Reference record for OID 1.0.11770.4

parent
1.0.11770 (key-management)
node code
4
node name
weakSecrets
dot oid
1.0.11770.4
asn1 oid
  • {iso(1) standard(0) key-management(11770) weakSecrets(4)}
  • {iso(1) std(0) key-management(11770) weakSecrets(4)}
  • iri oid
  • /iso/standard/key-management/weakSecrets
  • /iso/std/key-management/weakSecrets
  • iri by oid_info
    /ISO/Standard/11770/4

    Description by oid_info

    ISO/IEC 11770-4 "Information technology -- Security
    techniques -- Key management -- Part 4: Mechanisms based on weak secrets"
    View at oid-info.com

    Current Registration Authority (recovered by parent 1.0)

    ISO and IEC

    Children (7)

    OIDNameSub childrenSub Nodes TotalDescription
    1.0.11770.4.0 asn1-module 1 1 ASN.1 modules defined in ISO/IEC 11770-4
    1.0.11770.4.1 balancedKeyAgreementMechanism-1 6 6 Balanced key agreement mechanism 1
    1.0.11770.4.2 balancedKeyAgreementMechanism-2 8 8 Balanced key agreement mechanism 2
    1.0.11770.4.3 augmentedKeyAgreementMechanism-1 5 5 Augmented key agreement mechanism 1
    1.0.11770.4.4 augmentedKeyAgreementMechanism-2 6 6 Augmented key agreement mechanism 2
    1.0.11770.4.5 augmentedAgreementMechanism-3 6 6 Augmented key agreement mechanism 3
    1.0.11770.4.6 keyRetrievalMechanism-1 5 5 Key retrieval mechanism 1

    Brothers (5)

    OIDNameSub childrenSub Nodes TotalDescription
    1.0.11770.1 part1 0 0 ISO/IEC 11770-1: Information technology -- Security techniques -- Key management -- Part 1: Framework
    1.0.11770.2 part2 2 16 ISO/IEC 11770-2 "Information technology -- Security
    techniques -- Key management -- Part 2: Mechanisms using symmetric techniqu…
    1.0.11770.3 asymmetricTechniques 22 100 ISO/IEC 11770-3 "Information technology -- Security techniques -- Key management -- Part 3: Mechanisms using asymmetric techniq…
    1.0.11770.5 part5 2 8 ISO/IEC 11770-5: Information technology -- Security techniques -- Key management -- Part 5: Group key management
    1.0.11770.6 part6 2 22 ISO/IEC 11770-6 "Information technology -- Security techniques -- Key management -- Part 6: Key derivation"