CAN/CSA-ISO/IEC 11770-4-2018(R2023) Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets (Adopted ISO/IEC 11770-4:2017, second edition, 2017-11)
This document defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It specifies cryptographic techniques specifically designed to establish one or more secret keys based on a weak secret derived from a memorized password, while preventing offline brute-force attacks associated with the weak secret.
This document is not applicable to the following aspects of key management:
life-cycle management of weak secrets, strong secrets, and established secret keys; mechanisms to store, archive, delete, destroy, etc. weak secrets, strong secrets, and established secret keys.
CAN/CSA-ISO/IEC 11770-4-2018(R2023) history
2018CAN/CSA-ISO/IEC 11770-4:2018 Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets
2007CAN/CSA-ISO/IEC 11770-4:2007 Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets (Incorporates Corrigendum 1: December 2010)