{"id":379987,"date":"2024-10-20T03:04:55","date_gmt":"2024-10-20T03:04:55","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-11770-72021\/"},"modified":"2024-10-26T05:33:44","modified_gmt":"2024-10-26T05:33:44","slug":"bs-iso-iec-11770-72021","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-11770-72021\/","title":{"rendered":"BS ISO\/IEC 11770-7:2021"},"content":{"rendered":"
This document specifies mechanisms for cross-domain password-based authenticated key exchange, all of which are four-party password-based authenticated key exchange (4PAKE) protocols. Such protocols let two communicating entities establish a shared session key using just the login passwords that they share with their respective domain authentication servers. The authentication servers, assumed to be part of a standard public key infrastructure (PKI), act as ephemeral certification authorities (CAs) that certify key materials that the users can subsequently use to exchange and agree on as a session key.<\/p>\n
This document does not specify the means to be used to establish a shared password between an entity and its corresponding domain server. This document also does not define the implementation of a PKI and the means for two distinct domain servers to exchange or verify their respective public key certificates.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 4 Symbols and abbreviated terms 4.1 Abbreviated terms <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 4.2 Symbols <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 5 Requirements 6 Mechanisms 6.1 General <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 6.2 Sub-protocols and functions 6.2.1 General 6.2.2 Two-party password-based authenticated key exchange <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 6.2.3 Two-party asymmetric-key authenticated key exchange <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 6.2.4 Two-party symmetric-key authenticated key exchange <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 6.2.5 Two-party non-interactive key exchange 6.2.6 Session identity function <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 6.3 Mechanism 1 6.3.1 General 6.3.2 Prior shared parameters 6.3.3 Key exchange operation <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 6.4 Mechanism 2 6.4.1 General 6.4.2 Prior shared parameters <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 6.4.3 Key exchange operation <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 6.5 Mechanism 3 6.5.1 General <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 6.5.2 Prior shared parameters 6.5.3 Key exchange operation <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | Annex A (normative) Object identifiers <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | Annex B (normative) Conversion functions <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information security. Key management – Cross-domain password-based authenticated key exchange<\/b><\/p>\n |