Тезис Предпросмотр
ISO/IEC 11770-4:2017 defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It specifies cryptographic techniques specifically designed to establish one or more secret keys based on a weak secret derived from a memorized password, while preventing offline brute-force attacks associated with the weak secret. ISO/IEC 11770-4:2017 is not applicable to the following aspects of key management:
- life-cycle management of weak secrets, strong secrets, and established secret keys;
- mechanisms to store, archive, delete, destroy, etc. weak secrets, strong secrets, and established secret keys.
Общая информация
-
Текущий статус : PublishedДата публикации : 2017-11
-
Версия : 2
-
Технический комитет:Information security, cybersecurity and privacy protection
-
- ICS :
-
IT Security
Приобрести данный стандарт
Формат | Язык | |
---|---|---|
PDF + ePub | ||
Бумажный |
- CHF158
Жизненный цикл
-
Ранее
WithdrawnISO/IEC 11770-4:2006
WithdrawnISO/IEC 11770-4:2006/Cor 1:2009
-
Сейчас
Исправления / Изменения
PublishedISO/IEC 11770-4:2017/Amd 1:2019
PublishedISO/IEC 11770-4:2017/Amd 2:2021
Появились вопросы?
Ознакомьтесь с FAQ
Часы работы:
Понедельник – пятница: 09:00-12:00, 14:00-17:00 (UTC+1)
Будьте в курсе актуальных новостей ИСО
Подписывайтесь на наши новости, обзоры, а также на информацию о продуктах.