Phone: (011) 7541-421, 3409-301, 3409-335, 6547-293, 3409-310
E-mail: Standards sales: prodaja@iss.rs Education: iss-edukacija@iss.rs Information about standards: infocentar@iss.rs
Stevana Brakusa 2, 11030 Beograd
Main menu

ISO/IEC 11770-4:2017

Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets

Nov 17, 2017

General information

90.92     Oct 27, 2023

ISO/IEC

ISO/IEC JTC 1/SC 27

International Standard

35.030  

English  

Buying

Published

Language in which you want to receive the document.

Scope

ISO/IEC 11770-4:2017 defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It specifies cryptographic techniques specifically designed to establish one or more secret keys based on a weak secret derived from a memorized password, while preventing offline brute-force attacks associated with the weak secret. ISO/IEC 11770-4:2017 is not applicable to the following aspects of key management:
- life-cycle management of weak secrets, strong secrets, and established secret keys;
- mechanisms to store, archive, delete, destroy, etc. weak secrets, strong secrets, and established secret keys.

Life cycle

PREVIOUSLY

WITHDRAWN
ISO/IEC 11770-4:2006

WITHDRAWN
ISO/IEC 11770-4:2006/Cor 1:2009

NOW

PUBLISHED
ISO/IEC 11770-4:2017
90.92 Standard to be revised
Oct 27, 2023

CORRIGENDA / AMENDMENTS

PUBLISHED
ISO/IEC 11770-4:2017/Amd 1:2019

PUBLISHED
ISO/IEC 11770-4:2017/Amd 2:2021

REVISED BY

PROJECT
ISO/IEC CD 11770-4

National adoptions

Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets

90.92   Standard to be revised

I224 more