ISO/IEC 11770-1:2010
(Main)Information technology — Security techniques — Key management — Part 1: Framework
Information technology — Security techniques — Key management — Part 1: Framework
ISO/IEC 11770-1:2010 defines a general model of key management that is independent of the use of any particular cryptographic algorithm. However, certain key distribution mechanisms can depend on particular algorithm properties, for example, properties of asymmetric algorithms. ISO/IEC 11770-1:2010 contains the material required for a basic understanding of subsequent parts. Examples of the use of key management mechanisms are included in ISO 11568. If non-repudiation is required for key management, ISO/IEC 13888 is applicable. ISO/IEC 11770-1:2010 addresses both the automated and manual aspects of key management, including outlines of data elements and sequences of operations that are used to obtain key management services. However it does not specify details of protocol exchanges that might be needed. As with other security services, key management can only be provided within the context of a defined security policy. The definition of security policies is outside the scope of ISO/IEC 11770. The fundamental problem is to establish keying material whose origin, integrity, timeliness and (in the case of secret keys) confidentiality can be guaranteed to both direct and indirect users. Key management includes functions such as the generation, storage, distribution, deletion and archiving of keying material in accordance with a security policy (ISO 7498-2). ISO/IEC 11770-1:2010 has a special relationship to the security frameworks for open systems (ISO/IEC 10181). All the frameworks, including this one, identify the basic concepts and characteristics of mechanisms covering different aspects of security.
Technologies de l'information — Techniques de sécurité — Gestion de clés — Partie 1: Cadre général
General Information
- Status
- Published
- Publication Date
- 21-Nov-2010
- Drafting Committee
- ISO/IEC JTC 1/SC 27/WG 2 - Cryptography and security mechanisms
- Current Stage
- 9093 - International Standard confirmed
- Start Date
- 15-Nov-2021
- Completion Date
- 12-Feb-2026
Relations
- Effective Date
- 09-Feb-2026
- Effective Date
- 09-Feb-2026
- Referred By
CEN ISO/TS 19299:2015 - Electronic fee collection - Security framework (ISO/TS 19299:2015) - Effective Date
- 09-Feb-2026
- Effective Date
- 18-Dec-2008
Overview
ISO/IEC 11770-1:2010 - Information technology - Security techniques - Key management - Part 1: Framework - defines a vendor‑ and algorithm‑neutral key management framework. It establishes a general model and terminology for managing cryptographic keying material across its life cycle, covering both automated and manual aspects (but not low‑level protocol exchanges). The standard is intended as the foundational reference for subsequent parts of ISO/IEC 11770 and for designers of secure systems and key management services.
Key topics and technical requirements
- General model and terminology: definitions for keys, keying material, key agreement, key transport, certification authority, and related concepts.
- Key life cycle model: states and transitions (generation, registration, distribution, installation, storage, archiving, revocation, deregistration, destruction).
- Key management services: standardized service concepts including Generate‑Key, Register‑Key, Create‑Key‑Certificate, Distribute‑Key, Install‑Key, Store‑Key, Derive‑Key, Archive‑Key, Revoke‑Key, Deregister‑Key, Destroy‑Key.
- Protection mechanisms: guidelines for protecting keys by cryptographic, non‑cryptographic, physical and organisational means.
- Conceptual key distribution models: distribution between two entities, within a domain, and between domains; includes roles such as key distribution centre and key translation centre.
- Support services: key management facility and user‑oriented support functions.
- Threats and information objects: informative annexes cover typical threats to key management and key management data elements.
- Scope constraints: focuses on architecture and services; does not mandate specific cryptographic algorithms or protocol message formats.
Applications and who uses it
ISO/IEC 11770-1:2010 is used by:
- Security architects and system designers building Key Management Systems (KMS), Public Key Infrastructures (PKI), HSM integrations and cloud key management.
- Product developers of secure devices (smart cards, TPMs, HSMs) and software implementing key lifecycle controls.
- Enterprise security teams and DevOps designing key rotation, storage and distribution policies for cloud, IoT and messaging systems.
- Compliance officers and auditors mapping organizational security policy to standard key management practices.
Practical applications include secure key generation, certificate lifecycle planning, cross‑domain key exchange models, and establishing organizational controls for key storage, archival and secure destruction.
Related standards
- ISO/IEC 11770 series - Part 2 (symmetric mechanisms), Part 3 (asymmetric mechanisms), Part 4 (weak secrets), Part 5 (group key management - under preparation).
- ISO/IEC 10181 (security frameworks for open systems), ISO 11568 (examples of key management mechanisms), ISO/IEC 13888 (non‑repudiation for key management), ISO 7498‑2 (security policy context).
Keywords: ISO/IEC 11770-1:2010, key management framework, key lifecycle, cryptographic keys, key distribution, key generation, key storage, PKI, KMS, security policy.
