Abstract
ISO/IEC 11770-4:2017 defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It specifies cryptographic techniques specifically designed to establish one or more secret keys based on a weak secret derived from a memorized password, while preventing offline brute-force attacks associated with the weak secret. ISO/IEC 11770-4:2017 is not applicable to the following aspects of key management:
- life-cycle management of weak secrets, strong secrets, and established secret keys;
- mechanisms to store, archive, delete, destroy, etc. weak secrets, strong secrets, and established secret keys.
General information
-
Status: PublishedPublication date: 2017-11Stage: International Standard to be revised [90.92]
-
Edition: 2Number of pages: 48
-
Technical Committee :ISO/IEC JTC 1/SC 27ICS :35.030
- RSS updates
Read sample
Life cycle
-
Previously
WithdrawnISO/IEC 11770-4:2006
WithdrawnISO/IEC 11770-4:2006/Cor 1:2009
-
Now
-
00
Preliminary
-
10
Proposal
-
20
Preparatory
-
30
Committee
-
40
Enquiry
-
50
Approval
-
60
Publication
-
90
Review
-
95
Withdrawal
Corrigenda / Amendments
PublishedISO/IEC 11770-4:2017/Amd 1:2019
PublishedISO/IEC 11770-4:2017/Amd 2:2021
-
00
-
Will be replaced by
Under developmentISO/IEC WD 11770-4
Got a question?
Check out our FAQs
Opening hours:
Monday to Friday - 09:00-12:00, 14:00-17:00 (UTC+1)