ISO/IEC 11770-4:2006 PDF

ISO/IEC 11770-4:2006 PDF

Name:
ISO/IEC 11770-4:2006 PDF

Published Date:
05/01/2006

Status:
Active

Description:

Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets

Publisher:
International Organization for Standardization/International Electrotechnical Commission

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
$48.6
Need Help?

ISO/IEC 11770-4:2006 defines key establishment mechanisms based on weak secrets, i.e., secrets that can be readily memorized by a human, and hence secrets that will be chosen from a relatively small set of possibilities. It specifies cryptographic techniques specifically designed to establish one or more secret keys based on a weak secret derived from a memorized password, while preventing off-line brute-force attacks associated with the weak secret. More specifically, these mechanisms are designed to achieve one of the following three goals.

  • Balanced password-authenticated key agreement: Establish one or more shared secret keys between two entities that share a common weak secret. In a balanced password-authenticated key agreement mechanism, the shared secret keys are the result of a data exchange between the two entities, the shared secret keys are established if and only if the two entities have used the same weak secret, and neither of the two entities can predetermine the values of the shared secret keys.
  • Augmented password-authenticated key agreement: Establish one or more shared secret keys between two entities A and B, where A has a weak secret and B has verification data derived from a one-way function of A's weak secret. In an augmented password-authenticated key agreement mechanism, the shared secret keys are the result of a data exchange between the two entities, the shared secret keys are established if and only if the two entities have used the weak secret and the corresponding verification data, and neither of the two entities can predetermine the values of the shared secret keys.
  • Password-authenticated key retrieval: Establish one or more secret keys for an entity, A, associated with another entity, B, where A has a weak secret and B has a strong secret associated with A's weak secret. In an authenticated key retrieval mechanism, the secret keys, retrievable by A (not necessarily derivable by B), are the result of a data exchange between the two entities, and the secret keys are established if and only if the two entities have used the weak secret and the associated strong secret. However, although B's strong secret is associated with A's weak secret, the strong secret does not (in itself) contain sufficient information to permit either the weak secret or the secret keys established in the mechanism to be determined.

File Size : 1 file , 340 KB
Note : This product is unavailable in Russia, Ukraine, Belarus
Published : 05/01/2006
Same As : ISO/IEC 11770-4:2006

History

ISO/IEC 11770-4:2017
Published Date: 11/01/2017
Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets
$66.9
ISO/IEC 11770-4 Ed. 1.0 en CORR1:2009
Published Date: 09/04/2009
Corrigendum 1 - Information technology -- Security techniques -- Key management -- Part 4: Mechanisms based on weak secrets -
Free Download
ISO/IEC 11770-4:2006
Published Date: 05/01/2006
Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets
$48.6

Related products

ISO/IEC 9797-2:2021
Published Date: 06/01/2021
Information security - Message authentication codes (MACs) - Part 2: Mechanisms using a dedicated hash-function
$75
ISO/IEC 24762:2008
Published Date: 02/01/2008
Information technology - Security techniques - Guidelines for information and communications technology disaster recovery services
$67.2
ISO/IEC 11770-2:2018
Published Date: 10/01/2018
IT Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
$58.2

Best-Selling Products

ARMY 03101
Published Date: 12/01/1992
FORMWORK FOR CONCRETE
$9.6
ARMY ADS-37A-PRF
Published Date: 05/28/1996
ELECTROMAGNETIC ENVIRONMENTAL EFFECTS (E3) PERFORMANCE AND VERIFICATION REQUIREMENTS
$14.7
ARMY AMC P 715-17
Published Date: 03/15/1994
GUIDE FOR THE PREPARATION AND USE OF PERFORMANCE SPECIFICATIONS
$23.4
ARMY AR 1-100
Published Date: 07/27/2015
The Army Gift Program
$11.7
ARMY AR 1-15
Published Date: 01/31/2017
Civilian Aides to the Secretary of the Army
$10.2
ARMY AR 1-1
Published Date: 05/23/2016
Planning, Programming, Budgeting, and Execution
$14.1