IS/ISO/IEC 11770 : Part 4 : 2017 Information Technology - Security Techniques - Key Management Part 4 Mechanisms Based on Weak Secrets
Reaffirmed 2022
NATIONAL FOREWORD
This Indian Standard (Part 4) (First Revision) which is identical with ISO/IEC 11770-4 : 2017 ‘Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets’ issued by International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC) jointly was adopted by the Bureau of Indian Standards on recommendation of the Information Systems Security and Biometrics Sectional Committee, and approval of the Electronics and Information Technology Division Council.
This standard was originally published in 2017 and was identical with ISO/IEC 11770-4 : 2006. First revision of this standard has been undertaken to align it with the latest version of ISO/IEC 11770-4 : 2017.
This Indian Standard is published in six parts. The other parts in this series are:
Part 1 Framework
Part 2 Mechanisms using symmetric techniques
Part 3 Mechanisms using asymmetric techniques
Part 5 Group key management
Part 6 Key derivation
The text of ISO/IEC Standard has been approved as suitable for publication as an Indian Standard without deviations. Certain terminologies and conventions are, however, not identical to those used in Indian Standards. Attention is particularly drawn to the following:
a) Wherever the words ‘International Standard’ appear referring to this standard, they should be read as ‘Indian Standard’.
b) Comma (,) has been used as a decimal marker, while in Indian Standards, the current practice is to use a point (.) as the decimal marker.