{"id":631990,"date":"2024-11-06T00:36:01","date_gmt":"2024-11-06T00:36:01","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/iso-iec-11770-42006\/"},"modified":"2024-11-06T00:36:01","modified_gmt":"2024-11-06T00:36:01","slug":"iso-iec-11770-42006","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/iso\/iso-iec-11770-42006\/","title":{"rendered":"ISO\/IEC 11770-4:2006"},"content":{"rendered":"

ISO\/IEC 11770-4:2006 defines key establishment mechanisms based on weak secrets, i.e., secrets that can be readily memorized by a human, and hence secrets that will be chosen from a relatively small set of possibilities. It specifies cryptographic techniques specifically designed to establish one or more secret keys based on a weak secret derived from a memorized password, while preventing off-line brute-force attacks associated with the weak secret. More specifically, these mechanisms are designed to achieve one of the following three goals.<\/p>\n