ISO/IEC 11770-3 "Information technology -- Security techniques -- Key management -- Part 3: Mechanisms using asymmetric techniques"
View at oid-info.com
OID | Name | Sub children | Sub Nodes Total | Description |
---|---|---|---|---|
1.0.11770.3.0 | asn1-module | 1 | 1 | ASN.1 modules defined in ISO/IEC 11770-3 |
1.0.11770.3.1 | keyAgreementMechanism1 | 2 | 2 | Key agreement mechanism 1 |
1.0.11770.3.2 | keyAgreementMechanism2 | 3 | 3 | Key agreement mechanism 2 |
1.0.11770.3.3 | keyAgreementMechanism3 | 4 | 4 | Key agreement mechanism 3 |
1.0.11770.3.4 | keyAgreementMechanism4 | 4 | 4 | Key agreement mechanism 4 |
1.0.11770.3.5 | keyAgreementMechanism5 | 4 | 4 | Key agreement mechanism 5 |
1.0.11770.3.6 | keyAgreementMechanism6 | 4 | 4 | Key agreement mechanism 6 |
1.0.11770.3.7 | keyAgreementMechanism7 | 4 | 4 | Key agreement mechanism 7 |
1.0.11770.3.8 | keyAgreementMechanism8 | 3 | 3 | Key agreement mechanism 8 |
1.0.11770.3.9 | keyAgreementMechanism9 | 4 | 4 | Key agreement mechanism 9 |
1.0.11770.3.10 | keyAgreementMechanism10 | 4 | 4 | Key agreement mechanism 10 |
1.0.11770.3.11 | keyAgreementMechanism11 | 5 | 5 | Key agreement mechanism 11 |
1.0.11770.3.12 | keyTransportMechanism1 | 2 | 2 | Key transport mechanism 1 |
1.0.11770.3.13 | keyTransportMechanism2 | 4 | 4 | Key transport mechanism 2 |
1.0.11770.3.14 | keyTransportMechanism3 | 4 | 4 | Key transport mechanism 3 |
1.0.11770.3.15 | keyTransportMechanism4 | 5 | 5 | Key transport mechanism 4 |
1.0.11770.3.16 | keyTransportMechanism5 | 9 | 9 | Key transport mechanism 5 |
1.0.11770.3.17 | keyTransportMechanism6 | 5 | 5 | Key transport mechanism 6 |
1.0.11770.3.18 | publicKeyTransportMechanism1 | 2 | 2 | Public key transport mechanism 1 |
1.0.11770.3.19 | publicKeyTransportMechanism2 | 3 | 3 | Public key transport mechanism 2 |
1.0.11770.3.20 | publicKeyTransportMechanism3 | 2 | 2 | Public key transport mechanism 3 |
1.0.11770.3.21 | keyAgreementMechanism12 | 0 | 0 | Key agreement mechanism 12 |
OID | Name | Sub children | Sub Nodes Total | Description |
---|---|---|---|---|
1.0.11770.1 | part1 | 0 | 0 | ISO/IEC 11770-1: Information technology -- Security techniques -- Key management -- Part 1: Framework |
1.0.11770.2 | part2 | 2 | 16 | ISO/IEC 11770-2 "Information technology -- Security techniques -- Key management -- Part 2: Mechanisms using symmetric techniqu… |
1.0.11770.4 | weakSecrets | 7 | 44 | ISO/IEC 11770-4 "Information technology -- Security techniques -- Key management -- Part 4: Mechanisms based on weak secrets" |
1.0.11770.5 | part5 | 2 | 8 | ISO/IEC 11770-5: Information technology -- Security techniques -- Key management -- Part 5: Group key management |
1.0.11770.6 | part6 | 2 | 22 | ISO/IEC 11770-6 "Information technology -- Security techniques -- Key management -- Part 6: Key derivation" |