Standard

ISO/IEC 11770-4:2017 en

Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets

Fully inclusive:

132,95 160,87 Incl BTW

About norm

Status Current
Number of pages 48
Committee Informatiebeveiliging, Cyber security en Privacy
Published on 01-11-2017
Language English
ISO/IEC 11770-4 defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It specifies cryptographic techniques specifically designed to establish one or more secret keys based on a weak secret derived from a memorized password, while preventing offline brute-force attacks associated with the weak secret. This document is not applicable to the following aspects of key management: - life-cycle management of weak secrets, strong secrets, and established secret keys; - mechanisms to store, archive, delete, destroy, etc. weak secrets, strong secrets, and established secret keys.

Details

ICS-code 35.030
English title Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets
Replaces
Changed by

Shopping Basket

Subtotal:

Go to shopping basket