Get Certified
Connect with accredited certification bodies for this standard

BSI Group
BSI (British Standards Institution) is the business standards company that helps organizations make excellence a habit.

Bureau Veritas
Bureau Veritas is a world leader in laboratory testing, inspection and certification services.

DNV
DNV is an independent assurance and risk management provider.
Sponsored listings
Frequently Asked Questions
ISO/IEC 11770-1:2010 is a standard published by the International Organization for Standardization (ISO). Its full title is "Information technology — Security techniques — Key management — Part 1: Framework". This standard covers: ISO/IEC 11770-1:2010 defines a general model of key management that is independent of the use of any particular cryptographic algorithm. However, certain key distribution mechanisms can depend on particular algorithm properties, for example, properties of asymmetric algorithms. ISO/IEC 11770-1:2010 contains the material required for a basic understanding of subsequent parts. Examples of the use of key management mechanisms are included in ISO 11568. If non-repudiation is required for key management, ISO/IEC 13888 is applicable. ISO/IEC 11770-1:2010 addresses both the automated and manual aspects of key management, including outlines of data elements and sequences of operations that are used to obtain key management services. However it does not specify details of protocol exchanges that might be needed. As with other security services, key management can only be provided within the context of a defined security policy. The definition of security policies is outside the scope of ISO/IEC 11770. The fundamental problem is to establish keying material whose origin, integrity, timeliness and (in the case of secret keys) confidentiality can be guaranteed to both direct and indirect users. Key management includes functions such as the generation, storage, distribution, deletion and archiving of keying material in accordance with a security policy (ISO 7498-2). ISO/IEC 11770-1:2010 has a special relationship to the security frameworks for open systems (ISO/IEC 10181). All the frameworks, including this one, identify the basic concepts and characteristics of mechanisms covering different aspects of security.
ISO/IEC 11770-1:2010 defines a general model of key management that is independent of the use of any particular cryptographic algorithm. However, certain key distribution mechanisms can depend on particular algorithm properties, for example, properties of asymmetric algorithms. ISO/IEC 11770-1:2010 contains the material required for a basic understanding of subsequent parts. Examples of the use of key management mechanisms are included in ISO 11568. If non-repudiation is required for key management, ISO/IEC 13888 is applicable. ISO/IEC 11770-1:2010 addresses both the automated and manual aspects of key management, including outlines of data elements and sequences of operations that are used to obtain key management services. However it does not specify details of protocol exchanges that might be needed. As with other security services, key management can only be provided within the context of a defined security policy. The definition of security policies is outside the scope of ISO/IEC 11770. The fundamental problem is to establish keying material whose origin, integrity, timeliness and (in the case of secret keys) confidentiality can be guaranteed to both direct and indirect users. Key management includes functions such as the generation, storage, distribution, deletion and archiving of keying material in accordance with a security policy (ISO 7498-2). ISO/IEC 11770-1:2010 has a special relationship to the security frameworks for open systems (ISO/IEC 10181). All the frameworks, including this one, identify the basic concepts and characteristics of mechanisms covering different aspects of security.
ISO/IEC 11770-1:2010 is classified under the following ICS (International Classification for Standards) categories: 35.030 - IT Security; 35.040 - Information coding. The ICS classification helps identify the subject area and facilitates finding related standards.
ISO/IEC 11770-1:2010 has the following relationships with other standards: It is inter standard links to EN ISO 19299:2020, CEN/TS 16439:2013, CEN ISO/TS 19299:2015, ISO/IEC 11770-1:1996. Understanding these relationships helps ensure you are using the most current and applicable version of the standard.
ISO/IEC 11770-1:2010 is available in PDF format for immediate download after purchase. The document can be added to your cart and obtained through the secure checkout process. Digital delivery ensures instant access to the complete standard document.
Standards Content (Sample)
INTERNATIONAL ISO/IEC
STANDARD 11770-1
Second edition
2010-12-01
Information technology — Security
techniques — Key management —
Part 1:
Framework
Technologies de l'information — Techniques de sécurité — Gestion de
clés —
Partie 1: Cadre général
Reference number
©
ISO/IEC 2010
PDF disclaimer
This PDF file may contain embedded typefaces. In accordance with Adobe's licensing policy, this file may be printed or viewed but
shall not be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In
downloading this file, parties accept therein the responsibility of not infringing Adobe's licensing policy. The ISO Central Secretariat
accepts no liability in this area.
Adobe is a trademark of Adobe Systems Incorporated.
Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-creation
parameters were optimized for printing. Every care has been taken to ensure that the file is suitable for use by ISO member bodies. In
the unlikely event that a problem relating to it is found, please inform the Central Secretariat at the address given below.
© ISO/IEC 2010
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means,
electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or
ISO's member body in the country of the requester.
