Shopping Cart

No products in the cart.

ISO/IEC 11770-4:2017

$46.15

Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets

Published By Publication Date Number of Pages
ISO 2017-11 56
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

ISO/IEC 11770-4:2017 defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It specifies cryptographic techniques specifically designed to establish one or more secret keys based on a weak secret derived from a memorized password, while preventing offline brute-force attacks associated with the weak secret. ISO/IEC 11770-4:2017 is not applicable to the following aspects of key management:

– life-cycle management of weak secrets, strong secrets, and established secret keys;

– mechanisms to store, archive, delete, destroy, etc. weak secrets, strong secrets, and established secret keys.

ISO/IEC 11770-4:2017
$46.15