This document defines key establishment mechanisms based on weak secrets, i.e. secrets that can be
readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of
possibilities. It specifies cryptographic techniques specifically designed to establish one or more secret
keys based on a weak secret derived from a memorized password, while preventing offline brute-force
attacks associated with the weak secret. This document is not applicable to the following aspects of key
management:
— life-cycle management of weak secrets, strong secrets, and established secret keys;
— mechanisms to store, archive, delete, destroy, etc. weak secrets, strong secrets, and established
secret keys.
Cross References:IEC 15946-1
IEC 11770-3
IEEE P1363:2000
IEC 10118-3
ISO/IEC 14888-3
IEC 8825-1
IEC 9797-2
IEC 18032
ISO/IEC 18033-5
IEC 18033-2
ISO/IEC 29192-4
IEC 18031
Incorporates the following:Amendment, October 2019
| File Size : | 1
file
, 2.2 MB |
| ISBN(s) : | 9780539010794 |
| Note : | This product is unavailable in Russia, Ukraine, Belarus |
| Number of Pages : | 72 |
| Product Code(s) : | 30378067, 30378067, 30378067 |
| Published : | 10/24/2019 |