Information technology. Security techniques. Key management. Mechanisms based on weak secrets Part 4, (24th October 2019)