ANSI INCITS ISO IEC 11770-2-1996 Information technology - Security techniques - Key management - Part 2 Mechanisms using symmetric techniques.pdf
《ANSI INCITS ISO IEC 11770-2-1996 Information technology - Security techniques - Key management - Part 2 Mechanisms using symmetric techniques.pdf》由会员分享,可在线阅读,更多相关《ANSI INCITS ISO IEC 11770-2-1996 Information technology - Security techniques - Key management - Part 2 Mechanisms using symmetric techniques.pdf(20页珍藏版)》请在麦多课文档分享上搜索。
1、INTERNATIONAL STANDARD ISO/IEC I 1770-2 First edition 1996-04-I 5 Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques Technologies de /information - Techniques de s see for example IS0 8732. Besides key establishment, goals of such a mechanis
2、m may include unilateral or mutual authentication of the communicating entities. Further goals may be the verification of the integrity of the established key, or key confirmation. The following standards contain provisions which, through reference in this text, constitute provisions of this part of
3、 ISO/IEC 11770. At the time of publication, the editions indicated were valid. All standards are subject to revision, and parties to agreements based on this part of ISO/IEC 11770 are encouraged to investigate the possibility of applying the most recent editions of the standards indicated below. Mem
4、bers of IEC and IS0 maintain registers of currently valid International Standards. IS0 7498-2: 1989, Information processing systems - Open Systems Interconnection - Basic Reference Model - Part 2: Security Architecture. ISO/IEC 9798-2: 1994, Information technology - Security techniques - Entity auth
5、entication - Part 2: Mechanisms using symmetric encipherment algorithms. This part of ISO/IEC 11770 addresses three environments for the establishment of keys: Point-to-Point, Key Distribution Centre (KDC) and Key Translation Centre (KTC). This part of ISOiIEC 11770 describes the required content of
6、 messages which carry keying material or are necessary to set up the conditions under which the keying material can be established. The document does not indicate other information which may be contained in the messages or specify other messages such as error messages. The explicit format of message
7、s is not within the scope of this part of ISO/IEC 11770. ISOIIEC 9798-4: 1995, Information technology - Security techniques - Entity authentication - Part 4: Mechanisms using a cryptographic check function. lSO/lEC 11770-l: - , Information technology - Security techniques - Key management - Part I:
8、Key management framework. 3 Definitions and Notation 3.1 Definitions This part of ISO/IEC 11770 does not explicitly address the issue of interdomain key management. This part of ISO/IEC 11770 also does not define the implementation of key management mechanisms; there may be different products that c
9、omply with this part of ISO/IEC 11770 and yet are not compatible. For the purposes of this part of ISO/IEC 11770 the definitions given in ISO/IEC 11770-l apply. In addition, this part of ISO/IEC 11770 makes use of the following terms: 3.1.1 distinguishing identifier: Information which unambiguously
10、distinguishes an entity. 1 To be published. 1 ISO/IEC 11770-2:1996(E) ISO/IEC 3.1.2 3.1.3 3.1.4 3.1.5 3.1.6 3.1.7 3.1.8 3.1.9 3.1.10 entity authentication: The corroboration that an entity is the one claimed. key confirmation: The assurance for one entity that another identified entity is in possess
11、ion of the correct key. key control: The ability to choose the key, or the parameters used in the key computation. key generating function: A function which takes as input a number of parameters, at least one of which shall be secret, and which gives as output keys appropriate for the intended algor
12、ithm and application. The function shall have the property that it shall be computationally infeasible to deduce the output without prior knowledge of the secret input. point-to-point key establishment: The direct establishment of keys between entities, without involving a third party. random number
13、: A time variant parameter whose value is unpredictable. redundancy: Any information that is known and can be checked. sequence number: A time variant parameter whose value is taken from a specified sequence which is non-repeating within a certain time period. time variant parameter: A data item use
14、d to verify that a message is not a replay, such as a random number, a sequence number, or a time stamp. 3.2 Notation Throughout this part of ISO/IEC 11770 the following notation is used: x is the distinguishing identifier of entity X. KDC denotes a Key Distribution Centre. KTC denotes a Key Transla
15、tion Centre. T is the distinguishing identifier of the Key Distribution Centre or the Key Translation Centre. F denotes keying material. KXY is a secret key associated with the entities X and Y. R is a random number. Rx is a random number issued by entity X. T/N is a time stamp or a sequence number.
16、 Txmx is a time stamp or a sequence number issued by entity X. TVP is a time variant parameter. TVPx eK(Z) WZ) VW) f x II y is a time variant parameter issued by entity X. is the result of the encipherment of data Z with a symmetric algorithm using the key K. is the result of the decipherment of dat
17、a Z with a symmetric algorithm using the key K. is the result of a cryptographic check function computed on data Z using the key K. vK(Z) is also called message authentication code (MAC) and may be denoted as macK(Z). denotes a key generating function. is the result of the concatenation of data item
18、s X and Y in that order. The fields Textl, Text2, . . . specified in the mechanisms may contain optional data for use in applications outside the scope of this part of ISO/IEC 11770 (they may be empty). Their relationship and contents depend upon the specific application. One such possible applicati
19、on is message authentication (see annex B for an example). Likewise, optional plaintext text fields may be prepended or appended to any of the messages. They have no security implications and are not explicitly included in the mechanisms specified in this part of ISO/IEC 11770. Data items that are o
20、ptional in the mechanisms are shown in italics. 4 Requirements The key establishment mechanisms specified in this part of ISO/IEC 11770 make use of symmetric cryptographic techniques, more specifically symmetric encipherment algorithms and/or key generating functions. The cryptographic algorithms an
21、d the key life-time shall be chosen such that it is computationally infeasible for a key to be deduced during its life-time. If the following additional requirements are not met, the key establishment process may be compromised or it cannot be implemented. For those mechanisms making use of a symmet
22、ric encipherment algorithm, either assumption a) or assumption b) is required. 4 The encipherment algorithm, its mode of operation and the redundancy in the plaintext shall provide the recipient with the means to detect forged or manipulated data. b) The integrity of the enciphered data shall be ens
23、ured by a data integrity mechanism. If a hash-function is used for this purpose the hash-code shall either be appended to the data before encipherment or be placed in a plaintext text field. ISO/IEC ISO/IEC 11770-2:1996(E) NOTES 5.1 Key Establishment Mechanism 1 1 - Modes of operation for block ciph
24、er algorithms are standardized in ISOiIEC 10116. 2 - A data integrity mechanism is standardized in ISO/IEC 9797. Hash-functions are standardized in ISO/IEC 10118. 3 - When a KDC or KTC is involved, assumptions a) and b) are not always equivalent in terms of the ability to detect unambiguously on whi
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ANSIINCITSISOIEC1177021996INFORMATIONTECHNOLOGYSECURITYTECHNIQUESKEYMANAGEMENTPART2MECHANISMSUSINGSYMMETRICTECHNIQUESPDF

链接地址:http://www.mydoc123.com/p-436071.html