{"id":371996,"date":"2024-10-20T02:27:16","date_gmt":"2024-10-20T02:27:16","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-11770-42017a22021\/"},"modified":"2024-10-26T04:16:31","modified_gmt":"2024-10-26T04:16:31","slug":"bs-iso-iec-11770-42017a22021","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-11770-42017a22021\/","title":{"rendered":"BS ISO\/IEC 11770-4:2017+A2:2021"},"content":{"rendered":"

This document defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It specifies cryptographic techniques specifically designed to establish one or more secret keys based on a weak secret derived from a memorized password, while preventing offline brute-force attacks associated with the weak secret. This document is not applicable to the following aspects of key management:<\/p>\n