관심표준 등록 : 표준업데이트 시 알림을 받을 수 있습니다.
PDF : 직접 파일 다운로드 및 인쇄 (마이페이지 확인)
PRINT : 인쇄본 우편발송, 2~3일 소요(PDF파일 미제공)
분야 | |
---|---|
적용범위 | CSA Preface Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the SCC Mirror Committee (SMC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T). For brevity, this Standard will be referred to as "CAN/CSA-ISO/IEC 11770-4" throughout. This Standard supersedes CAN/CSA-ISO/IEC 11770-4:07 (adopted ISO/IEC 11770-4:2006). At the time of publication, ISO/IEC 11770-4:2017 is available from ISO and IEC in English only. CSA Group will publish the French version when it becomes available from ISO and IEC. Scope This document defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It specifies cryptographic techniques specifically designed to establish one or more secret keys based on a weak secret derived from a memorized password, while preventing offline brute-force attacks associated with the weak secret. This document is not applicable to the following aspects of key management: ? life-cycle management of weak secrets, strong secrets, and established secret keys; ? mechanisms to store, archive, delete, destroy, etc. weak secrets, strong secrets, and established secret keys. |
국제분류(ICS)코드 | |
페이지수 | 65 |
Edition |
No. | 표준번호 | 표준명 | 발행일 | 상태 |
---|---|---|---|---|
1 | ISO/IEC 11770-4:2017/Amd 2:2021 | Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets — Amendment 2: Leakage-resilient password-authenticated key agreement with additional stored secrets | 2021-02-02 | 표준 |
2 | ISO/IEC 11770-4:2017/AMD2:2021 | Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets - Amendment 2: Leakage-resilient password-authenticated key agreement with additional stored secrets | 2021-02-02 | 표준 |
3 | ISO/IEC 11770-4:2017/Amd 1:2019 | Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets — Amendment 1: Unbalanced Password-Authenticated Key Agreement with Identity-Based Cryptosystems (UPAKA-IBC) | 2019-09-06 | 표준 |
4 | ISO/IEC 11770-4:2017/AMD1:2019 | Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets - Amendment 1: Unbalanced Password-Authenticated Key Agreement with Identity-Based Cryptosystems (UPAKA-IBC) | 2019-09-06 | 표준 |
5 | CAN/CSA-ISO/IEC 11770-4:18 (R2023) | Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets (Adopted ISO/IEC 11770-4:2017, second edition, 2017-11) | 2018-01-01 | 표준 |
6 | ISO/IEC 11770-4:2017 | Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets | 2017-11-17 | 표준 |
7 | ISO/IEC 11770-4:2017 | Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets | 2017-11-17 | 표준 |
8 | ISO/IEC 11770-4:2006/COR1:2009 | Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets - Technical Corrigendum 1 | 2009-09-04 | 구판 |
9 | ISO/IEC 11770-4:2006/Cor 1:2009 | 2009-09-04 | 구판 | |
10 | ISO/IEC 11770-4:2006 | Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets | 2006-05-04 | 구판 |
11 | ISO/IEC 11770-4:2006 | Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets | 2006-05-04 | 구판 |
ISO/IEC 11770-3:2021/FDAmd 1 - Information security — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 1: TFNS identity-based key agreement 상세보기
ISO/IEC 11770-1:2010 - Information technology - Security techniques - Key management - Part 1: Framework 상세보기
ISO/IEC 11770-1:2010 - Information technology — Security techniques — Key management — Part 1: Framework 상세보기
CSA ISO/IEC 11770-1:12 (R2021) - Information technology - Security techniques - Key management - Part 1: Framework (Adopted ISO/IEC 11770-1:2010, second edition, 2010-12-01) 상세보기
ISO/IEC 11770-6:2016 - Information technology - Security techniques - Key management - Part 6: Key derivation 상세보기
함께 구입한 상품이 존재하지 않습니다.
IEC TS 63134:2020 - Active assisted living (AAL) use cases 상세보기
IEC 60034-5:2020 RLV - Rotating electrical machines - Part 5: Degrees of protection provided by the integral design of rotating electrical machines (IP code) - Classification 상세보기
KS B ISO TS 25740-1 - 에스컬레이터 및 무빙워크에 대한 안전요건 — 제1부: 세계공통 필수 안전요건(GESRs) 상세보기
KS B ISO TS 8100-21 - 승객 및 화물 운송용 엘리베이터 —제21부: 세계공통 필수안전요건(GESRs)을 충족하는 세계공통 안전 파라미터(GSPs) 상세보기
KS C IEC TS 62872 - 산업 시설과 스마트 그리드 사이의 산업 공정 측정, 제어 및 자동화 시스템 인터페이스 상세보기