ISO copyright office
Case postale 56 • CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.org
Web www.iso.org
Published in Switzerland
ii © ISO/IEC 2010 – All rights reserved
Contents Page
Foreword .iv
Introduction.v
1 Scope.1
2 Terms and definitions .1
3 Symbols and abbreviated terms .6
3.1 Symbols.6
3.2 Abbreviated terms.6
4 General model of key management.6
4.1 General .6
4.2 Protection of keys .7
4.2.1 General aspects of key management.7
4.2.2 Protection by cryptographic techniques .7
4.2.3 Protection by non-cryptographic techniques.7
4.2.4 Protection by physical means.7
4.2.5 Protection by organisational means .8
4.3 Generic key life cycle model .8
4.3.1 Key life cycle definitions.8
4.3.2 Transitions between key states .9
4.3.3 Transitions, services and keys .10
5 Basic concepts of key management .10
5.1 Key management services .10
5.1.1 Summary of key management services.10
5.1.2 Generate-Key (key generation) .12
5.1.3 Register-Key (key registration) .12
5.1.4 Create-Key-Certificate (key certification).12
5.1.5 Distribute-Key (key distribution).12
5.1.6 Install-Key (key installation).12
5.1.7 Store-key (key storage).12
5.1.8 Derive-Key (key derivation) .13
5.1.9 Archive-Key (key archiving) .13
5.1.10 Revoke-Key (key revocation) .13
5.1.11 Deregister-Key (key deregistration) .13
5.1.12 Destroy-Key (key destruction) .13
5.2 Support services .13
5.2.1 Key management facility services.13
5.2.2 User-oriented services.14
6 Conceptual models for key distribution for two entities.14
6.1 Introduction to key distribution .14
6.2 Key distribution between two communicating entities.14
6.3 Key distribution within one domain .15
6.4 Key distribution between two domains.16
7 Specific service providers.18
Annex A (informative) Threats to key management .19
Annex B (informative) Key management information objects .20
Annex C (informative) Classes of cryptographic applications.21
Annex D (informative) Certificate lifecycle management.23
Bibliography.30
© ISO/IEC 2010 – All rights reserved iii
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are members of
ISO or IEC participate in the development of International Standards through technical committees
established by the respective organization to deal with particular fields of technical activity. ISO and IEC
technical committees collaborate in fields of mutual interest. Other international organizations, governmental
and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information
technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1.
International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2.
The main task of the joint technical committee is to prepare International Standards. Draft International
Standards adopted by the joint technical committee are circulated to national bodies for voting. Publication as
an International Standard requires approval by at least 75 % of the national bodies casting a vote.
Attention is drawn to the possibility that some of the elements of this document may be the subject of patent
rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights.
ISO/IEC 11770-1 was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology,
Subcommittee SC 27, IT Security techniques.
This second edition cancels and replaces the first edition (ISO/IEC 11770-1:1996), which has been technically
revised.
ISO/IEC 11770 consists of the following parts, under the general title Information technology — Security
techniques — Key management:
⎯ Part 1: Framework
⎯ Part 2: Mechanisms using symmetric techniques
⎯ Part 3: Mechanisms using asymmetric techniques
⎯ Part 4: Mechanisms based on weak secrets
The following part is under preparation:
⎯ Part 5: Group key management
iv © ISO/IEC 2010 – All rights reserved
Introduction
In information technology there is an ever-increasing need to use cryptographic mechanisms for the protection
of data against unauthorised disclosure or manipulation, for entity authentication, and for non-repudiation
functions. The security and reliability of such mechanisms are directly dependent on the management and
protection afforded to a security parameter, the key. The secure management of these keys is critical to the
integration of cryptographic functions into a system, since even the most elaborate security concept will be
ineffective if the key management is weak. The purpose of key management is to provide procedures for
handling cryptographic keying material to be used in symmetric or asymmetric cryptographic mechanisms.
This part of ISO/IEC 11770 defines a general model of key management that is independent of the use of any
particular cryptographic algorithm. However, certain key distribution mechanisms may depend on particular
algorithm properties, for example, properties of asymmetric algorithms.
This part of ISO/IEC 11770 contains the material required for a basic understanding of subsequent parts.
Examples of the use of key management mechanisms are included in ISO 11568. If non-repudiation is
required for key management, ISO/IEC 13888 is applicable.
This part of ISO/IEC 11770 addresses both the automated and manual aspects of key management, including
outlines of data elements and sequences of operations that are used to obtain key management services.
However it does not specify details of protocol exchanges that might be needed.
As with other security services, key management can only be provided within the context of a defined security
policy. The definition of security policies is outside the scope of ISO/IEC 11770.
The fundamental problem is to establish keying material whose origin, integrity, timeliness and (in the case of
secret keys) confidentiality can be guaranteed to both direct and indirect users. Key management includes
functions such as the generation, storage, distribution, deletion and archiving of keying material in accordance
with a security policy (ISO 7498-2).
