Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets
ISO/IEC 11770-4:2006 defines key establishment mechanisms based on weak secrets, i.e., secrets that can be readily memorized by a human, and hence secrets that will be chosen from a relatively small set of possibilities. It specifies cryptographic techniques specifically designed to establish one or more secret keys based on a weak secret derived from a memorized password, while preventing off-line brute-force attacks associated with the weak secret. More specifically, these mechanisms are designed to achieve one of the following three goals.
Currently Viewing
Expand Your Knowledge and Unlock Your Learning Potential - Your One-Stop Source for Information!
© Copyright 2024 BSB Edge Private Limited.