欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > PDF文档下载
    分享到微信 分享到微博 分享到QQ空间

    ETSI TS 103 097-2015 Intelligent Transport Systems (ITS) Security Security header and certificate formats (V1 2 1)《智能运输系统 (ITS) 安全性 安全头和证书格式 (V1 2 1)》.pdf

    • 资源ID:739796       资源大小:233.75KB        全文页数:35页
    • 资源格式: PDF        下载积分:10000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要10000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    ETSI TS 103 097-2015 Intelligent Transport Systems (ITS) Security Security header and certificate formats (V1 2 1)《智能运输系统 (ITS) 安全性 安全头和证书格式 (V1 2 1)》.pdf

    1、 ETSI TS 103 097 V1.2.1 (2015-06) Intelligent Transport Systems (ITS); Security; Security header and certificate formats TECHNICAL SPECIFICATION ETSI ETSI TS 103 097 V1.2.1 (2015-06)2 Reference RTS/ITS-00531 Keywords ITS, privacy, protocol, security ETSI 650 Route des Lucioles F-06921 Sophia Antipol

    2、is Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice The present document can be downloaded from: http:/www.etsi.org/standards-search The present docu

    3、ment may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/

    4、or in print, the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current st

    5、atus of this and other ETSI documents is available at http:/portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: https:/portal.etsi.org/People/CommiteeSupportStaff.aspx Copyright Notification No part may be reprod

    6、uced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI. The content of the PDF version shall not be modified without the written authorization of ETSI. The copyright and the foregoing restriction

    7、 extend to reproduction in all media. European Telecommunications Standards Institute 2015. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM and LTE are Trade Marks of ETSI registered for the benefit of its Me

    8、mbers and of the 3GPP Organizational Partners. GSM and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI TS 103 097 V1.2.1 (2015-06)3 Contents Intellectual Property Rights 5g3Foreword . 5g3Modal verbs terminology 5g3Introduction 5g31 Scope 6g32 References 6g32.1 Nor

    9、mative references . 6g32.2 Informative references 6g33 Definitions and abbreviations . 7g33.1 Definitions 7g33.2 Abbreviations . 7g34 Basic format elements 7g34.1 Presentation Language . 7g34.2 Specification of basic format elements . 9g34.2.1 IntX . 9g34.2.2 PublicKeyAlgorithm . 9g34.2.3 SymmetricA

    10、lgorithm 9g34.2.4 PublicKey . 9g34.2.5 EccPoint 10g34.2.6 EccPointType 11g34.2.7 EncryptionParameters . 11g34.2.8 Signature . 11g34.2.9 EcdsaSignature . 12g34.2.10 SignerInfo . 12g34.2.11 SignerInfoType . 13g34.2.12 HashedId8 . 13g34.2.13 HashedId3 . 13g34.2.14 Time32 14g34.2.15 Time64 14g34.2.16 Ti

    11、me64WithStandardDeviation 14g34.2.17 Duration 14g34.2.18 TwoDLocation 15g34.2.19 ThreeDLocation 15g34.2.20 GeographicRegion 15g34.2.21 RegionType. 16g34.2.22 CircularRegion 16g34.2.23 RectangularRegion 16g34.2.24 PolygonalRegion . 17g34.2.25 IdentifiedRegion . 17g34.2.26 RegionDictionary 17g35 Speci

    12、fication of security header . 17g35.1 SecuredMessage . 17g35.2 Payload . 18g35.3 PayloadType . 18g35.4 HeaderField 18g35.5 HeaderFieldType 20g35.6 TrailerField . 20g35.7 TrailerFieldType . 20g35.8 RecipientInfo 21g35.9 EciesEncryptedKey 21g36 Specification of certificate format 22g36.1 Certificate .

    13、 22g36.2 SubjectInfo . 23g3ETSI ETSI TS 103 097 V1.2.1 (2015-06)4 6.3 SubjectType 23g36.4 SubjectAttribute . 23g36.5 SubjectAttributeType . 24g36.6 SubjectAssurance . 24g36.7 ValidityRestriction . 25g36.8 ValidityRestrictionType . 25g36.9 ItsAidSsp 25g37 Security profiles . 26g37.1 Security profile

    14、for CAMs 26g37.2 Security profile for DENMs . 27g37.3 Generic security profile for other signed messages 28g37.4 Profiles for certificates . 29g37.4.1 Introduction. 29g37.4.2 Authorization tickets (pseudonymous certificates) . 30g37.4.3 Enrolment credential (long-term certificates) . 30g37.4.4 Certi