This part of ISO/IEC 11770 has a special relationship to the security frameworks for open systems
(ISO/IEC 10181). All the frameworks, including this one, identify the basic concepts and characteristics of
mechanisms covering different aspects of security.
© ISO/IEC 2010 – All rights reserved v
INTERNATIONAL STANDARD ISO/IEC 11770-1:2010(E)
Information technology — Security techniques — Key
management —
Part 1:
Framework
1 Scope
This part of ISO/IEC 11770
a) establishes the general model on which key management mechanisms are based,
b) defines the basic concepts of key management which are common to all the parts of ISO/IEC 11770,
c) specifies the characteristics of key management services,
d) establishes general principles on the management of keying material during its life cycle, and
e) establishes the conceptual model of key distribution.
2 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
2.1
asymmetric cryptographic technique
cryptographic technique that uses two related transformations, a public transformation (defined by the public
key) and a private transformation (defined by the private key)
NOTE The two transformations have the property that, given the public transformation, it is computationally infeasible
to derive the private transformation.
2.2
asymmetric key pair
pair of related keys where the private key defines the private transformation and the public key defines the
public transformation
[ISO/IEC 11770-3:2008]
2.3
certification authority
entity trusted to create and assign public key certificates
2.4
data integrity
property that data has not been altered or destroyed in an unauthorized manner
[ISO 7498-2:1989]
© ISO/IEC 2010 – All rights reserved 1
2.5
data origin authentication
corroboration that the source of data received is as claimed
[ISO 7498-2:1989]
2.6
decryption
reversal of a corresponding encryption
NOTE Decryption [ISO/IEC 18033-1] and decipherment [ISO/IEC 9798-1] are equivalent terms.
2.7
digital signature
data appended to, or a cryptographic transformation of, a data unit that allows a recipient of the data unit to
prove the source and integrity of the data unit and protect against forgery e.g. by the recipient
[ISO/IEC 9798-1:1997]
2.8
directory maintenance authority
entity responsible for making the public key certificates available online for ready use by the user entities
2.9
distinguishing identifier
information which unambiguously distinguishes an entity
2.10
encryption
(reversible) transformation of data by a cryptographic algorithm to produce ciphertext, i.e., to hide the
information content of the data
NOTE Encryption [ISO/IEC 18033-1] and encipherment [ISO/IEC 9798-1] are equivalent terms.
2.11
entity authentication
corroboration that an entity is the one claimed
[ISO/IEC 9798-1:1997]
2.12
key
sequence of symbols that controls the operation of a cryptographic transformation (e.g., encryption, decryption,
cryptographic check function computation, signature generation, or signature verification)
2.13
key agreement
process of establishing a shared secret key between entities in such a way that neither of them can
predetermine the value of that key
2.14
key archiving
service which provides a secure, long-term storage of keys after normal use
2.15
key certification
service which assures the association of a public key with an entity
2 © ISO/IEC 2010 – All rights reserved
2.16
key confirmation
assurance for one entity that another identified entity is in possession of the correct key
2.17
key control
ability to choose the key, or the parameters used in the key computation
2.18
key deregistration
procedure provided by a key registration authority that removes the association of a key with an entity
2.19
key derivation
service which forms a potentially large number of keys using a secret original key called the derivation key,
non-secret variable data and a secure transformation process
2.20
key destruction
service for the secure destruction of keys that are no longer needed
2.21
key distribution
service which securely provides key management information objects to authorized entities
2.22
key distribution centre
entity that is trusted to generate or acquire keys and to distribute the keys to communicating parties and that
shares a unique symmetric key with each of the parties
2.23
key establishment
process of making available a shared key to one or more entities, where the process includes key agreement
or key transport
[ISO/IEC 11770-3:2008]
2.24
key generation
process of generating a key
2.25
key generator
entity responsible for generation of an asymmetric key pair
2.26
key installation
service which securely establishes a key within a key management facility in a manner that protects it from
compromise
2.27
keying material
data necessary to establish and maintain cryptographic keying relationships
EXAMPLES Keys, initialization values.
© ISO/IEC 2010 – All rights reserved 3
2.28
key management
administration and use of generation, registration, certification, deregistration, distribution, installation, storage,
archiving, revocation, derivation and destruction of keying material in accordance with a security policy
2.29
key registration
service which associates a key with an entity
2.30
key revocation
service which assures the secure deactivation of a key
2.31
key storage
service which provides secure storage of keys intended for current or near-term use or for backup
2.32
key translation centre
entity trusted to decrypt a key that was generated and encrypted by one party and re-encrypt it for another
party
2.33
key transport
process of transferring a key from one entity to another entity, suitably protected
[ISO/IEC 11770-3:2008]
2.34
personal identification number
secret number sequence used for entity authentication, which is a memorized weak secret
2.35
private key
key of an entity's asymmetric key pair that is kept private
NOTE The security of an asymmetric system depends on the privacy of this key.
