ETSI TS 102 165-2-2007 Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN) Methods and protocols Part 2 Protocol Framework Definition _1.pdf
《ETSI TS 102 165-2-2007 Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN) Methods and protocols Part 2 Protocol Framework Definition _1.pdf》由会员分享,可在线阅读,更多相关《ETSI TS 102 165-2-2007 Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN) Methods and protocols Part 2 Protocol Framework Definition _1.pdf(51页珍藏版)》请在麦多课文档分享上搜索。
1、 ETSI TS 102 165-2 V4.2.1 (2007-02)Technical Specification Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN);Methods and protocols; Part 2: Protocol Framework Definition; Security Counter MeasuresETSI ETSI TS 102 165-2 V4.2.1 (2007-02) 2 Reference RTS/
2、TISPAN-07007-Tech Keywords IP, Protocol, Security, VoIP ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Importan
3、t notice Individual copies of the present document can be downloaded from: http:/www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Po
4、rtable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Informat
5、ion on the current status of this and other ETSI documents is available at http:/portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part
6、may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. European Telecommunications Standards Institute 2007. All rights reserved. DECTTM, PLUGTESTSTM and UMTSTM are Trade Marks of ETSI registered for the benefit
7、of its Members. TIPHONTMand the TIPHON logo are Trade Marks currently being registered by ETSI for the benefit of its Members. 3GPPTM is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. ETSI ETSI TS 102 165-2 V4.2.1 (2007-02) 3 Contents Intellec
8、tual Property Rights6 Foreword.6 Introduction 6 1 Scope 8 2 References 8 3 Definitions and abbreviations.10 3.1 Definitions10 3.2 Abbreviations .11 3.3 Notation11 4 Architecture considerations for security in ICT .12 4.1 Mapping to 3GPP and NGN architectures .13 4.2 Use of functions from ISO/IEC 154
9、08.13 4.3 Requirements model in communications security13 5 Authentication counter-measures.14 5.1 Introduction 14 5.1.1 Single versus multi-factor authentication .16 5.1.1.1 Behavioural extension for authentication models .16 5.2 Authentication service requirements 16 5.3 Overall stage 1 model for
10、authentication18 5.3.1 Procedures.18 5.3.1.1 Provision/withdrawal 18 5.3.1.2 Normal procedures18 5.3.1.2.1 Invocation and operation .18 5.3.1.3 Exceptional procedures .18 5.3.1.3.1 Activation/deactivation/registration/interrogation.18 5.3.1.3.2 Invocation and operation .18 5.3.2 Interactions with ot
11、her security services.19 5.3.3 Interworking considerations19 5.4 Specific authentication models (stage 2 models)19 5.4.1 Challenge response authentication19 5.4.2 Authenticate service capability.22 5.4.3 Message authentication code model .26 5.4.3.1 Hash function-based MAC27 5.4.3.2 Block cipher MAC
12、 27 5.4.4 Digital signature27 6 Access control counter-measures .28 6.1 Introduction 28 6.2 Overall stage 1 model for access control29 6.2.1 Procedures.29 6.2.1.1 Provision/withdrawal 29 6.2.1.2 Normal procedures29 6.2.1.2.1 Activation/deactivation/registration/interrogation.29 6.2.1.2.2 Invocation
13、and operation .29 6.2.1.3 Exceptional procedures .29 6.2.1.3.1 Activation/deactivation/registration/interrogation.29 6.2.1.3.2 Invocation and operation .30 6.2.2 Interactions with other security services.30 6.2.3 Interworking considerations30 6.3 Specific access control models (stage 2 models)30 7 C
14、onfidentiality service .32 7.1 Introduction 32 ETSI ETSI TS 102 165-2 V4.2.1 (2007-02) 4 7.2 Provided services32 7.2.1 Description32 7.2.2 Encryption mechanism .33 7.2.3 Implicit authentication 33 7.3 Overall stage 1 model for confidentiality.34 7.3.1 Procedures.34 7.3.1.1 Provision/withdrawal 34 7.
