Customer Service:
Mon - Fri: 8:30 am - 6 pm EST

 Most recent

ISO/IEC 11770-4:2017

Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets

ISO/IEC 11770-4:2017 defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It specifies cryptographic techniques specifically designed to establish one or more secret keys based on a weak secret derived from a memorized password, while preventing offline brute-force attacks associated with the weak secret. ISO/IEC 11770-4:2017 is not applicable to the following aspects of key management:

- life-cycle management of weak secrets, strong secrets, and established secret keys;

- mechanisms to store, archive, delete, destroy, etc. weak secrets, strong secrets, and established secret keys.


Content Provider
International Organization for Standardization [iso]


Others Also Bought

Information technology - Security techniques - Key management - Part 6: Key derivation
- Amendment 1: Blinded Diffie-Hellman key agreement
Information technology - Security techniques - Encryption algorithms - Part 4: Stream ciphers
Document History
Revises:
Included in Packages
Amendments & Corrections
ANSI Logo

As the voice of the U.S. standards and conformity assessment system, the American National Standards Institute (ANSI) empowers its members and constituents to strengthen the U.S. marketplace position in the global economy while helping to assure the safety and health of consumers and the protection of the environment.

CUSTOMER SERVICE
NEW YORK OFFICE
ANSI HEADQUARTERS