2.36
public key
key of an entity’s asymmetric key pair which can usually be made public without compromising security
2.37
public key certificate
public key information of an entity signed by the certification authority
2.38
public key information
information containing at least the entity’s distinguishing identifier and public key, but which can include other
static information regarding the certification authority, the entity, restrictions on key usage, the validity period,
or the involved algorithms
[ISO/IEC 11770-3:2008]
2.39
random number
random bit
time variant parameter whose value is unpredictable
4 © ISO/IEC 2010 – All rights reserved
2.40
registration authority
entity responsible for providing assured user identities to the certification authority
2.41
secret key
key used with symmetric cryptographic techniques and usable only by a set of specified entities
2.42
security authority
entity that is responsible for the definition, implementation or enforcement of security policy
[ISO/IEC 10181-1:1996]
2.43
security domain
set of elements, security policy, security authority and set of security-relevant activities in which the set of
elements are subject to the security policy for the specified activities, and the security policy is administered
by the security authority for the security domain
[ISO/IEC 10181-1:1996]
2.44
sequence number
time variant parameter whose value is taken from a specified sequence which is non-repeating within a certain
time period
2.45
symmetric cryptographic technique
cryptographic technique that uses the same secret key for both the originator’s and the recipient’s
transformation
NOTE Without knowledge of the secret key, it is computationally infeasible to compute either the originator’s or the
recipient’s transformation.
2.46
time stamp
data item which denotes a point in time with respect to a common time reference
[ISO/IEC 11770-3:2008]
2.47
time variant parameter
data item such as a random number, a sequence number, or a time stamp
[ISO/IEC 11770-3: 2008]
2.48
trusted third party
security authority or its agent that is trusted with respect to some security-relevant activities (in the context of a
security policy)
[ISO/IEC 10181-1:1996]
© ISO/IEC 2010 – All rights reserved 5
3 Symbols and abbreviated terms
3.1 Symbols
A, B distinguishing identifiers of entities
CA Certification Authority
DIR Directory Maintenance Authority
KDC Key Distribution Centre
KG Key Generator
KTC Key Translation Centre
RA Registration Authority
S Signature key of entity A
A
V Verification key of entity A
A
X distinguishing identifier of authority
3.2 Abbreviated terms
CA Certification Authority
MAC Message Authentication Code
PIN Personal Identification Number
RA Registration Authority
TTP Trusted Third Party
TVP Time Variant Parameter
4 General model of key management
4.1 General
The objective of key management is the secure administration and use of key management services and
therefore the protection of keys is extremely important.
Key management procedures depend on the underlying cryptographic mechanisms, the intended use of the
key and the security policy in use. Key management also includes those functions that are executed in
cryptographic devices.
6 © ISO/IEC 2010 – All rights reserved
4.2 Protection of keys
4.2.1 General aspects of key management
Keys are a critical part of any security system that relies on cryptographic techniques. The appropriate
protection of keys depends on a number of factors, such as the type of application for which the keys are used,
the threats they face, the different states the keys may assume, etc. Primarily, depending upon the
cryptographic technique, they have to be protected against disclosure, modification, destruction and replay.
Examples of possible threats to keys are given in Annex A. More than one of the following protection
techniques may be required to protect against these threats. The validity of a key shall be limited in time and
amount of use. These constraints are governed by the time and amount of data required to conduct a key-
recovery attack and the strategic value of the secured information over time. Keys that are used to generate
keys need more protection than the generated keys. Another important aspect of the protection of keys is
avoidance of their misuse, e.g., use of a key for key encryption to encrypt data.
4.2.2 Protection by cryptographic techniques
Some threats to keying material can be countered using cryptographic techniques. For example: encryption
counters key disclosure and unauthorised use; data integrity mechanisms counter modification; data origin
authentication mechanisms, digital signatures, and entity authentication mechanisms counter masquerade.
For encryption algorithm standards, refer to ISO/IEC 18033. For data integrity mechanisms, refer to
ISO/IEC 9796, ISO/IEC 9797, ISO/IEC 10118 and ISO/IEC 14888. For digital signatures, refer to
ISO/IEC 9796 and ISO/IEC 14888. For entity authentication mechanisms, refer to ISO/IEC 9798.
Cryptographic separation mechanisms counter misuse. Such separation of functional use may be
accomplished by binding information to the key. For example: binding control information to the key assures
that specific keys are used for specific tasks (e.g. key encryption, data integrity); key control is required for
non-repudiation using symmetric techniques. For non-repudiation using symmetric techniques, refer to
ISO/IEC 13888-2.