15、3.1.2 Normal procedures34 7.3.1.2.1 Activation/deactivation/registration/interrogation.34 7.3.1.2.2 Invocation and operation .34 7.3.1.3 Exceptional procedures .34 7.3.1.3.1 Activation/deactivation/registration/interrogation.34 7.3.1.3.2 Invocation and operation .34 7.3.2 Interactions with other sec
16、urity services.34 7.3.3 Interworking considerations34 7.4 Specific confidentiality models (stage 2 models).34 8 Integrity service35 8.1 Introduction 35 8.2 Provided services35 8.3 Requirements statements for integrity service functional capabilities (ISO/IEC 15408-2)36 8.4 Overall stage 1 model for
17、integrity.37 8.4.1 Procedures.37 8.4.1.1 Provision/withdrawal 37 8.4.1.2 Normal procedures37 8.4.1.2.1 Activation/deactivation/registration/interrogation.37 8.4.1.2.2 Invocation and operation .37 8.4.1.3 Exceptional procedures .37 8.4.1.3.1 Activation/deactivation/registration/interrogation.37 8.4.1
18、.3.2 Invocation and operation .37 8.4.2 Interactions with other security services.37 8.4.3 Interworking considerations37 8.5 Specific integrity models (stage 2 models).37 8.6 Implicit authentication38 9 Non-repudiation service .38 9.1 Overview 38 9.2 Requirements statements for non-repudiation servi
19、ce functional capabilities (ISO/IEC 15408-2)39 9.3 Overall stage 1 model for non-repudiation.40 9.3.1 Procedures.40 9.3.1.1 Provision/withdrawal 40 9.3.1.2 Normal procedures40 9.3.1.2.1 Activation/deactivation/registration/interrogation.40 9.3.1.2.2 Invocation and operation .40 9.3.1.3 Exceptional p
20、rocedures .40 9.3.1.3.1 Activation/deactivation/registration/interrogation.40 9.3.1.3.2 Invocation and operation .40 9.3.2 Interactions with other security services.41 9.3.3 Interworking considerations41 9.4 Specific non-repudiation stage 2 models41 10 Subscription Services .42 11 Authorization serv
21、ices42 12 Key management service42 12.1 Overview 42 12.2 Symmetric key management 43 12.3 Asymmetric key management 44 12.3.1 Overview 44 12.3.2 Certificate generation44 12.3.3 Certificate extension .44 12.3.4 Certification authority.45 ETSI ETSI TS 102 165-2 V4.2.1 (2007-02) 5 Annex A (informative)
22、: Modelling techniques in countermeasure development .46 A.1 Introduction 46 A.2 Use of UML patterns46 A.3 Use of UML stereotypes.46 Annex B (informative): Use of IPsec to implement countermeasures .47 B.1 Overview 47 B.1.1 Identification of principals .48 B.2 IPsec architecture .48 B.3 Key manageme
23、nt for IPsec.48 B.4 IPsec implementation of authentication and integrity48 B.4.1 Authentication algorithm selection.48 B.4.1.1 Combined algorithm selection 48 B.5 IPsec implementation of data confidentiality.49 B.5.1 Confidentiality algorithm selection 49 B.5.1.1 Combined algorithm selection 49 B.5.
24、2 Requirements on the construction of the IV.49 B.5.3 Application of AES-CBC.49 Annex C (informative): Bibliography.50 History 51 ETSI ETSI TS 102 165-2 V4.2.1 (2007-02) 6 Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ETSITS10216522007TELECOMMUNICATIONSANDINTERNETCONVERGEDSERVICESANDPROTOCOLSFORADVANCEDNETWORKINGTISPANMETHODSANDPROTOCOLSPART2PROTOCOLFRAMEWORKDEFINITION_1PDF

链接地址:http://www.mydoc123.com/p-738771.html