This amendment modifies the key management techniques outlined in part four of the Information Technology Security Techniques series, focusing on mechanisms based on weak secrets. It specifically introduces an Unbalanced Public Authentication Key Agreement (UPAKA) mechanism for Identity-Based Cryptosystems (IBC), enhancing security protocols and providing robust methods for managing cryptographic keys.
*** Please note: This description may not be accurate, please refer to the official documentation.
ISO/IEC 11770-4:2017/Amd.1:2019 history
2021ISO/IEC 11770-4:2017/Amd 2:2021 Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets — Amendment 2: Leakage-resilient password-authenticated key agreement with additional stored se
2019ISO/IEC 11770-4:2017/Amd 1:2019 Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets
2017ISO/IEC 11770-4:2017 Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets
2009ISO/IEC 11770-4:2006/Cor 1:2009 Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets; Technical Corrigendum 1
2006ISO/IEC 11770-4:2006 Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets