
ISO 11770:2017
ISO 11770:2017 Information technology – Security techniques – Key management – Part 4: Mechanisms based on weak secrets
CDN $312.00
Description
ISO/IEC 11770-4:2017 defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It specifies cryptographic techniques specifically designed to establish one or more secret keys based on a weak secret derived from a memorized password, while preventing offline brute-force attacks associated with the weak secret. ISO/IEC 11770-4:2017 is not applicable to the following aspects of key management:
– life-cycle management of weak secrets, strong secrets, and established secret keys;
– mechanisms to store, archive, delete, destroy, etc. weak secrets, strong secrets, and established secret keys.
Edition
2
Published Date
2017-11-17
Status
PUBLISHED
Pages
48
Format 
Secure PDF
Secure – PDF details
- Save your file locally or view it via a web viewer
- Viewing permissions are restricted exclusively to the purchaser
- Device limits - 3
- Printing – Enabled only to print (1) copy
See more about our Environmental Commitment
Abstract
ISO/IEC 11770-4:2017 defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It specifies cryptographic techniques specifically designed to establish one or more secret keys based on a weak secret derived from a memorized password, while preventing offline brute-force attacks associated with the weak secret. ISO/IEC 11770-4:2017 is not applicable to the following aspects of key management:
- life-cycle management of weak secrets, strong secrets, and established secret keys;
- mechanisms to store, archive, delete, destroy, etc. weak secrets, strong secrets, and established secret keys.
Previous Editions
Can’t find what you are looking for?
Please contact us at:
Related Documents
-

ISO 27006:2021 Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems
CDN $115.00 Add to cart -

ISO 27003:2017 Information technology – Security techniques – Information security management systems – Guidance
CDN $360.00 Add to cart -

ISO 27000:2018 Information technology – Security techniques – Information security management systems – Overview and vocabulary
CDN $0.00 Add to cart -

ISO 20243:2023 Information technology – Open Trusted Technology ProviderTM Standard (O-TTPS) – Part 1: Requirements and recommendations for mitigating maliciously tainted and counterfeit products
CDN $273.00 Add to cart







