ISO IEC 24767-2-2009 Information technology - Home network security - Part 2 Internal security services Secure Communication Protocol for Middleware (SCPM)《信息技术.pdf
《ISO IEC 24767-2-2009 Information technology - Home network security - Part 2 Internal security services Secure Communication Protocol for Middleware (SCPM)《信息技术.pdf》由会员分享,可在线阅读,更多相关《ISO IEC 24767-2-2009 Information technology - Home network security - Part 2 Internal security services Secure Communication Protocol for Middleware (SCPM)《信息技术.pdf(46页珍藏版)》请在麦多课文档分享上搜索。
1、 ISO/IEC 24767-2 Edition 1.0 2009-01 INTERNATIONAL STANDARD Information technology Home network security Part 2: Internal security services Secure communication protocol for middleware (SCPM) ISO/IEC 24767-2:2009(E) THIS PUBLICATION IS COPYRIGHT PROTECTED Copyright 2009 ISO/IEC, Geneva, Switzerland
2、All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from either IEC or IECs member National Committee in the country of th
3、e requester. If you have any questions about ISO/IEC copyright or have an enquiry about obtaining additional rights to this publication, please contact the address below or your local IEC member National Committee for further information. IEC Central Office 3, rue de Varemb CH-1211 Geneva 20 Switzer
4、land Email: inmailiec.ch Web: www.iec.ch About the IEC The International Electrotechnical Commission (IEC) is the leading global organization that prepares and publishes International Standards for all electrical, electronic and related technologies. About IEC publications The technical content of I
5、EC publications is kept under constant review by the IEC. Please make sure that you have the latest edition, a corrigenda or an amendment might have been published. Catalogue of IEC publications: www.iec.ch/searchpub The IEC on-line Catalogue enables you to search by a variety of criteria (reference
6、 number, text, technical committee,). It also gives information on projects, withdrawn and replaced publications. IEC Just Published: www.iec.ch/online_news/justpub Stay up to date on all new IEC publications. Just Published details twice a month all new publications released. Available on-line and
7、also by email. Electropedia: www.electropedia.org The worlds leading online dictionary of electronic and electrical terms containing more than 20 000 terms and definitions in English and French, with equivalent terms in additional languages. Also known as the International Electrotechnical Vocabular
8、y online. Customer Service Centre: www.iec.ch/webstore/custserv If you wish to give us your feedback on this publication or need further assistance, please visit the Customer Service Centre FAQ or contact us: Email: csciec.ch Tel.: +41 22 919 02 11 Fax: +41 22 919 03 00 ISO/IEC 24767-2 Edition 1.0 2
9、009-01 INTERNATIONAL STANDARD Information technology Home network security Part 2: Internal security services Secure communication protocol for middleware (SCPM) INTERNATIONAL ELECTROTECHNICAL COMMISSION R ICS 35.200 PRICE CODE ISBN 2-8318-1020-6 2 24767-2 ISO/IEC:2009(E) CONTENTS FOREWORD.5 1 Scope
10、.6 2 Normative references .6 3 Terms, definitions and abbreviations 7 3.1 Terms and definitions 7 3.2 Abbreviations 8 4 Conformance8 5 Design considerations of internal security services for home networks .9 5.1 General .9 5.2 Issues addressed by security measures 10 5.2.1 General .10 5.2.2 Unsafe t
11、ransmission 10 5.2.3 Intentional misuse .10 5.3 Design principles of security measures11 5.3.1 General .11 5.3.2 Minimization of resources for cost-saving 11 5.3.3 Independence of communication media .11 5.3.4 Independence of cryptographic algorithms.11 5.3.5 Extensibility of variant usages .11 6 Se
12、cure communication protocol for middleware (SCPM).11 6.1 General .11 6.2 What is SCPM.12 6.3 How does SCPM work.12 6.4 Where is SCPM going to be implemented14 6.5 Usage levels of SCPM.14 6.6 Usage keys of SCPM.15 7 Secure message frame format15 7.1 General communication frame.15 7.1.1 General .15 7.
