QUICK

TOP

해외표준 상세정보

관심표준 등록 : 표준업데이트 시 알림서비스

제공형태 더보기
  • subList_img01

    구판

    판매

    ISO/IEC 11770-4:2006

    Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets
    • 발행일 : 2006-05-04
    • 발행기관 : IEC
    • 대체표준 : ISO/IEC 11770-4:2017
    즐겨찾기 장바구니 담기
    닫기

    상품이 장바구니에 담겼습니다.

    장바구니로 이동
    • [영어]PDF 113,000원

    • [영어]PRINT 113,000원

상세정보

분야 ISO/IEC JTC 1/SC 27 : Information security, cybersecurity and privacy protection
적용범위

ISO/IEC 11770-4:2006 defines key establishment mechanisms based on weak secrets, i.e., secrets that can be readily memorized by a human, and hence secrets that will be chosen from a relatively small set of possibilities. It specifies cryptographic techniques specifically designed to establish one or more secret keys based on a weak secret derived from a memorized password, while preventing off-line brute-force attacks associated with the weak secret. More specifically, these mechanisms are designed to achieve one of the following three goals.

  • Balanced password-authenticated key agreement: Establish one or more shared secret keys between two entities that share a common weak secret. In a balanced password-authenticated key agreement mechanism, the shared secret keys are the result of a data exchange between the two entities, the shared secret keys are established if and only if the two entities have used the same weak secret, and neither of the two entities can predetermine the values of the shared secret keys.
  • Augmented password-authenticated key agreement: Establish one or more shared secret keys between two entities A and B, where A has a weak secret and B has verification data derived from a one-way function of A's weak secret. In an augmented password-authenticated key agreement mechanism, the shared secret keys are the result of a data exchange between the two entities, the shared secret keys are established if and only if the two entities have used the weak secret and the corresponding verification data, and neither of the two entities can predetermine the values of the shared secret keys.
  • Password-authenticated key retrieval: Establish one or more secret keys for an entity, A, associated with another entity, B, where A has a weak secret and B has a strong secret associated with A's weak secret. In an authenticated key retrieval mechanism, the secret keys, retrievable by A (not necessarily derivable by B), are the result of a data exchange between the two entities, and the secret keys are established if and only if the two entities have used the weak secret and the associated strong secret. However, although B's strong secret is associated with A's weak secret, the strong secret does not (in itself) contain sufficient information to permit either the weak secret or the secret keys established in the mechanism to be determined.
국제분류(ICS)코드 35.030 : IT 보안
페이지수 33
Edition 1.0

이력정보

No. 표준번호 표준명 발행일 상태
1 ISO/IEC 11770-4:2017/Amd 2:2021상세보기 Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets — Amendment 2: Leakage-resilient password-authenticated key agreement with additional stored secrets 2021-02-02 표준
2 ISO/IEC 11770-4:2017/AMD2:2021상세보기 Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets - Amendment 2: Leakage-resilient password-authenticated key agreement with additional stored secrets 2021-02-02 표준
3 ISO/IEC 11770-4:2017/Amd 1:2019상세보기 Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets — Amendment 1: Unbalanced Password-Authenticated Key Agreement with Identity-Based Cryptosystems (UPAKA-IBC) 2019-09-06 표준
4 ISO/IEC 11770-4:2017/AMD1:2019상세보기 Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets - Amendment 1: Unbalanced Password-Authenticated Key Agreement with Identity-Based Cryptosystems (UPAKA-IBC) 2019-09-06 표준
5 CAN/CSA-ISO/IEC 11770-4:18 (R2023)상세보기 Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets (Adopted ISO/IEC 11770-4:2017, second edition, 2017-11) 2018-01-01 표준
6 ISO/IEC 11770-4:2017상세보기 Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets 2017-11-17 표준
7 ISO/IEC 11770-4:2017상세보기 Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets 2017-11-17 표준
8 ISO/IEC 11770-4:2006/COR1:2009상세보기 Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets - Technical Corrigendum 1 2009-09-04 구판
9 ISO/IEC 11770-4:2006/Cor 1:2009상세보기 Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets — Technical Corrigendum 1 2009-09-04 구판
10 ISO/IEC 11770-4:2006상세보기 Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets 2006-05-04 구판
11 ISO/IEC 11770-4:2006상세보기 Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets 2006-05-04 구판

제공형태 닫기

  • PDF :

    직접 파일 다운로드 및 인쇄(마이페이지 확인)
  • 보안PDF :

    직접 파일 다운로드 및 인쇄(마이페이지 확인)* 단, 파일이동 및 복사 불가, 1회 다운로드 및 인쇄가능
  • PRINT :

    인쇄본 우편발송, 2~3일 소요(PDF파일 미제공)
  • BOOK :

    인쇄본 우편발송, 2~3일 소요(PDF파일 미제공)
  • ZIP :

    압축파일형태로 제공 (PDF, HTML, TXT, XLS 등으로 구성), 직접 파일 다운로드(마이페이지 확인)
  • CD/DVD :

    직접 파일 다운로드 및 인쇄(마이페이지 확인)
  • DB :

    별도 정보 제공
  • HARDCOPY :

    해외 배송 상품, 최대 3주 소요
  • 바인더 :

    바인더 우편발송, 2~3일 소요
  • 온라인구독 :

    WEB 접속 후 실시간 열람, 출력(1년간)