
ISO 11770:2016
ISO 11770:2016 Information technology – Security techniques – Key management – Part 6: Key derivation
CDN $233.00
SKU: 215f4e1e3d7b
Category: ICS:35.030
Description
ISO/IEC 11770-6:2016 specifies key derivation functions, i.e. functions which take secret information and other (public) parameters as input and output one or more “derived” secret keys. Key derivation functions based on MAC algorithms and on hash-functions are specified.
Edition
1
Published Date
2016-10-05
Status
PUBLISHED
Pages
23
Format 
Secure PDF
Secure – PDF details
- Save your file locally or view it via a web viewer
- Viewing permissions are restricted exclusively to the purchaser
- Device limits - 3
- Printing – Enabled only to print (1) copy
See more about our Environmental Commitment
Abstract
ISO/IEC 11770-6:2016 specifies key derivation functions, i.e. functions which take secret information and other (public) parameters as input and output one or more "derived" secret keys. Key derivation functions based on MAC algorithms and on hash-functions are specified.
Previous Editions
Can’t find what you are looking for?
Please contact us at:
Related Documents
-

ISO 27013:2024 Information security, cybersecurity and privacy protection – Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 – Amendment 1
CDN $32.00 Add to cart -

ISO 27554:2024 Information security, cybersecurity and privacy protection – Application of ISO 31000 for assessment of identity-related risk
CDN $173.00 Add to cart -

ISO 27557:2022 Information security, cybersecurity and privacy protection – Application of ISO 31000:2018 for organizational privacy risk management
CDN $233.00 Add to cart -

ISO 27562:2024 Information technology – Security techniques – Privacy guidelines for fintech services
CDN $273.00 Add to cart