13、1.2 Header (HD)16 7.1.3 Source address (SA) and destination address (DA) .16 7.1.4 Byte counter (BC)16 7.1.5 Application Data (ADATA) .16 7.2 Secure frame structure16 7.2.1 General .16 7.2.2 Secure header (SHD) 17 7.2.3 Sequence number field (SNF)18 7.2.4 Plain text data part byte counter (PBC)18 7.
14、2.5 Plain text application data (PADATA).18 7.2.6 Block check code (BCC) 18 7.2.7 Padding (PDG) 18 7.2.8 Message data authentication signature (MDAS).19 8 SCPM processing.19 8.1 Algorithms and processing 19 24767-2 ISO/IEC:2009(E) 3 8.1.1 General .19 8.1.2 Encryption algorithms and encryption calcul
15、ation.19 8.1.3 Data authentication algorithms and data authentication calculation19 8.1.4 Cipher block chaining (CBC) mode 20 8.1.5 SNF initialisation and verification.20 8.1.6 Initialisation vector (IV) value 21 8.2 Secure message frame processing22 8.2.1 General .22 8.2.2 Message frame processing
16、of data authentication only 22 8.2.3 Message frame processing of confidentiality only 23 8.2.4 Message frame processing of data authentication and confidentiality 25 9 Key management27 9.1 General .27 9.2 Key initialisation 27 9.2.1 Initialisation of a user key27 9.2.2 Initialisation of service prov
17、ider keys .30 9.2.3 Initialisation of maker key 32 9.3 Master key update.32 9.3.1 Master key update between KSN and a device 32 9.3.2 Key synchronization 36 9.3.3 Master key update request from a device 38 Annex A (informative) To authorize a key setting node.41 Bibliography42 Figure 1 Use of combin
18、ed technologies against security risks10 Figure 2 General message frame versus secure message frame13 Figure 3 Round trip communications of SCPM .13 Figure 4 Position of SCPM.14 Figure 6 Secure message frame 17 Figure 7 Data format of a secure header (SHD) .17 Figure 8 Encryption employing AES-CBC w
19、ith 128-bit key .19 Figure 9 Data authentication calculation 20 Figure 10 Sequences of SNF initialisation21 Figure 11 Calculation of IV value .21 Figure 13 Secure message frames employing encryption service.25 Figure 14 Secure message frames employing encryption and data authentication services 27 F
20、igure 15 Sequences of user key initialisation .29 Figure 16 Secure message frames of “user key” initialisation.30 Figure 17 Sequences of service provider key initialisation31 Figure 19 Sequences of master key updates controlled by KSN using the DH algorithm 34 Figure 21 Secure message frames of mast
21、er key update Key exchange using DH shared secret key .36 Figure 22 Sequences of master key update for synchronization .37 Figure 23 A state transition diagram of a device during master key update controlled by KSN .38 4 24767-2 ISO/IEC:2009(E) Figure 24 Sequences of master key update requested from
22、 a device .39 Figure 25 A state transition diagram of a device when master key update is requested from the device.40 Figure A.1 An example to authenticate the KSN.41 24767-2 ISO/IEC:2009(E) 5 INFORMATION TECHNOLOGY HOME NETWORK SECURITY Part 2: Internal security services Secure communication protoc
23、ol for middleware (SCPM) FOREWORD 1) ISO (International Organization for Standardization) and IEC (International Electrotechnical Commission) form the specialized system for worldwide standardization. National bodies that are members of ISO or IEC participate in the development of International Stan
24、dards. Their preparation is entrusted to technical committees; any ISO and IEC member body interested in the subject dealt with may participate in this preparatory work. International governmental and non-governmental organizations liaising with ISO and IEC also participate in this preparation. 2) I
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ISOIEC2476722009INFORMATIONTECHNOLOGYHOMENETWORKSECURITYPART2INTERNALSECURITYSERVICESSECURECOMMUNICATIONPROTOCOLFORMIDDLEWARESCPM

链接地址:http://www.mydoc123.com/p-1257124.html