Abstract
ISO/IEC 11770-4:2017 defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It specifies cryptographic techniques specifically designed to establish one or more secret keys based on a weak secret derived from a memorized password, while preventing offline brute-force attacks associated with the weak secret. ISO/IEC 11770-4:2017 is not applicable to the following aspects of key management:
- life-cycle management of weak secrets, strong secrets, and established secret keys;
- mechanisms to store, archive, delete, destroy, etc. weak secrets, strong secrets, and established secret keys.
General information
-
Status: PublishedPublication date: 2017-11Stage: International Standard to be revised [90.92]
-
Edition: 2Number of pages: 48
-
Technical Committee :ISO/IEC JTC 1/SC 27ICS :35.030
- RSS updates
Amendments
Amendments are issued when it is found that new material may need to be added to an existing standardization document. They may also include editorial or technical corrections to be applied to the existing document.
Amendment 1
Unbalanced Password-Authenticated Key Agreement with Identity-Based Cryptosystems (UPAKA-IBC)
Edition 2019
Amendment 2
Leakage-resilient password-authenticated key agreement with additional stored secrets
Edition 2021
Life cycle
-
Previously
WithdrawnISO/IEC 11770-4:2006
WithdrawnISO/IEC 11770-4:2006/Cor 1:2009
-
Now
-
00
Preliminary
-
10
Proposal
-
20
Preparatory
-
30
Committee
-
40
Enquiry
-
50
Approval
-
60
Publication
-
90
Review
-
95
Withdrawal
Amendments
Provide additional content; available for purchase; not included in the text of the existing standard.PublishedISO/IEC 11770-4:2017/Amd 1:2019
PublishedISO/IEC 11770-4:2017/Amd 2:2021
-
00
-
Will be replaced by
Under developmentISO/IEC WD 11770-4