BS ISO/IEC 11770-4:2017+A2:2021
Current
The latest, up-to-date edition.
Information technology. Security techniques. Key management Mechanisms based on weak secrets
Hardcopy , PDF
English
24-02-2021
Committee |
IST/33/2
|
DocumentType |
Standard
|
Pages |
108
|
PublisherName |
British Standards Institution
|
Status |
Current
|
Supersedes |
This document defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It specifies cryptographic techniques specifically designed to establish one or more secret keys based on a weak secret derived from a memorized password, while preventing offline brute-force attacks associated with the weak secret. This document is not applicable to the following aspects of key management:
life-cycle management of weak secrets, strong secrets, and established secret keys;
mechanisms to store, archive, delete, destroy, etc. weak secrets, strong secrets, and established secret keys.
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.