Information technology. Security techniques. Key management. Mechanisms based on weak secrets Part 4, (24th February 2021)