4.2.3 Protection by non-cryptographic techniques
Time stamps may be used to restrict the use of keys to certain valid time periods. Together with sequence
numbers, they also protect against the replay of recorded key agreement information. For time stamps, refer
to ISO/IEC 18014.
4.2.4 Protection by physical means
A cryptographic device within a secure system will typically need to protect the keying material it uses against
the threats of modification, deletion and, except for public keys, disclosure. The device typically provides a
secure area for key storage, key use and cryptographic algorithm implementation. It may provide the means to
⎯ load keying material from a separate secure key storage device,
⎯ interact with cryptographic algorithms implemented in separate security facilities (for example, smart
cards), or
⎯ store keying material off-line (for example, on memory cards).
Secure areas are typically protected by physical security mechanisms. Physical security mechanisms may
include passive mechanisms preventing direct access to the secure area as well as active tamper detection
mechanisms that destroy key material in the event of possible intrusion to the secure area. The physical
security mechanisms employed will depend on the strategic value of the secured keys over time. Security
protection for cryptographic devices is standardized in ISO/IEC 19790.
© ISO/IEC 2010 – All rights reserved 7
4.2.5 Protection by organisational means
One means of protecting keys is to organise them into a key hierarchy. Except at the lowest level of the
hierarchy, keys in one level of a hierarchy are used solely to protect keys in the next level down. Only keys in
the lowest level of the hierarchy are used directly to provide data security services. This hierarchical approach
allows the use of each key to be limited, thus limiting exposure and making attacks difficult. For example, the
effect of the compromise of a single session key is limited to compromising only the information protected by
that key.
Allowing people to have access to keys can cause significant problems in terms of being able to prevent
disclosure and (particularly for non-repudiation) to prove that the key can not have been misused. Keys should
only be available in plaintext when inside secure devices. If they shall be exported, then special measures
should be used such as dividing the key into components and not allowing one person to access all
components.
Use of a key shall also be controlled, to prevent its use in a manner that might divulge the key or the data it
protects.
4.3 Generic key life cycle model
4.3.1 Key life cycle definitions
A cryptographic key will progress through a series of states that define its life cycle. The three principal states
are:
⎯ Pending Active: In the Pending Active state, a key has been generated, but has not been activated for
use.
⎯ Active: In the Active state, the key is used to process data cryptographically, or to decrypt or verify
processed data.
⎯ Post Active: In this state, the key shall only be used for decryption or verification.
A key that is known to be compromised shall become Post Active immediately and shall not be trusted for any
other purpose than decrypting or verifying data that was processed prior to the compromise. In particular, a
compromised key shall not be reactivated.
A key is said to be compromised when it has been determined to have been subjected to unauthorized access
or control.
Figure 1 shows these states and the corresponding transitions. Figure 1 represents a generic life cycle model.
Other life cycle models may have additional details that may be sub-states of the three states presented. The
majority of life cycles require an archival activity. This activity may be associated with any of the states,
depending on the particular details of the life cycle.
8 © ISO/IEC 2010 – All rights reserved
Generation
Destruction
Pending
Active
Activation
Active
Deactivation
Reactivation
Destruction
Post
Active
Figure 1 — Key life cycle
4.3.2 Transitions between key states
When a key progresses from one state to another, it undergoes one of the following transitions, as depicted in
Figure 1:
⎯ Generation is the process of generating a key. Key generation should be performed according to
prescribed key generation rules; the process may involve a test procedure to verify whether these rules
have been followed. It should be noted that during key generation a source of unpredictable random
numbers is of the utmost importance, otherwise even the strongest algorithms cannot provide adequate
protection. For guidance on random number generation, refer to ISO/IEC 18031.
⎯ Activation makes a key valid for cryptographic operations.
⎯ Deactivation limits a key’s use. This might occur because the key has expired or has been revoked.
⎯ Reactivation allows a Post Active key to be used again for cryptographic operations.
⎯ Destruction ends a key’s life cycle. It covers logical destruction of the key and may also involve its
physical destruction.
Transitions may be triggered by events such as the need for new keys, the compromise of a key, the expiry of
a key, and the completion of the key life cycle. All these transitions include a number of services for key
management.
© ISO/IEC 2010 – All rights reserved 9
4.3.3 Transitions, services and keys
Keys for particular cryptographic techniques will use different combinations of services during their life cycles.
Two examples are given below.
For symmetric cryptographic techniques, following the generation of a key, the transition from Pending Active
to Active includes key installation and may also include key registration and distribution. In some cases,
installation may involve the derivation of a specific key. The lifetime of a key should be limited to a fixed period.
Deactivation ends the Active state, usually upon expiry. If compromise of a key in the Active state is
suspected or known, revocation also causes it to enter the Post Active state. A Post Active key may be
archived. If an archived key is needed again, it will be reactivated and may need to be installed or distributed
again before it is fully active. Otherwise, following deactivation, the key may be deregistered and destroyed.
