ISO/IEC JTC 1/SC 27 11770-1:2010 - Key management - Part 1: Framework
In information technology there is an ever-increasing need to use cryptographic mechanisms for the protection of data against unauthorised disclosure or manipulation, for entity authentication, and for non-repudiation functions. The security and reliability of such mechanisms are directly dependent on the management and protection afforded to a security parameter, the key.
This part of ISO/IEC 11770:
a) establishes the general model on which key management mechanisms are based.
b) defines the basic concepts of key management which are common to all the parts of ISO/IEC 11770.
c) specifies the characteristics of key management services.
d) establishes general principles on the management of keying material during its life cycle.
e) establishes the conceptual model of key distribution.