TIA-102 AACA-1-2002 Project 25 over-the-Rekeying (OTAR) Protocol Addendum 1 - Key Management Security Requirements for Type 3 Block Encryption Algorithms Addendum No 1 to TIA EIA-1.pdf
《TIA-102 AACA-1-2002 Project 25 over-the-Rekeying (OTAR) Protocol Addendum 1 - Key Management Security Requirements for Type 3 Block Encryption Algorithms Addendum No 1 to TIA EIA-1.pdf》由会员分享,可在线阅读,更多相关《TIA-102 AACA-1-2002 Project 25 over-the-Rekeying (OTAR) Protocol Addendum 1 - Key Management Security Requirements for Type 3 Block Encryption Algorithms Addendum No 1 to TIA EIA-1.pdf(36页珍藏版)》请在麦多课文档分享上搜索。
1、 TIA STANDARD ANSI/TIA-102.AACA-1-2002 Approved: November 27, 2002 Project 25 - Digital Radio Over-the-Air-Rekeying (OTAR) Protocol Addendum 1 Key Management Security Requirements for Type 3 Block Encryption Algorithms TIA-102.AACA-1 (Addendum No. 1 to TIA/EIA-102.AACA) NOVEMBER 2002 TELECOMMUNICATI
2、ONS INDUSTRY ASSOCIATION Representing the telecommunications industry in association with the Electronic Industries Alliance Copyright Electronic Industries Alliance Provided by IHS under license with EIANot for ResaleNo reproduction or networking permitted without license from IHS-,-,-NOTICE TIA En
3、gineering Standards and Publications are designed to serve the public interest through eliminating misunderstandings between manufacturers and purchasers, facilitating interchangeability and improvement of products, and assisting the purchaser in selecting and obtaining with minimum delay the proper
4、 product for their particular need. The existence of such Standards and Publications shall not in any respect preclude any member or non-member of TIA from manufacturing or selling products not conforming to such Standards and Publications. Neither shall the existence of such Standards and Publicati
5、ons preclude their voluntary use by Non-TIA members, either domestically or internationally. Standards and Publications are adopted by TIA in accordance with the American National Standards Institute (ANSI) patent policy. By such action, TIA does not assume any liability to any patent owner, nor doe
6、s it assume any obligation whatever to parties adopting the Standard or Publication. This Standard does not purport to address all safety problems associated with its use or all applicable regulatory requirements. It is the responsibility of the user of this Standard to establish appropriate safety
7、and health practices and to determine the applicability of regulatory limitations before its use. (From Standards Proposal No. 3-4824-AD1, formulated under the cognizance of the TIA TR-8.3 Subcommittee on Encryption.) Published by TELECOMMUNICATIONS INDUSTRY ASSOCIATION 2002 Standards and Technology
8、 Department 2500 Wilson Boulevard Arlington, VA 22201 U.S.A. PRICE: Please refer to current Catalog of TIA TELECOMMUNICATIONS INDUSTRY ASSOCIATION STANDARDS AND ENGINEERING PUBLICATIONS or call Global Engineering Documents, USA and Canada (1-800-854-7179) International (303-397-7956) or search onlin
9、e at http:/www.tiaonline.org/standards/search_n_order.cfm All rights reserved Printed in U.S.A. Copyright Electronic Industries Alliance Provided by IHS under license with EIANot for ResaleNo reproduction or networking permitted without license from IHS-,-,-PLEASE! DONT VIOLATE THE LAW! This documen
10、t is copyrighted by the TIA and may not be reproduced without permission. Organizations may obtain permission to reproduce a limited number of copies through entering into a license agreement. For information, contact: Global Engineering Documents 15 Inverness Way East Englewood, CO 80112-5704 U.S.A
11、. or call U.S.A. and Canada 1-800-854-7179, International (303) 397-7956 Copyright Electronic Industries Alliance Provided by IHS under license with EIANot for ResaleNo reproduction or networking permitted without license from IHS-,-,-NOTICE OF DISCLAIMER AND LIMITATION OF LIABILITY The document to
