UNLIMITED FREE
ACCESS
TO THE WORLD'S BEST IDEAS

SUBMIT
Already a GlobalSpec user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your GlobalSpec Experience

Finish!
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

ISO/IEC 11770-4

Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets

active, Most Current
Buy Now
Organization: ISO
Publication Date: 1 November 2017
Status: active
Page Count: 56
ICS Code (IT Security): 35.030
scope:

This document defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It specifies cryptographic techniques specifically designed to establish one or more secret keys based on a weak secret derived from a memorized password, while preventing offline brute-force attacks associated with the weak secret. This document is not applicable to the following aspects of key management:

- life-cycle management of weak secrets, strong secrets, and established secret keys;

- mechanisms to store, archive, delete, destroy, etc. weak secrets, strong secrets, and established secret keys.

Document History

February 1, 2021
Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets AMENDMENT 2: Leakage-resilient password-authenticated key agreement with additional stored secrets
A description is not available for this item.
September 1, 2019
Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets AMENDMENT 1: Unbalanced Password- Authenticated Key Agreement with Identity-Based Cryptosystems (UPAKAIBC)
A description is not available for this item.
ISO/IEC 11770-4
November 1, 2017
Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets
This document defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of...
September 15, 2009
Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets TECHNICAL CORRIGENDUM 1
A description is not available for this item.
May 1, 2006
Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets
A description is not available for this item.

References

Advertisement