Abstract
We provide the first systematic analysis of the ISO/IEC 11770 standard for key management techniques (2009, 2009), which describes a set of key establishment, key agreement, and key transport protocols. We analyse the claimed security properties, as well as additional modern requirements on key management protocols, for over 30 protocols and their variants. Our formal, tool-supported analysis of the protocols uncovers several incorrect claims in the standard. We provide concrete suggestions for improving the standard.
Author supplied keywords
Cite
CITATION STYLE
Cremers, C., & Horvat, M. (2016). Improving the ISO/IEC 11770 standard for key management techniques. International Journal of Information Security, 15(6), 659–673. https://doi.org/10.1007/s10207-015-0306-9
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.