    15、ficate authority certificates 30g3Annex A (informative): Data structure examples 32g3A.1 Example security envelope structure for CAM 32g3A.2 Example structure of a certificate . 33g3Annex B (informative): Usage of ITS-AID and SSPs 34g3History 35g3ETSI ETSI TS 103 097 V1.2.1 (2015-06)5 Intellectual P

    16、roperty Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR 000 314: “Intellectual Property Rights (IPRs)

    17、; Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (http:/ipr.etsi.org). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carr

    18、ied out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Foreword This Technical Specification (TS) has been produced by ETSI Technica

    19、l Committee Intelligent Transport Systems (ITS). Modal verbs terminology In the present document “shall“, “shall not“, “should“, “should not“, “may“, “need not“, “will“, “will not“, “can“ and “cannot“ are to be interpreted as described in clause 3.2 of the ETSI Drafting Rules (Verbal forms for the e

    20、xpression of provisions). “must“ and “must not“ are NOT allowed in ETSI deliverables except when used in direct citation. Introduction Security mechanisms for ITS consist of a number of parts. An important part for interoperability is a common format for data elements being transferred between ITS s

    21、tations for security purposes. The present document intends to provide such a format definition. A special focus is to include as much as possible from existing standards. At the same time, the major goal is simplicity and extensibility of data structures. ETSI ETSI TS 103 097 V1.2.1 (2015-06)6 1 Sc

    22、ope The present document specifies security header and certificate formats for Intelligent Transport Systems. These formats are defined specifically for securing G5 communication. 2 References 2.1 Normative references References are either specific (identified by date of publication and/or edition n

    23、umber or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the reference document (including any amendments) applies. Referenced documents which are not found to be publicly available in the expected location

    24、might be found at http:/docbox.etsi.org/Reference. NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long term validity. The following referenced documents are necessary for the application of the present document. 1 IEEE 1363-2000:

    25、 “IEEE Standard Specifications For Public Key Cryptography“. 2 NIMA Technical Report TR8350.2: “Department of Defense World Geodetic System 1984. Its Definition and Relationships with Local Geodetic Systems“. 3 ISO 3166-1: “Codes for the representation of names of countries and their subdivisions -

    26、Part 1: Country codes“. 4 NIST SP 800-38C: “Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality“. 5 IETF RFC 2246: “The TLS Protocol Version 1.0“. 6 ETSI TS 102 940: “Intelligent Transport Systems (ITS); Security; ITS communications security archit

    27、ecture and security management“. 7 ETSI TS 102 965 (V1.2.1): “Intelligent Transport Systems (ITS); Application Object Identifier (ITS-AID); Registration“. 2.2 Informative references References are either specific (identified by date of publication and/or edition number or version number) or non-spec

    28、ific. For specific references, only the cited version applies. For non-specific references, the latest version of the reference document (including any amendments) applies. NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long term

    29、 validity. The following referenced documents are not necessary for the application of the present document but they assist the user with regard to a particular subject area. i.1 IEEE 1363a-2004: “Standard Specifications For Public Key Cryptography - Amendment 1: Additional Techniques“. i.2 IEEE 160

    30、9.2-2012 (draft D12): “Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages“. i.3 IEEE 1609.2-2012 (draft D17): “Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages“. i.4 IEEE 1609.3-2010: “Wireless

    31、Access in Vehicular Environments (WAVE) - Networking Services“. ETSI ETSI TS 103 097 V1.2.1 (2015-06)7 i.5 Standards for Efficient Cryptography 4 (SEC 4): “Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV)“. i.6 Antipa A., R. Gallant, and S. Vanstone: “Accelerated verification of ECDSA s

    32、ignatures“, Selected Areas in Cryptography, 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005: Springer, 2005, pp. 307-318. 3 Definitions and abbreviations 3.1 Definitions For the purposes of the present document, the following terms and definitions apply: enumeration:

    33、set of values with distinct meaning 3.2 Abbreviations For the purposes of the present document, the following abbreviations apply: AES Advanced Encryption Standard CA Certificate Authority CAM Cooperative Awareness Message CRL Certificate Revocation List DENM Decentralized Environmental Notification

    34、 Message DHAES Diffie-Hellman: An Encryption Scheme ECC Elliptic Curve Cryptography ECDSA Elliptic Curve Digital Signature Algorithm ECIES Elliptic Curve Integrated Encryption Scheme ECQV Elliptic Curve Qu-Vanstone NOTE: Implicit Certificate Scheme. G5 5,9 GHz radio communications ITS Intelligent Tr

    35、ansport Systems ITS-AID ITS Application ID ITS-S Intelligent Transport Systems Station LSB Least Significant Bit NIMA National Imagery and Mapping Agency NIST SP National Institute of Standards and Technology, Special Publication PSID Provider Service Identifier NOTE: It is a synonym for ITS-AID. SS

