CAN/CSA-ISO/IEC 11770-4:18
Current
The latest, up-to-date edition.
Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets (Adopted ISO/IEC 11770-4:2017, second edition, 2017-11)
Hardcopy , PDF
01-01-2018
CSA Preface Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the SCC Mirror Committee (SMC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T). For brevity, this Standard will be referred to as \"CAN/CSA-ISO/IEC 11770-4\" throughout. This Standard supersedes CAN/CSA-ISO/IEC 11770-4:07 (adopted ISO/IEC 11770-4:2006). At the time of publication, ISO/IEC 11770-4:2017 is available from ISO and IEC in English only. CSA Group will publish the French version when it becomes available from ISO and IEC. Scope This document defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It specifies cryptographic techniques specifically designed to establish one or more secret keys based on a weak secret derived from a memorized password, while preventing offline brute-force attacks associated with the weak secret. This document is not applicable to the following aspects of key management: — life-cycle management of weak secrets, strong secrets, and established secret keys; — mechanisms to store, archive, delete, destroy, etc. weak secrets, strong secrets, and established secret keys.
DevelopmentNote |
NEW CHILD AMD 1 2020 IS ADDED
|
DocumentType |
Standard
|
ISBN |
978-1-4883-1820-7
|
Pages |
22
|
ProductNote |
THIS STANDARD ALSO REFERS TO : IEEE P1363,IEEE P1363.2/D21. NEW CHILD AMD 1 2020 IS ADDED
|
PublisherName |
Canadian Standards Association
|
Status |
Current
|
CSA Preface Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the SCC Mirror Committee (SMC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T). For brevity, this Standard will be referred to as \"CAN/CSA-ISO/IEC 11770-4\" throughout. This Standard supersedes CAN/CSA-ISO/IEC 11770-4:07 (adopted ISO/IEC 11770-4:2006). At the time of publication, ISO/IEC 11770-4:2017 is available from ISO and IEC in English only. CSA Group will publish the French version when it becomes available from ISO and IEC. Scope This document defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It specifies cryptographic techniques specifically designed to establish one or more secret keys based on a weak secret derived from a memorized password, while preventing offline brute-force attacks associated with the weak secret. This document is not applicable to the following aspects of key management: — life-cycle management of weak secrets, strong secrets, and established secret keys; — mechanisms to store, archive, delete, destroy, etc. weak secrets, strong secrets, and established secret keys.
Standards | Relationship |
ISO/IEC 11770-4:2017 | Identical |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.