Norm

ISO/IEC DIS 11770-4:2016 en

Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets

  • Deze norm is niet direct leverbaar vanuit de NEN-shop.
    Wilt u dit product bestellen neemt u dan contact op met NEN-klantenservice: (015) 2 690 391 of klantenservice@nen.nl

Over deze norm

Status Ontwerp
Aantal pagina's 48
Commissie Informatiebeveiliging, Cyber security en Privacy
Gepubliceerd op 31-07-2016
Taal Engels
This part of ISO/IEC 11770 defines key establishment mechanisms based on weak secrets, i.e., secrets that can be readily memorized by a human, and hence secrets that will be chosen from a relatively small set of possibilities. It specifies cryptographic techniques specifically designed to establish one or more secret keys based on a weak secret derived from a memorized password, while preventing off-line brute-force attacks associated with the weak secret. More specifically, these mechanisms are designed to achieve one of the following three goals.

Details

ICS-code 35.030
35.040
Nederlandse titel Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets
Engelse titel Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets
Vervangt

Winkelwagen

Subtotaal:

Ga naar winkelwagen