IS/ISO/IEC 11770 : Part 4 : 2017 Information Technology - Security Techniques - Key Management Part 4 Mechanisms Based on Weak Secrets

ICS 35.030


Reaffirmed 2022


This Indian Standard (Part 4) (First Revision) which is identical with ISO/IEC 11770-4 : 2017 ‘Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets’ issued by International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC) jointly was adopted by the Bureau of Indian Standards on recommendation of the Information Systems Security and Biometrics Sectional Committee, and approval of the Electronics and Information Technology Division Council.

This standard was originally published in 2017 and was identical with ISO/IEC 11770-4 : 2006. First revision of this standard has been undertaken to align it with the latest version of ISO/IEC 11770-4 : 2017.

This Indian Standard is published in six parts. The other parts in this series are:

Part 1 Framework

Part 2 Mechanisms using symmetric techniques

Part 3 Mechanisms using asymmetric techniques

Part 5 Group key management

Part 6 Key derivation

The text of ISO/IEC Standard has been approved as suitable for publication as an Indian Standard without deviations. Certain terminologies and conventions are, however, not identical to those used in Indian Standards. Attention is particularly drawn to the following:

a) Wherever the words ‘International Standard’ appear referring to this standard, they should be read as ‘Indian Standard’.

b) Comma (,) has been used as a decimal marker, while in Indian Standards, the current practice is to use a point (.) as the decimal marker.