ISO/IEC 11770-4:2017 PDF

ISO/IEC 11770-4:2017 PDF

Name:
ISO/IEC 11770-4:2017 PDF

Published Date:
11/01/2017

Status:
Active

Description:

Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets

Publisher:
International Organization for Standardization/International Electrotechnical Commission

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
$66.9
Need Help?

ISO/IEC 11770-4:2017 defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It specifies cryptographic techniques specifically designed to establish one or more secret keys based on a weak secret derived from a memorized password, while preventing offline brute-force attacks associated with the weak secret. ISO/IEC 11770-4:2017 is not applicable to the following aspects of key management:

- life-cycle management of weak secrets, strong secrets, and established secret keys;

- mechanisms to store, archive, delete, destroy, etc. weak secrets, strong secrets, and established secret keys.


File Size : 1 file , 2.6 MB
Note : This product is unavailable in Russia, Ukraine, Belarus
Number of Pages : 56
Published : 11/01/2017
Same As : ISO/IEC 11770-4:2017

History

ISO/IEC 11770-4:2017
Published Date: 11/01/2017
Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets
$66.9
ISO/IEC 11770-4 Ed. 1.0 en CORR1:2009
Published Date: 09/04/2009
Corrigendum 1 - Information technology -- Security techniques -- Key management -- Part 4: Mechanisms based on weak secrets -
Free Download
ISO/IEC 11770-4:2006
Published Date: 05/01/2006
Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets
$48.6

Related products

ISO/IEC 19790:2012
Published Date: 08/15/2012
Information technology - Security techniques - Security requirements for cryptographic modules
$75

Best-Selling Products

SAC GB/T 16273.1-2008
Published Date: 07/16/2008
设备用图形符号 第1部分:通用符号
$108
SAC GB/T 16273.4-2010
Published Date: 01/10/2011
设备用图形符号 第4部分:带有箭头的符号
$99