Cena s DPH / bez DPH
Sponsored link
sklademVydáno: 2021-02-24
BS ISO/IEC 11770-4:2017+A2:2021
Information technology. Security techniques. Key management Mechanisms based on weak secrets
Formát
Dostupnost
Cena a měna
Anglicky Zabezpečené PDF
K okamžitému stažení
10230 Kč
Anglicky Tisk
Skladem
10230 Kč
Označení normy: | BS ISO/IEC 11770-4:2017+A2:2021 |
Počet stran: | 108 |
Vydáno: | 2021-02-24 |
ISBN: | 978 0 539 03304 5 |
Status: | Standard |
Popis
BS ISO/IEC 11770-4:2017+A2:2021
This standard BS ISO/IEC 11770-4:2017+A2:2021 Information technology. Security techniques. Key management is classified in these ICS categories:
- 35.030 IT Security
This document defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It specifies cryptographic techniques specifically designed to establish one or more secret keys based on a weak secret derived from a memorized password, while preventing offline brute-force attacks associated with the weak secret. This document is not applicable to the following aspects of key management:
life-cycle management of weak secrets, strong secrets, and established secret keys;
mechanisms to store, archive, delete, destroy, etc. weak secrets, strong secrets, and established secret keys.