0 продуктов

Авторизация

CSA CAN/CSA-ISO/IEC 11770-4-07 Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets - Incorporates Corrigendum 1: December 2010

Список продуктов
Данный раздел/документ содержится в продуктах:

 

CSA Standards

Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets - Incorporates Corrigendum 1: December 2010
 N CAN/CSA-ISO/IEC 11770-4-07

 

Annotation

 

This part of ISO/IEC 11770 defines key establishment mechanisms based on weak secrets, i.e., secrets that can be readily memorized by a human, and hence secrets that will be chosen from a relatively small set of possibilities. It specifies cryptographic techniques specifically designed to establish one or more secret keys based on a weak secret derived from a memorized password, while preventing off-line brute-force attacks associated with the weak secret. More specifically, these mechanisms are designed to achieve one of the following three goals.

1) Balanced password-authenticated key agreement: Establish one or more shared secret keys between two entities that share a common weak secret. In a balanced password-authenticated key agreement mechanism, the shared secret keys are the result of a data exchange between the two entities, the shared secret keys are established if and only if the two entities have used the same weak secret, and neither of the two entities can predetermine the values of the shared secret keys.

2) Augmented password-authenticated key agreement: Establish one or more shared secret keys between two entities A and B, where A has a weak secret and B has verification data derived from a one-way function of A's weak secret. In an augmented password-authenticated key agreement mechanism, the shared secret keys are the result of a data exchange between the two entities, the shared secret keys are established if and only if the two entities have used the weak secret and the corresponding verification data, and neither of the two entities can predetermine the values of the shared secret keys.

NOTE – This type of key agreement mechanism is unable to protect A's weak secret being discovered by B, but only increases the cost for an adversary to get A's weak secret from B. Therefore it is normally used between a client (A) and a server (B).

Категории продуктов

 

 

 

Знакомьтесь, "Техэксперт"

 Техэксперт для iPad

 Для Android

АКЦИЯ!

Бесплатный доступ