Standard

ISO/IEC 11770-4:2017

Historical draft

Note: This standard has a new edition: ISO/IEC 11770-4:2017

Corrigendums and amendments are bought separately.

Language
Services

Abstract

ISO/IEC 11770-4:2017 defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It specifies cryptographic techniques specifically designed to establish one or more secret keys based on a weak secret derived from a memorized password, while preventing offline brute-force attacks associated with the weak secret. ISO/IEC 11770-4:2017 is not applicable to the following aspects of key management: - life-cycle management of weak secrets, strong secrets, and established secret keys; - mechanisms to store, archive, delete, destroy, etc. weak secrets, strong secrets, and established secret keys.

Document information

  • Standard from ISO/IEC
  • Published:
  • Edition: 2
  • Document type: IS
  • Pages
  • Publisher ISO/IEC
  • Distributor ISO/IEC
  • ICS 35.030
  • ISO TC ISO/IEC JTC 1/SC 27

Product Relations

Product life cycle