BS ISO IEC 11577-1995 Information technology - Open systems interconnection - Network layer security protocol《信息技术 开放式系统互连 网络层安全协议》.pdf
《BS ISO IEC 11577-1995 Information technology - Open systems interconnection - Network layer security protocol《信息技术 开放式系统互连 网络层安全协议》.pdf》由会员分享,可在线阅读,更多相关《BS ISO IEC 11577-1995 Information technology - Open systems interconnection - Network layer security protocol《信息技术 开放式系统互连 网络层安全协议》.pdf(112页珍藏版)》请在麦多课文档分享上搜索。
1、BRITISH STANDARD BS ISO/IEC 11577:1995 Implementation of ISO/IEC 11577:1995 Information technology Open Systems Interconnection Network layer security protocolBSISO/IEC11577:1995 This British Standard, having been prepared under the directionof the Information Systems Technology Assembly,was publish
2、ed underthe authority of the Standards Board and comes intoeffect on 15October1995 BSI 02-2000 The following BSI references relate to the work on this standard: Committee reference IST/6 Draft for comment 93/640428 DC ISBN 0 580 24807 0 Committees responsible for this BritishStandard The preparation
3、 of this British Standard was entrusted to Technical Committee IST/6, Data communications, upon which the following bodies were represented: British Computer Society British Telecommunications plc CCTA (the Government Centre for Information Systems) Digital Equipment Co. Ltd. IBM United Kingdom Ltd.
4、 Institution of Electrical Engineers International Computers Limited Logica UK Ltd. Nine Tiles Computer Systems Ltd. Rank Xerox (UK) Ltd. Amendments issued since publication Amd. No. Date CommentsBSISO/IEC11577:1995 BSI 02-2000 i Contents Page Committees responsible Inside front cover National forew
5、ord ii Foreword vi Text of ISO/IEC 11577 1BSISO/IEC11577:1995 ii BSI 02-2000 National foreword This British Standard reproduces verbatim ISO/IEC11577:1995 and implements it as the UK national standard. This British Standard is published under the direction of the Information Systems Technology Assem
6、bly whose Technical Committee IST/6 has the responsibility to: aid enquirers to understand the text; present to the responsible international committee any enquiries on interpretation, or proposals for change, and keep UK interests informed; monitor related international and European developments an
7、d promulgate them in the UK. NOTEInternational and European Standards, as well as overseas standards, are available from Customer Services, BSI, 389 Chiswick High Road, London W4 4AL. A British Standard does not purport to include all the necessary provisions of a contract. Users of British Standard
8、s are responsible for their correct application. Compliance with a British Standard does not of itself confer immunity from legal obligations. Summary of pages This document comprises a front cover, an inside front cover, pages i and ii, theISO/IEC title page, pages ii to vi, pages 1 to 100 and a ba
9、ck cover. This standard has been updated (see copyright date) and may have had amendments incorporated. This will be indicated in the amendment table on the inside front cover.ISO/IEC11577:1995(E) ii BSI 02-2000 Contents Page Foreword vi Introduction 1 1 Scope 1 2 Normative references 2 2.1 Identica
10、l Recommendations|International Standards 2 2.2 Paired Recommendations|International Standards equivalent in technical content 2 2.3 Additional References 3 3 Definitions 3 3.1 Reference Model definitions 3 3.2 Security Architecture definitions 3 3.3 Service Convention definitions 4 3.4 Network Serv
11、ice definitions 4 3.5 Internal Organisation of the Network Layer definitions 4 3.6 Connectionless Network Protocol definitions 4 3.7 Upper Layer Security Model definitions 4 3.8 Conformance Testing definitions 4 3.9 Additional definitions 4 4 Abbreviations 5 4.1 Data Units 5 4.2 Protocol Data Unit F
12、ields 5 4.3 Parameters 5 4.4 Miscellaneous 6 5 Overview of the Protocol 6 5.1 Introduction 6 5.2 Overview of Services Provided 7 5.3 Overview of Services Assumed 7 5.4 Security Associations and Security Rules 8 5.5 Overview of Protocol Protection Functions 9 5.6 Overview of Protocol NLSP-CL 10 5.7 O
