Jetzt auswählen und bestellen
154,70 €
exkl. USt.
Konfigurieren
Norm

ISO/IEC 11770-4:2017

Ausgabedatum: 2017 11 17

Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets

ISO/IEC 11770-4:2017 defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be ch...
Weiterlesen
Gültig

ISO/IEC 11770-4:2017 defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It specifies cryptographic techniques specifically designed to establish one or more secret keys based on a weak secret derived from a memorized password, while preventing offline brute-force attacks associated with the weak secret. ISO/IEC 11770-4:2017 is not applicable to the following aspects of key management:

- life-cycle management of weak secrets, strong secrets, and established secret keys;

- mechanisms to store, archive, delete, destroy, etc. weak secrets, strong secrets, and established secret keys.

ISO/IEC 11770-4:2017
2017 11 17
Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak sec...
Norm
ISO/IEC 11770-4:2006/Cor 1:2009
2009 09 04
Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak sec...
Norm
ISO/IEC 11770-4:2006
2006 05 04
Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak sec...
Norm