    36、P Service Specific Permissions TAI Temps Atomique International (International Atomic Time) TLS Transport Layer Security UTC Universal Time Coordinated WGS World Geodetic System 4 Basic format elements 4.1 Presentation Language The presentation language is derived from the Internet Engineering Task

    37、Force (IETF) RFC 2246 (TLS) 5 and from IEEE 1609.2-2012 i.2 (draft D12) and is described in table 1. The encoding of multi-byte elements of the presentation language shall always use network byte order, i.e. big endian byte order, if applicable. NOTE: The presentation language is not formally define

    38、d. Parsing tools based on this notation cannot be guaranteed to be consistent or complete. ETSI ETSI TS 103 097 V1.2.1 (2015-06)8 Table 1: Presentation language Element Description Example(s) Variable names Variable names are given in lower case variable_name Basic data types Basic data types are gi

    39、ven in lower case uint8, uint16, uint32, uint64 Composed data types Composed data types are given with at least the first letter in upper case MyDataType Comments Comments start with the “/“ indicator / This is a comment Numbers Numbers are given as signed or unsigned big-endian octets uint8, uint16

    40、, uint32, uint64, sint32 Fixed-length vectors Fixed-length vectors have a data type and a fixed octet size given in square brackets uint8 Coordinates2; / two uint8 values uint32 Coordinates8; / two uint32 values Variable-length vectors with fixed-length length encoding The number in angle brackets g

    41、ives the maximum number of octets. Depending on the maximum size, the first 1 byte, 2 bytes, 4 bytes or 8 bytes encode the actual field length uint8 AsciiChar; AsciiChar Name; / “abc“ encoded as / 0x03, 0x61, 0x62, 0x63 AsciiChar LongName; / “abc“ encoded as / 0x00, 0x03, 0x61, 0x62, 0x63 Variable-l

    42、ength vectors with variable-length length encoding indicates variable-length encoding. The length itself is encoded with a number of “1“ bits according to the additional number of octets used to encode the length, followed by a “0“ bit and the actual length value. The maximum length shall be 256- 1,

    43、 i.e. at most seven “1“ bits followed by a “0“ bit shall be used for the variable-length length encoding. The length of variable-length vectors with variable-length length encoding shall be encoded as positive integer using the minimum number of bits necessary uint8 AsciiChar; AsciiChar Name; / enco

    44、ding examples: (the bits with / grey background represent the / length encoding of the vectors / length, X the first of the / vectors following payload bits) / Vector length 5: / Bits: 00000101 XXXXXXXX XXXXXXXX / Vector length 123: / Bits: 01111011 XXXXXXXX XXXXXXXX / Vector length 388: / Bits: 100

    45、00001 10000100 XXXXXXXX Opaque fields Opaque fields are blocks of data whose content interpretation is not further specified opaque fieldnamen; opaque fieldname; opaque fieldname; Enumerations Enumerations are list of labels with a unique value for each label, and optionally a maximum value (which t

    46、hen determines length of encoding) enum de(0), fr(1), it(2) Country; enum de(0), fr(1), it(2), (28-1) Country; / both variants encoding in one / octet enum de(0), fr(1), it(2), (216-1) Country; / Encoding in two octets Constructed types Constructed types contain other types struct Name name; Country

    47、 country; Person; Case statements Case statements are used inside constructed types to change the contents of the constructed type depending on the value of the variable given in brackets struct Name name; Country country; select(country) case de: uint8 age; case fr: AsciiChar given_name; Person; Ex

    48、ternal data This is external data that has impact on a struct, e.g. in a select statement. It shall be described from where the external data is obtained struct Name name; extern Country country; select(country) case de: uint8 age; case fr: AsciiChar given_name; Person; ETSI ETSI TS 103 097 V1.2.1 (

    49、2015-06)9 4.2 Specification of basic format elements 4.2.1 IntX g139g144g150g591g154g3g3 g12g144g150g27g346g3This data type encodes an integer of variable length. The length of this integer is encoded by a number of 1 bits followed by a 0 bit, where the number of 1 bits is equal to the number of additional octets used to encode the integer besides those used (partially) to encode the length. The encoding of the length shall use at most 7 bits set to 1. EXAMPLE: 00001010 encodes th


    注意事项

    本文(ETSI TS 103 097-2015 Intelligent Transport Systems (ITS) Security Security header and certificate formats (V1 2 1)《智能运输系统 (ITS) 安全性 安全头和证书格式 (V1 2 1)》.pdf)为本站会员(terrorscript155)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开