BS ISO/IEC 11770-4:2017 PDF

BS ISO/IEC 11770-4:2017 PDF

Name:
BS ISO/IEC 11770-4:2017 PDF

Published Date:
11/30/2017

Status:
Active

Description:

Information technology. Security techniques. Key management-Mechanisms based on weak secrets

Publisher:
British Standard / ISO/IEC

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
$110.49
Need Help?
BS ISO/IEC 11770-4:2017 defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It specifies cryptographic techniques specifically designed to establish one or more secret keys based on a weak secret derived from a memorized password, while preventing offline brute-force attacks associated with the weak secret. This document is not applicable to the following aspects of key management:
  • life-cycle management of weak secrets, strong secrets, and established secret keys;
  • mechanisms to store, archive, delete, destroy, etc. weak secrets, strong secrets, and established secret keys.


Cross References:
ISO/IEC 9797-2
ISO/IEC 11770-3
ISO/IEC 18032
ISO/IEC 10118-3
ISO/IEC 8825-1
IEEE P1363:2000
IEEE P1363.2/D21:2005-07-17
ISO/IEC 18033-2
ISO/IEC 15946-1
ISO/IEC 18031


All current amendments available at time of purchase are included with the purchase of this document.
File Size : 1 file , 2.6 MB
ISBN(s) : 9780580929632
Note : This product is unavailable in Russia, Ukraine, Belarus
Number of Pages : 56
Product Code(s) : 30335689, 30335689, 30335689
Published : 11/30/2017
Same As : BS ISO/IEC 11770-4:2017

History

BS ISO/IEC 11770-4:2017+A2:2021
Published Date: 02/24/2021
Information technology. Security techniques. Key management-Mechanisms based on weak secrets
$119.634
BS ISO/IEC 11770-4:2017+A1:2019
Published Date: 10/24/2019
Information technology. Security techniques. Key management-Mechanisms based on weak secrets
$119.634
BS ISO/IEC 11770-4:2017
Published Date: 11/30/2017
Information technology. Security techniques. Key management-Mechanisms based on weak secrets
$110.49
BS ISO/IEC 11770-4:2006
Published Date: 08/31/2010
Information technology. Security techniques. Key management-Mechanisms based on weak secrets
$92.964

Related products

BS ISO/IEC 14888-2:2008
Published Date: 10/31/2015
Information technology. Security techniques. Digital signatures with appendix-Integer factorization based mechanisms
$119.634
BS ISO/IEC 18014-1:2008
Published Date: 12/31/2008
Information technology. Security techniques. Time- stamping services-Framework
$92.964

Best-Selling Products

VDI/VDE 2032
Published Date: 12/01/1975
Rolling and roller burnishing
VDI/VDE 2041
Published Date: 04/01/1991
Measurement of fluid flow with primary devices; orifice plates and nozzles for special applications
VDI/VDE 2173
Published Date: 09/01/2007
Fluidic characteristic quantities of control valves and their determination
VDI/VDE 2176
Published Date: 09/01/2007
Fluidic characteristic quantities of vanes and their determination
VDI/VDE 2177
Published Date: 07/01/1970
Description and inspection of position controllers with pneumatic gate
VDI/VDE 2178 - DRAFT
Published Date: 08/01/2008
Draft Document - Fluidic characteristic quantities of quarter turn valves and their determination