BS ISO/IEC 11770-4:2017 defines key establishment mechanisms based on weak secrets, i.e. secrets that can be
readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of
possibilities. It specifies cryptographic techniques specifically designed to establish one or more secret
keys based on a weak secret derived from a memorized password, while preventing offline brute-force
attacks associated with the weak secret. This document is not applicable to the following aspects of key
management:
- life-cycle management of weak secrets, strong secrets, and established secret keys;
- mechanisms to store, archive, delete, destroy, etc. weak secrets, strong secrets, and established
secret keys.
Cross References:ISO/IEC 9797-2
ISO/IEC 11770-3
ISO/IEC 18032
ISO/IEC 10118-3
ISO/IEC 8825-1
IEEE P1363:2000
IEEE P1363.2/D21:2005-07-17
ISO/IEC 18033-2
ISO/IEC 15946-1
ISO/IEC 18031
All current amendments available at time of purchase are included with the purchase of this document. | File Size : | 1
file
, 2.6 MB |
| ISBN(s) : | 9780580929632 |
| Note : | This product is unavailable in Russia, Ukraine, Belarus |
| Number of Pages : | 56 |
| Product Code(s) : | 30335689, 30335689, 30335689 |
| Published : | 11/30/2017 |
| Same As : | BS ISO/IEC 11770-4:2017 |