Over deze norm
|Commissie||Informatiebeveiliging, Cyber security en Privacy|
This part of ISO/IEC 11770 defines key establishment mechanisms based on weak secrets, i.e., secrets that can be readily memorized by a human, and hence secrets that will be chosen from a relatively small set of possibilities. It specifies cryptographic techniques specifically designed to establish one or more secret keys based on a weak secret derived from a memorized password, while preventing off-line brute-force attacks associated with the weak secret. More specifically, these mechanisms are designed to achieve one of the following three goals.
|Nederlandse titel||Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets|
|Engelse titel||Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets|