Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets (ISO/IEC 11770-4:2017)
This document defines key establishment mechanisms based on weak secrets, i.e. secrets that can bereadily memorized by a human, and hence, secrets that will be chosen from a relatively small set ofpossibilities. It specifies cryptographic techniques specifically designed to establish one or more secretkeys based on a weak secret derived from a memorized password, while preventing offline brute-forceattacks associated with the weak secret. This document is not applicable to the following aspects of keymanagement:— life-cycle management of weak secrets, strong secrets, and established secret keys — mechanisms to store, archive, delete, destroy, etc. weak secrets, strong secrets, and establishedsecret keys.
View in