ISO/IEC JTC 1/SC 27 11770-4:2017 - Key management - Part 4: Mechanisms based on weak secrets

  • Home
  • ISO/IEC JTC 1/SC 27 11770-4:2017 - Key management - Part 4: Mechanisms based on weak secrets

Click on the interactive map below or utilise the filtering interface on the side to browse the items that are currently in our Standards Watch*.

IT_general it_security software networking cloud computing other iot big data ai cybersecurity data tecnologies iso iec 27005 5g communications iso iec etsi osi it terminal application information computer grafics information coding office machine interface interconnection equipment languages used in it microprocessor system data storage services

ISO/IEC JTC 1/SC 27 11770-4:2017 - Key management - Part 4: Mechanisms based on weak secrets

Category: 
Cybersecurity
SDO: 
IEC
ISO

This document defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It specifies cryptographic techniques specifically designed to establish one or more secret keys based on a weak secret derived from a memorized password, while preventing offline brute-force attacks associated with the weak secret.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:11770:-4:ed-2:v1:en

Filter by Standard/Working group: