ISO/IEC JTC 1/SC 27 11770-4:2017 - Key management - Part 4: Mechanisms based on weak secrets

  • Home
  • ISO/IEC JTC 1/SC 27 11770-4:2017 - Key management - Part 4: Mechanisms based on weak secrets

Error message

User warning: The following module is missing from the file system: cascading_grants_services. For information about how to fix this, see the documentation page. in _drupal_trigger_error_with_delayed_logging() (line 1184 of /var/www/html/web/includes/bootstrap.inc).


ISO/IEC JTC 1/SC 27 11770-4:2017 - Key management - Part 4: Mechanisms based on weak secrets

SCOPE

This document defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It specifies cryptographic techniques specifically designed to establish one or more secret keys based on a weak secret derived from a memorized password, while preventing offline brute-force attacks associated with the weak secret.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:11770:-4:ed-2:v1:en

COMMITTEE / WG
WIKI WATCH

Insert here: activities, gaps, opportunities, and other user driven comments

Back to the search results