ATIS T1 TR 40A-1998 Security Requirements for Electronic Bonding Between Two TMNs.pdf
《ATIS T1 TR 40A-1998 Security Requirements for Electronic Bonding Between Two TMNs.pdf》由会员分享,可在线阅读,更多相关《ATIS T1 TR 40A-1998 Security Requirements for Electronic Bonding Between Two TMNs.pdf(4页珍藏版)》请在麦多课文档分享上搜索。
1、Report No. 40a Supplement toTechnical Report No. 40June 1998 on SecurityRequirementsfor Electronic BondingBetween Two TMNsPrepared byT1M1.5Working GrouponOAM&P Architecture,Interfaces and ProtocolsCommittee T1 is sponsored by the Alliance for Telecommunications Industry SolutionsAccredited by Americ
2、an National Standards InstituteCopyright 1998 by Alliance for Telecommunications IndustrySolutions All rights reserved.No part of this publication may be reproduced in any form, in an electronic retrieval system or otherwise, without the prior written permission of the publisher.Addenda to T1 Techni
3、cal Report No 40This document provides addenda to T1 TR 40 that reflect changes in ElectronicBonding security procedures well as some clarifications.Addendum 1Change to the syntax of the authenticatorTR 40 proposes to use a specific authenticator (defined in section 4.2 of the TR) tobe carried in th
4、e access control field of CMIP management operations PDUs. Inorder to conform with ANSI Standard T1.228 the “VisibleString” in theauthenticator is changed to “GraphicString”.Addendum 2Vulnerability of the authenticator and remedy1. BackgroundThis addendum describes a security weakness in the EB auth
5、enticator and providesa remedy.2. ProblemThe EB security authenticator consists of an Initialization Vector (IV) and a DESencrypted ASCII representation of GeneralizedTime, optionally followed by asequence number, as well as some other information not relevant to this discussion.The problem is first
6、 introduced assuming that no sequence number is used, then thecase that includes the sequence number is discussed.2.1 No sequence numberAn intruder can make copies of EB authenticators transmitted in the course of oneor more days on a given association. For each copy the intruder notes the timewhen
7、the authenticator has been transmitted and the ID of the encryption key. Onany subsequent day, while the same encryption key is used, the intruder can replay acaptured authenticator at the exact time of day when it was initially transmitted,with an appropriately designed IV as follows: For the initi
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ATIST1TR40A1998SECURITYREQUIREMENTSFORELECTRONICBONDINGBETWEENTWOTMNSPDF

链接地址:http://www.mydoc123.com/p-541638.html