12、which this Notice is affixed has been prepared by one or more Engineering Committees of the Telecommunications Industry Association (“TIA”). TIA is not the author of the document contents, but publishes and claims copyright to the document pursuant to licenses and permission granted by the authors o
13、f the contents. TIA Engineering Committees are expected to conduct their affairs in accordance with the TIA Engineering Manual (“Manual”), the current and predecessor versions of which are available at http:/www.tiaonline.org/standards/sfg/engineering_manual.cfm. TIAs function is to administer the p
14、rocess, but not the content, of document preparation in accordance with the Manual and, when appropriate, the policies and procedures of the American National Standards Institute (“ANSI”). THE USE OR PRACTICE OF CONTENTS OF THIS DOCUMENT MAY INVOLVE THE USE OF INTELLECTUAL PROPERTY RIGHTS (“IPR”), I
15、NCLUDING PENDING OR ISSUED PATENTS, OR COPYRIGHTS, OWNED BY ONE OR MORE PARTIES. TIA MAKES NO SEARCH OR INVESTIGATION FOR IPR. WHEN IPR CONSISTING OF PATENTS AND PUBLISHED PATENT APPLICATIONS ARE CLAIMED AND CALLED TO TIAS ATTENTION, A STATEMENT FROM THE HOLDER THEREOF IS REQUESTED, ALL IN ACCORDANC
16、E WITH THE MANUAL. TIA TAKES NO POSITION WITH REFERENCE TO, AND DISCLAIMS ANY OBLIGATION TO INVESTIGATE OR INQUIRE INTO, THE SCOPE OR VALIDITY OF ANY CLAIMS OF IPR. ALL WARRANTIES, EXPRESS OR IMPLIED, ARE DISCLAIMED, INCLUDING WITHOUT LIMITATION, ANY AND ALL WARRANTIES CONCERNING THE ACCURACY OF THE
17、 CONTENTS, ITS FITNESS OR APPROPRIATENESS FOR A PARTICULAR PURPOSE OR USE, ITS MERCHANTABILITY AND ITS NON-INFRINGEMENT OF ANY THIRD PARTYS INTELLECTUAL PROPERTY RIGHTS. TIA EXPRESSLY DISCLAIMS ANY AND ALL RESPONSIBILITIES FOR THE ACCURACY OF THE CONTENTS AND MAKES NO REPRESENTATIONS OR WARRANTIES R
18、EGARDING THE CONTENTS COMPLIANCE WITH ANY APPLICABLE STATUTE, RULE OR REGULATION. TIA SHALL NOT BE LIABLE FOR ANY AND ALL DAMAGES, DIRECT OR INDIRECT, ARISING FROM OR RELATING TO ANY USE OF THE CONTENTS CONTAINED HEREIN, INCLUDING WITHOUT LIMITATION ANY AND ALL INDIRECT, SPECIAL, INCIDENTAL OR CONSE
19、QUENTIAL DAMAGES (INCLUDING DAMAGES FOR LOSS OF BUSINESS, LOSS OF PROFITS, LITIGATION, OR THE LIKE), WHETHER BASED UPON BREACH OF CONTRACT, BREACH OF WARRANTY, TORT (INCLUDING NEGLIGENCE), PRODUCT LIABILITY OR OTHERWISE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THE FOREGOING NEGATION OF D
20、AMAGES IS A FUNDAMENTAL ELEMENT OF THE USE OF THE CONTENTS HEREOF, AND THESE CONTENTS WOULD NOT BE PUBLISHED BY TIA WITHOUT SUCH LIMITATIONS. Copyright Electronic Industries Alliance Provided by IHS under license with EIANot for ResaleNo reproduction or networking permitted without license from IHS-
21、,-,-TIA-102.AACA - 1 1 ADDENDUM 1 KEY MANAGEMENT SECURITY REQUIREMENTS FOR TYPE 3 BLOCK ENCRYPTION ALGORITHMS 1 Introduction This addendum specifies the general security requirements to be used when transmitting Type 3 Key Management Messages (KMMs) as defined in the Over The Air Rekeying (OTAR) Pro
22、tocol document (reference 1). It also specifies the requirements to encrypt (wrap) Type 3 keys when sent as part of a KMM, the techniques to be used to protect the integrity of KMMs and the mechanism used to protect against the replay of KMMs. The addendum provides support for Triple DES and AES but
23、 is not limited to those algorithms. This addendum is designed to support all block encryption algorithms that have a block size that is a multiple of 2 octets except for DES. The requirements for DES are specified in Annex D of the OTAR Protocol document (reference 1). 2 Revision History Version 0.
24、0, December 20, 2001, first draft. Version 0.1, January 10, 2002, modified key encryption requirements and defined Enhanced MAC frame. Version 0.2, January 11, 2002, fixed typographical errors. Version 0.3, April 3, 2002, modified last paragraph in section 5.3, modified sections 5.4.2 and 5.4.3, fix
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- TIA102AACA12002PROJECT25OVERTHEREKEYINGOTARPROTOCOLADDENDUM1KEYMANAGEMENTSECURITYREQUIREMENTSFORTYPE3BLOCKENCRYPTIONALGORITHMSADDENDUMNO1TOTIAEIA1PDF

链接地址:http://www.mydoc123.com/p-1059907.html