ISO/IEC-11770-4 Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets

ISO/IEC-11770-4 - 2ND EDITION - CURRENT
Show Complete Document History

Document Center Inc. is an authorized dealer of ISO standards.
The following bibliographic material is provided to assist you with your purchasing decision:

Included in this current edition are the following subparts:

 2ND EDITION - Nov. 1, 2017
 FOR 2ND EDITION AMENDMENT 1 SEE - Sept. 1, 2019
 FOR 2ND EDITION AMENDMENT 2 SEE - Feb. 1, 2021

ISO/IEC 11770-4:2017 defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It specifies cryptographic techniques specifically designed to establish one or more secret keys based on a weak secret derived from a memorized password, while preventing offline brute-force attacks associated with the weak secret. ISO/IEC 11770-4:2017 is not applicable to the following aspects of key management:

- life-cycle management of weak secrets, strong secrets, and established secret keys;

- mechanisms to store, archive, delete, destroy, etc. weak secrets, strong secrets, and established secret keys.

ORDER

Price:

$216.31        


Want this as a site license?

To find similar documents by classification:

35.030 (IT Security Including encryption)

35.040 (Character sets and information coding Including coding of audio, picture, multimedia and hypermedia information, IT security techniques, encryption, bar coding, electronic signatures, etc.)

This document comes with our free Notification Service, good for the life of the document.

This document is available in either Paper or PDF format.

Document Number

ISO/IEC 11770-4:2017

Revision Level

2ND EDITION

Status

Current

Publication Date

Nov. 1, 2017

Committee Number

ISO/IEC JTC 1/SC 27