This document defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It specifies cryptographic techniques specifically designed to establish one or more secret keys based on a weak secret derived from a memorized password, while preventing offline brute-force attacks associated with the weak secret.
This document is not applicable to the following aspects of key management:
- life-cycle management of weak secrets, strong secrets, and established secret keys;
- mechanisms to store, archive, delete, destroy, etc. weak secrets, strong secrets, and established secret keys.
| File Size : | 1
file
, 3.1 MB |
| ISBN(s) : | 9781488318207 |
| Number of Pages : | 65 |
| Product Code(s) : | 2426692, 2426692 |
| Published : | 12/01/2018 |