BS ISO/IEC 11770-4:2017+A2:2021 PDF

BS ISO/IEC 11770-4:2017+A2:2021 PDF

Name:
BS ISO/IEC 11770-4:2017+A2:2021 PDF

Published Date:
02/24/2021

Status:
Active

Description:

Information technology. Security techniques. Key management-Mechanisms based on weak secrets

Publisher:
British Standard / ISO/IEC

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
$119.634
Need Help?
This document defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It specifies cryptographic techniques specifically designed to establish one or more secret keys based on a weak secret derived from a memorized password, while preventing offline brute-force attacks associated with the weak secret.

Incorporates the following:
BS ISO/IEC 11770-4:2017+A1:2019
File Size : 1 file , 3.5 MB
ISBN(s) : 9780539033045
Note : This product is unavailable in Russia, Ukraine, Belarus
Number of Pages : 108
Product Code(s) : 30388551, 30388551, 30388551
Published : 02/24/2021

History

BS ISO/IEC 11770-4:2017+A2:2021
Published Date: 02/24/2021
Information technology. Security techniques. Key management-Mechanisms based on weak secrets
$119.634
BS ISO/IEC 11770-4:2017+A1:2019
Published Date: 10/24/2019
Information technology. Security techniques. Key management-Mechanisms based on weak secrets
$119.634
BS ISO/IEC 11770-4:2017
Published Date: 11/30/2017
Information technology. Security techniques. Key management-Mechanisms based on weak secrets
$110.49
BS ISO/IEC 11770-4:2006
Published Date: 08/31/2010
Information technology. Security techniques. Key management-Mechanisms based on weak secrets
$92.964

Related products

BS ISO/IEC 18028-4:2005
Published Date: 06/10/2005
Information technology. Security techniques. IT network security-Securing remote access
$110.49
BS ISO/IEC 20009-4:2017
Published Date: 08/22/2017
Information technology. Security techniques. Anonymous entity authentication-Mechanisms based on weak secrets
$79.248

Best-Selling Products

ISO/IEC ISP 10607-1:1995
Published Date: 12/01/1995
Information technology - International Standardized Profiles AFTnn - File Transfer, Access and Management - Part 1: Specification of ACSE, Presentation and Session protocols for the use by FTAM
$21.9
ISO/IEC ISP 10607-2:1995
Published Date: 12/01/1995
Information technology - International Standardized Profiles AFTnn - File Transfer, Access and Management - Part 2: Definition of document types, constraint sets and syntaxes
$50.1
ISO/IEC ISP 10607-3:1995
Published Date: 12/01/1995
Information technology - International Standardized Profiles AFTnn - File Transfer, Access and Management - Part 3: AFT11 - Simple File Transfer Service (unstructured)
$34.8
ISO/IEC ISP 10607-4:1995
Published Date: 12/01/1995
Information technology - International Standardized Profiles AFTnn - File Transfer, Access and Management - Part 4: AFT12 - Positional File Transfer Service (flat)
$42.3
ISO/IEC ISP 10607-5:1995
Published Date: 12/01/1995
Information technology - International Standardized Profiles AFTnn - File Transfer, Access and Management - Part 5: AFT22 - Positional File Access Service (flat)
$42.3
ISO/IEC ISP 10607-6:1995
Published Date: 12/01/1995
Information technology - International Standardized Profiles AFTnn - File Transfer, Access and Management - Part 6: AFT3 - File Management Service
$25.8