ISO/IEC 11770-4:2017 Preview

Information technology -- Security techniques -- Key management -- Part 4: Mechanisms based on weak secrets

ISO/IEC 11770-4:2017 defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It specifies cryptographic techniques specifically designed to establish one or more secret keys based on a weak secret derived from a memorized password, while preventing offline brute-force attacks associated with the weak secret. ISO/IEC 11770-4:2017 is not applicable to the following aspects of key management:

- life-cycle management of weak secrets, strong secrets, and established secret keys;

- mechanisms to store, archive, delete, destroy, etc. weak secrets, strong secrets, and established secret keys.


General information

  • Status :  Published
    Publication date : 2017-11
  • Edition : 2
    Number of pages : 48
  • :
    ISO/IEC JTC 1/SC 27
    Information Security, cybersecurity and privacy protection
  • 35.030
    IT Security

Buy this standard

Format Language
PDF + ePub
Paper
  • CHF158

Got a question?

Check out our FAQs

Customer care
+41 22 749 08 88

Opening hours:
Monday to Friday - 09:00-12:00, 14:00-17:00 (UTC+1)

Keep up to date with ISO

Sign up to our newsletter for the latest news, views and product information

Subscribe