ISO/IEC 11770-1: Information technology -- Security techniques -- Key management -- Part 1: Framework
View at oid-info.com
OID | Name | Sub children | Sub Nodes Total | Description |
---|---|---|---|---|
1.0.11770.2 | part2 | 2 | 16 | ISO/IEC 11770-2 "Information technology -- Security techniques -- Key management -- Part 2: Mechanisms using symmetric techniqu… |
1.0.11770.3 | asymmetricTechniques | 22 | 100 | ISO/IEC 11770-3 "Information technology -- Security techniques -- Key management -- Part 3: Mechanisms using asymmetric techniq… |
1.0.11770.4 | weakSecrets | 7 | 44 | ISO/IEC 11770-4 "Information technology -- Security techniques -- Key management -- Part 4: Mechanisms based on weak secrets" |
1.0.11770.5 | part5 | 2 | 8 | ISO/IEC 11770-5: Information technology -- Security techniques -- Key management -- Part 5: Group key management |
1.0.11770.6 | part6 | 2 | 22 | ISO/IEC 11770-6 "Information technology -- Security techniques -- Key management -- Part 6: Key derivation" |