13、verview of Protocol NLSP-CO 11 6 Protocol Functions Common to NLSP-CL and NLSP-CO 13 6.1 Introduction 13 6.2 Common SA Attributes 13 6.3 Common Functions on a Request for an Instance of Communication 14 6.4 Secure Data Transfer Protocol Functions 14 6.5 Use of a Security Association Protocol 16 7 Pr
14、otocol Functions FOR NLSP-CL 16 7.1 Services Provided by NLSP-CL 16 7.2 Services Assumed 17 7.3 Security Association Attributes 17 7.4 Checks 17 7.5 In-Band SA Establishment 17 7.6 Processing NLSP-UNITDATA Request 17 7.7 Processing UN-UNITDATA Indication 18 8 Protocol Functions for NLSP-CO 19 8.1 Se
15、rvices Provided by NLSP-CO 19 8.2 Services Assumed 19 8.3 Security Association Attributes 21ISO/IEC11577:1995(E) BSI 02-2000 iii Page 8.4 Checks and other Common Functions 21 8.5 NLSP-Connect Functions 22 8.6 NLSP-DATA Functions 32 8.7 NLSP-EXPEDITED-DATA Functions 33 8.8 RESET Functions 34 8.9 NLSP
16、-DATA ACKNOWLEDGE 35 8.10 NLSP-DISCONNECT 35 8.11 Other Functions 38 8.12 Peer Entity Authentication 39 9 Overview of Mechanisms used 40 9.1 Security Services and Mechanisms 40 9.2 Functions Supported 41 10 Connection security control (NLSP-CO only) 41 10.1 Overview 41 10.2 SA-Attributes 42 10.3 Pro
17、cedures 43 10.4 CSC-PDU Fields used 44 11 SDT PDU Based encapsulation Function 44 11.1 Overview 44 11.2 SA Attributes 44 11.3 Procedures 46 11.4 PDU Fields used 48 12 No-Header Encapsulation Function (NLSP-CO only) 48 12.1 Overview 48 12.2 SA Attributes 48 12.3 Procedures 49 13 Structure and Encodin
18、g of PDUS 49 13.1 Introduction 49 13.2 Content Field Format 50 13.3 Protected Data 50 13.4 Security Association PDU 55 13.5 Connection Security Control PDU 56 14 Conformance 58 14.1 Static Conformance Requirements 58 14.2 Dynamic Conformance Requirements 59 14.3 Protocol Implementation Conformance S
19、tatement 60 Annex A Mapping UN primitives to CCITT Rec. X.213|ISO 8348 61 Annex B Mapping UN Primitives to CCITT Rec. X.25|ISO 8208 61 Annex C Security Association Protocol Using Key Token Exchange andDigitalSignatures 62 C.1 Overview 62 C.2 Key Token Exchange (KTE) 63 C.3 SA-Protocol Authentication
20、 63 C.4 SA Attribute Negotiation 63 C.5 SA Abort/Release 65 C.6 Mapping of SA-Protocol Functions to Protocol Exchanges 65 C.7 SA PDU SA Contents 67 Annex D NLSP PICS Proforma 71 D.1 Introduction 71ISO/IEC11577:1995(E) iv BSI 02-2000 Page D.2 Abbreviations and Special Symbols 71 D.3 Instructions for
21、Completing the PICS Proforma 71 D.4 Identification 73 D.5 Features Common to NLSP-CO and NLSP-CL 74 D.6 Features Specific to NLSP-CL 78 D.7 Features Specific to NLSP-CO 79 Annex E Tutorial on some Basic Concepts of NLSP 82 E.1 Basis of Protection 82 E.2 Underlying vs NLSP Service 82 E.3 NLSP Address
22、ing 83 E.4 Connection Mode NLSP 87 E.5 Connectionless Mode NLSP 88 E.6 Security Attributes and Associations 93 E.7 Dynamic Functional Relationship between NLSP and CLNP 93 E.8 Dynamic Functionality Related to Layered Model 95 Annex F Example of an Agreed Set of Security Rules 97 Annex G Security Ass
23、ociations and Attributes 98 Annex H Example Key Token Exchange EKE Algorithm 99 Figure 8-1 Service Primitive Time Sequence Diagram for NLSP-CONNECT in UN-CONNECT 24 Figure 8-2 Service Primitive Time Sequence Diagram for NLSP-CONNECT in UN-CONNECT with SA-P 27 Figure 8-3 Service Primitive Time Sequen
24、ce Diagram for NLSP-CONNECT in UN-DATA 29 Figure 8-4 Service Primitive Time Sequence Diagram for NLSP-DISCONNECT 36 Figure 8-5 NLSP initiated disconnect due to an unsuccessful SA-P 38 Figure 13-1 Content Field 50 Figure 13-2 Generic Secure Data Transfer PDU Structure 51 Figure 13-3 Confidentiality o
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- BSISOIEC115771995INFORMATIONTECHNOLOGYOPENSYSTEMSINTERCONNECTIONNETWORKLAYERSECURITYPROTOCOL 信息技术 开放式

链接地址:http://www.mydoc123.com/p-396228.html