For asymmetric cryptographic techniques, a pair of keys (public and private) is generated and both keys enter
the Pending Active state. Note that the life cycles of the two keys are related but not identical. Before it enters
the Active state, a private key may optionally be registered, may optionally be distributed to its user, and is
always installed. The transitions between the Active and the Post Active states for a private key, including
deactivation, reactivation, and destruction, are similar to those described above for symmetric keys. When a
public key is certified, commonly a certificate containing the public key is created by the CA, to assure the
validity and ownership of the public key. This public key certificate may be placed in a directory or other similar
service for distribution, or may be passed back to the owner for distribution. When the owner sends out data
signed with his private key he may add his certificate. The key pair becomes active when the public key is
certified. When a key pair is used for digital signature purposes the public key may remain in the Active or
Post Active state for an indefinite time after its related private key has been deactivated or destroyed. Access
to the public key may be necessary to verify digital signatures made before the original expiry date of the
associated private key. When asymmetric techniques are used to implement confidentiality services and the
key used for encryption has been deactivated or destroyed, the corresponding key of the pair may remain in
the Active or Post Active state for later decryption.
Therefore, for signature keys the public part of the key will remain in the Active or Post Active state and for
encryption keys the private part of the key will remain in the Active or Post Active state.
The use or application of a key may determine the services for that key. For example, a system may decide
not to register session keys, since the registration process may last longer than their lifetime. By contrast, it is
necessary to register a secret key when symmetric techniques are used for digital signature.
5 Basic concepts of key management
5.1 Key management services
5.1.1 Summary of key management services
Key management is the administration and use of the services of generation, registration, certification,
deregistration, distribution, installation, storage, archiving, revocation, derivation and destruction of keying
material.
Key management relies on the basic services of generation, registration, certification, distribution, installation,
storage, derivation, archiving, revocation, deregistration and destruction. These services may be part of a key
management system or be provided by other service providers. Depending on the kind of service, the service
provider shall fulfill certain minimum security requirements (e.g., secure exchange) to be trusted by all entities
involved. For example, the service provider may be a trusted third party (TTP). Figure 2 shows that the key
management services are positioned at the same level and may be used by a variety of different users
(persons or processes). These users may utilise different key management facilities within different
applications, making use of services specific to their needs. The key management services are listed in
Table 1.
10 © ISO/IEC 2010 – All rights reserved
Generate- Register- Create- Distribute- Destroy-
Key Key Key- Key Key
Certificate
User 1
User x
Figure 2 — Key management services
The relationships between the transitions and the services are shown in Table 1. These services are
explained below. Any particular cryptographic approach will only require a subset of the services offered in
Table 1.
Table 1 — Transitions and services
Transitions Services Notes
(Refer to Figure 1)
Generation Generate-Key Mandatory
Derive-Key Optional
Register-Key Optional either in here or in Activation
Create-Key-Certificate Optional
Distribute-Key Optional
Store-Key Optional
Activation Create-Key-Certificate Optional
Distribute-Key Optional
Derive-Key Optional
Install-Key Mandatory
Store-Key Optional
Register-Key Optional either in here or in Generation
Deactivation Store-Key Optional
Archive-Key Optional either in here or in Destruction
Revoke-Key Optional
Reactivation Create-Key-Certificate Optional
Distribute-Key Optional
Derive-Key Optional
Install-Key Mandatory
Store-Key Optional
Destruction Deregister-Key Mandatory, if registered
Destroy-Key Mandatory
Archive-Key Optional either in here or in Deactivation
© ISO/IEC 2010 – All rights reserved 11
5.1.2 Generate-Key (key generation)
Generate-Key is a service that is invoked to generate keys in a secure way for a particular cryptographic
algorithm. This implies that the key generation cannot be manipulated and, that the keys are generated in an
unpredictable way and according to a prescribed distribution. This distribution is imposed by the cryptographic
algorithm for which it will be used and the required level of cryptographic protection. The generation of some
keys, e.g., master keys, demands special care because knowledge of these keys offers access to all related
or derived keys.
Key generation always involves random number generators. It is essential that random number generators not
only generate random numbers that are unpredictable, but also that they generate random numbers that will
span the entire key space of the algorithm in a uniform way. For instance, if a random number generator input
into key generation routines effectively only generates 32 bits of entropy while it generates keys for a 128-bit
symmetrical algorithm, the key generation process is flawed. For guidance on random number generation,
refer to ISO/IEC 18031.
5.1.3 Register-Key (key registration)
The service Register-Key associates a key with an entity. It is provided by a registration authority, and is
usually applied when asymmetric cryptographic techniques are used. When an entity wishes to register a key
it has to contact the registration authority. Key registration involves a request for registration and a
confirmation of that registration.
