IEC - International Electrotechnical Commission - ISO/IEC 11770-4:2006

Information technology -- Security techniques -- Key management -- Part 4: Mechanisms based on weak secrets

revised
Buy Now
Organization: IEC - International Electrotechnical Commission
Publication Date: 4 May 2006
Status: revised
Page Count: 33
ICS Code (IT Security): 35.030
abstract:

ISO/IEC 11770-4:2006 defines key establishment mechanisms based on weak secrets, i.e., secrets that can be readily memorized by a human, and hence secrets that will be chosen from a relatively... View More

Document History

September 6, 2019
Amendment 1 - Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets - Unbalanced Password-Authenticated Key Agreement with Identity-Based Cryptosystems (UPAKA-IBC)
A description is not available for this item.
November 17, 2017
Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets
ISO/IEC 11770-4:2017 defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small...
September 4, 2009
Corrigendum 1 - Information technology -- Security techniques -- Key management -- Part 4: Mechanisms based on weak secrets -
A description is not available for this item.
ISO/IEC 11770-4:2006
May 4, 2006
Information technology -- Security techniques -- Key management -- Part 4: Mechanisms based on weak secrets
ISO/IEC 11770-4:2006 defines key establishment mechanisms based on weak secrets, i.e., secrets that can be readily memorized by a human, and hence secrets that will be chosen from a relatively small...
Advertisement