Language:
    • Available Formats
    • Options
    • Availability
    • Priced From ( in USD )
    • Printed Edition
    • Ships in 1-2 business days
    • $223.00
    • Add to Cart

Customers Who Bought This Also Bought

 

About This Item

 

Full Description

ISO/IEC 11770-4:2017 defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It specifies cryptographic techniques specifically designed to establish one or more secret keys based on a weak secret derived from a memorized password, while preventing offline brute-force attacks associated with the weak secret. ISO/IEC 11770-4:2017 is not applicable to the following aspects of key management:

- life-cycle management of weak secrets, strong secrets, and established secret keys;

- mechanisms to store, archive, delete, destroy, etc. weak secrets, strong secrets, and established secret keys.

 

Document History

  1. ISO/IEC 11770-4:2017

    👀 currently
    viewing


    Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets

    • Most Recent
  2. ISO/IEC 11770-4 Ed. 1.0 en CORR1:2009


    Corrigendum 1 - Information technology -- Security techniques -- Key management -- Part 4: Mechanisms based on weak secrets -

    • Historical Version
  3. ISO/IEC 11770-4:2006


    Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets

    • Historical Version
 

Amendments, rulings, supplements, and errata

  1. ISO/IEC 11770-4:2017/Amd2:2021


    - Amendment 2: Leakage-resilient password-authenticated key agreement with additional stored secrets

  2. ISO/IEC 11770-4:2017/Amd1:2019


    - Amendment 1: Unbalanced Password-Authenticated Key Agreement with Identity-Based Cryptosystems (UPAKA-IBC)