ISO/IEC JTC 1/SC 27 11770-6:2016 - Key management - Part 6: Key derivation

  • Home
  • ISO/IEC JTC 1/SC 27 11770-6:2016 - Key management - Part 6: Key derivation

Click on the interactive map below or utilise the filtering interface on the side to browse the items that are currently in our Standards Watch*.

IT_general it_security software networking cloud computing other iot big data ai cybersecurity data tecnologies iso iec 27005 5g communications iso iec etsi osi it terminal application information computer grafics information coding office machine interface interconnection equipment languages used in it microprocessor system data storage services

ISO/IEC JTC 1/SC 27 11770-6:2016 - Key management - Part 6: Key derivation

Category: 
Cybersecurity
SDO: 
IEC
ISO
ICT domain: 
IT Security

This document specifies key derivation functions, i.e. functions which take secret information and other (public) parameters as input and output one or more “derived” secret keys.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:11770:-6:ed-1:v1:en

Filter by Standard/Working group: