ISO/IEC-11770-4 › Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets
The following bibliographic material is provided to assist you with your purchasing decision:
Included in this current edition are the following subparts:
FOR 2ND EDITION AMENDMENT 1 SEE - Sept. 1, 2019
FOR 2ND EDITION AMENDMENT 2 SEE - Feb. 1, 2021
ISO/IEC 11770-4:2017 defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It specifies cryptographic techniques specifically designed to establish one or more secret keys based on a weak secret derived from a memorized password, while preventing offline brute-force attacks associated with the weak secret. ISO/IEC 11770-4:2017 is not applicable to the following aspects of key management:
- life-cycle management of weak secrets, strong secrets, and established secret keys;
- mechanisms to store, archive, delete, destroy, etc. weak secrets, strong secrets, and established secret keys.
To find similar documents by classification:
35.030 (IT Security Including encryption)
This document comes with our free Notification Service, good for the life of the document.
This document is available in either Paper or PDF format.
Document Number
ISO/IEC 11770-4:2017
Revision Level
2ND EDITION
Status
Current
Publication Date
Nov. 1, 2017
Committee Number
ISO/IEC JTC 1/SC 27