A registration authority maintains a register of keys and related information in a suitably secure manner.
Annex B offers details of key management information.
Operations provided by a key registration authority are registration and deregistration.
5.1.4 Create-Key-Certificate (key certification)
The service Create-Key-Certificate assures the association of a public key with an entity and is provided by a
certification authority. When a request for key certification is accepted, the certification authority creates a key
certificate. Public key certificates are discussed in more detail in ISO/IEC 11770-3.
5.1.5 Distribute-Key (key distribution)
Key distribution is a set of procedures to provide key management information objects (see example in
Annex B) securely to authorised entities. A specific case of key distribution is key translation where keying
material is established between entities using a Key Translation Centre (see 6.3). ISO/IEC 11770-2 offers
different mechanisms to establish keys between entities. ISO/IEC 11770-3 includes mechanisms for key
agreement of secret keys and transport mechanisms for secret and public keys.
5.1.6 Install-Key (key installation)
The service Install-Key is always needed before the use of a key. The installation of the key means the
establishment of the key within a key management facility in a manner that protects it from compromise. In the
minimum case, the only function of Install-Key is to mark the key as 'in use'.
5.1.7 Store-key (key storage)
The service Store-Key provides secure storage of keys intended for current or near-term use or for backup. It
is usually advantageous to provide physically separate key storage. For example, it ensures confidentiality
and integrity for keying material or integrity for public keys. Storage may occur in all key states (i.e. Pending
Active, Active and Post Active) of a key’s life cycle. Depending on the importance of the keys, they can be
protected using one of the following mechanisms:
⎯ physical security (e.g., by storing them within a tamper-resistant device or by external means such as a
memory card),
⎯ encryption with keys that are themselves protected by physical security, or
12 © ISO/IEC 2010 – All rights reserved
⎯ protecting the access to them by password or PIN.
For all keying material, any attempted compromise should be detectable. Generally it is difficult to detect
attempted key compromise when protection is purely based on a password / PIN stored in software. In such a
case the protected keys can be copied and password / PIN cracking can take place offline which is virtually
impossible to detect. For such cases other procedural security measures shall be considered, depending on
the application.
5.1.8 Derive-Key (key derivation)
The service Derive-Key forms a potentially large number of keys using a secret original key called the
derivation key, non-secret variable data and a transformation process (which also need not be secret). The
result of this process is the derived key. The derivation key needs special protection. The derivation process
should be non-reversible and non-predictable to ensure that the compromise of a derived key does not
disclose the derivation key or any other derived key.
5.1.9 Archive-Key (key archiving)
Key archiving provides a process for the secure, long-term storage of keys after normal use. It may use the
service of key storage but allows for a different implementation such as off-line storage. Archived keys may
need to be retrieved at a much later date to prove or disprove certain claims after normal use has been
discontinued.
5.1.10 Revoke-Key (key revocation)
When the compromise of a key is suspected or known, the service Revoke-Key assures the secure
deactivation of the key. This service is also necessary for keys having reached their expiry date. Revocation of
keys may also take place when a key owner’s circumstances change. After a key is revoked it shall only be
used for decryption and verification. In the case of a key being revoked because of compromise, only data
processed prior to the compromise may be decrypted or verified.
NOTE Some applications use the term Delete-Key for this service.
5.1.11 Deregister-Key (key deregistration)
The service Deregister-Key is a procedure provided by a key registration authority that removes the
association of a key with an entity. It is part of the destruction process (see 5.1.12 Destroy-Key).
5.1.12 Destroy-Key (key destruction)
The service Destroy-Key provides a process for the secure destruction of keys that are no longer needed.
Destroying a key means eliminating all records of this key management information object, such that no
information remaining after the destruction provides any means of recovering the destroyed key. This is taken
to include the destruction of all archived copies. However, before archived keys are destroyed a check shall
be carried out to ensure that no archived material protected by these keys will ever be needed again.
Some keys may be stored outside an electronic device or system. Destruction of those keys requires
additional administrative measures.
5.2 Support services
5.2.1 Key management facility services
Key management services can make use of other services that are security related. These services include:
⎯ Access control
This service is to ensure that the resources of a key management system can be accessed only by
authorised entities in an authorised manner.
© ISO/IEC 2010 – All rights reserved 13
⎯ Audit
This service is for tracking of security-relevant actions that appear in a key management system. Audit
trails can help identify security risks and security leaks.
⎯ Authentication
This service is to establish an entity as an authorised member of a security domain.
⎯ Cryptographic services
These services are used by key management services to provide integrity, confidentiality, authentication
and non-repudiation.
⎯ Time service
This service is for generating time variant parameters (TVPs) such as validity durations.
5.2.2 User-oriented services
There are services that are necessary for adequate functionality, e.g., user registration services. These
services are implemen
...




Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.
Loading comments...