ISO/IEC 11770-4 "Information technology -- Security
techniques -- Key management -- Part 4: Mechanisms based on weak secrets"
View at oid-info.com
OID | Name | Sub children | Sub Nodes Total | Description |
---|---|---|---|---|
1.0.11770.4.0 | asn1-module | 1 | 1 | ASN.1 modules defined in ISO/IEC 11770-4 |
1.0.11770.4.1 | balancedKeyAgreementMechanism-1 | 6 | 6 | Balanced key agreement mechanism 1 |
1.0.11770.4.2 | balancedKeyAgreementMechanism-2 | 8 | 8 | Balanced key agreement mechanism 2 |
1.0.11770.4.3 | augmentedKeyAgreementMechanism-1 | 5 | 5 | Augmented key agreement mechanism 1 |
1.0.11770.4.4 | augmentedKeyAgreementMechanism-2 | 6 | 6 | Augmented key agreement mechanism 2 |
1.0.11770.4.5 | augmentedAgreementMechanism-3 | 6 | 6 | Augmented key agreement mechanism 3 |
1.0.11770.4.6 | keyRetrievalMechanism-1 | 5 | 5 | Key retrieval mechanism 1 |
OID | Name | Sub children | Sub Nodes Total | Description |
---|---|---|---|---|
1.0.11770.1 | part1 | 0 | 0 | ISO/IEC 11770-1: Information technology -- Security techniques -- Key management -- Part 1: Framework |
1.0.11770.2 | part2 | 2 | 16 | ISO/IEC 11770-2 "Information technology -- Security techniques -- Key management -- Part 2: Mechanisms using symmetric techniqu… |
1.0.11770.3 | asymmetricTechniques | 22 | 100 | ISO/IEC 11770-3 "Information technology -- Security techniques -- Key management -- Part 3: Mechanisms using asymmetric techniq… |
1.0.11770.5 | part5 | 2 | 8 | ISO/IEC 11770-5: Information technology -- Security techniques -- Key management -- Part 5: Group key management |
1.0.11770.6 | part6 | 2 | 22 | ISO/IEC 11770-6 "Information technology -- Security techniques -- Key management -- Part 6: Key derivation" |