10.4 Secret key transport 10.5 Public key transport 11 Key agreement 11.1 Key agreement mechanism 1 <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | Figure 1 \u2014 Key agreement mechanism 1 Figure 2 \u2014 Key agreement mechanisms 2 and 8 <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 11.2 Key agreement mechanism 2 11.3 Key agreement mechanism 3 <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | Figure 3 \u2014 Key agreement mechanism 3 Figure 4 \u2014 Key agreement mechanisms 4, 5 and 9 <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 11.4 Key agreement mechanism 4 <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 11.5 Key agreement mechanism 5 <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 11.6 Key agreement mechanism 6 Figure 5 \u2014 Key agreement mechanism 6 <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | Figure 6 \u2014 Key agreement mechanism 7 <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 11.7 Key agreement mechanism 7 <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 11.8 Key agreement mechanism 8 <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 11.9 Key agreement mechanism 9 <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 11.10 Key agreement mechanism 10 Figure 7 \u2014 Key agreement mechanism 10 Figure 8 \u2014 Key agreement mechanism 11 <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 11.11 Key agreement mechanism 11 <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 11.12 Key agreement mechanism 12 Figure 9 \u2014 Key agreement mechanism 12 <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 11.13 Key agreement mechanism 13 <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | Figure 10 \u2014 Key agreement mechanism 13 (2-pass) 11.14 Key agreement mechanism 14 <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | Figure 11 \u2014 Key agreement mechanism 14 (3-pass) 11.15 Key agreement mechanism 15 <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | Figure 12 \u2014 Key agreement mechanism 15 12 Secret key transport 12.1 Secret key transport mechanism 1 <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | Figure 13 \u2014 Secret key transport mechanism 1 Figure 14 \u2014 Secret key transport mechanism 2 <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 12.2 Secret key transport mechanism 2 <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 12.3 Secret key transport mechanism 3 <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | Figure 15 \u2014 Secret key transport mechanism 3 Figure 16 \u2014 Secret key transport mechanism 4 <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | 12.4 Secret key transport mechanism 4 <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | 12.5 Secret key transport mechanism 5 <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | Figure 17 \u2014 Secret key transport mechanism 5 Figure 18 \u2014 Secret key transport mechanism 6 <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | 12.6 Secret key transport mechanism 6 <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | 13 Public key transport 13.1 Public key transport mechanism 1 Figure 19 \u2014 Public key transport mechanism 1 <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | Figure 20 \u2014 Public key transport mechanism 2 13.2 Public key transport mechanism 2 <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | 13.3 Public key transport mechanism 3 Figure 21 \u2014 Public key transport mechanism 3 <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | Annex A (normative) Object identifiers <\/td>\n<\/tr>\n | ||||||
62<\/td>\n | Annex B (informative) Properties of key establishment mechanisms <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | Table B.1 \u2014 Properties of key agreement mechanisms Table B.2 \u2014 Properties of secret key transport mechanisms <\/td>\n<\/tr>\n | ||||||
64<\/td>\n | Table B.3 \u2014 Properties of public key transport mechanisms <\/td>\n<\/tr>\n | ||||||
65<\/td>\n | Annex C (informative) Examples of key derivation functions C.1 ASN.1 syntax for key derivation functions C.2 IEEE P1363 key derivation function <\/td>\n<\/tr>\n | ||||||
66<\/td>\n | C.3 ANSI X9.42 key derivation function <\/td>\n<\/tr>\n | ||||||
67<\/td>\n | C.4 ANSI X9.63 key derivation function <\/td>\n<\/tr>\n | ||||||
68<\/td>\n | C.5 NIST SP 800-56A concatenation key derivation function <\/td>\n<\/tr>\n | ||||||
70<\/td>\n | C.6 NIST SP 800-56A ASN.1 key derivation function <\/td>\n<\/tr>\n | ||||||
73<\/td>\n | Annex D (informative) Examples of key establishment mechanisms D.1 Examples of a function F, and sets S1 and S2 D.2 Non-interactive Diffie-Hellman key agreement D.3 Identity-based mechanism <\/td>\n<\/tr>\n | ||||||
74<\/td>\n | D.4 ElGamal key agreement D.5 Nyberg-Rueppel key agreement <\/td>\n<\/tr>\n | ||||||
75<\/td>\n | D.6 Diffie-Hellman key agreement D.7 Matsumoto-Takashima-Imai A(0) key agreement D.8 Beller-Yacobi protocol <\/td>\n<\/tr>\n | ||||||
77<\/td>\n | Annex E (informative) Examples of elliptic curve based key establishment mechanisms E.1 Example of a function F E.2 Common information E.3 Non-interactive key agreement of Diffie-Hellman type <\/td>\n<\/tr>\n | ||||||
78<\/td>\n | E.4 Key agreement of ElGamal type E.5 Key agreement following Nyberg-Rueppel <\/td>\n<\/tr>\n | ||||||
79<\/td>\n | E.6 Key agreement of Matsumoto-Takashima-Imai type A(0) E.7 Key agreement of Diffie-Hellman type <\/td>\n<\/tr>\n | ||||||
80<\/td>\n | E.8 Key agreement of Diffie-Hellman type with 2 key pairs E.9 Key agreement of Diffie-Hellman type with 2 signatures and key confirmation <\/td>\n<\/tr>\n | ||||||
82<\/td>\n | E.10 Full unified model E.11 Key agreement of MQV type with one pass <\/td>\n<\/tr>\n | ||||||
83<\/td>\n | E.12 Key agreement of MQV type with two passes E.13 Key agreement of MQV type with three passes <\/td>\n<\/tr>\n | ||||||
84<\/td>\n | E.14 Key agreement of Diffie-Hellman type with blinded public key <\/td>\n<\/tr>\n | ||||||
85<\/td>\n | E.15 Key agreement of Diffie-Hellman type with blinded public key <\/td>\n<\/tr>\n | ||||||
87<\/td>\n | Annex F (informative) Example of bilinear pairing based key establishment mechanisms F.1 Example of a function FP F.2 Joux key agreement <\/td>\n<\/tr>\n | ||||||
88<\/td>\n | F.3 Identity-based key agreement following Smart-Chen-Cheng <\/td>\n<\/tr>\n | ||||||
89<\/td>\n | F.4 Identity-based key agreement following Fujioka-Suzuki-Ustaoglu F.5 SM9 identity-based key agreement <\/td>\n<\/tr>\n | ||||||
91<\/td>\n | Annex G (informative) Secret key transport G.1 ElGamal key transfer G.2 ElGamal key transfer with originator’s signature G.3 RSA key transfer <\/td>\n<\/tr>\n | ||||||
92<\/td>\n | G.4 Elliptic curve based key transport of ElGamal type <\/td>\n<\/tr>\n | ||||||
93<\/td>\n | G.5 Elliptic curve based key transport of ElGamal type with originator signature <\/td>\n<\/tr>\n | ||||||
94<\/td>\n | G.6 Sakai-Kasahara key transfer <\/td>\n<\/tr>\n | ||||||
95<\/td>\n | Bibliography <\/td>\n<\/tr>\n | ||||||
98<\/td>\n | Blank Page <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information security. Key management – Mechanisms using asymmetric techniques<\/b><\/p>\n |