ITU-R M 1223-1997 Evaluation of Security Mechanisms for IMT-2000《IMT-2000安全机制的评估》.pdf
《ITU-R M 1223-1997 Evaluation of Security Mechanisms for IMT-2000《IMT-2000安全机制的评估》.pdf》由会员分享,可在线阅读,更多相关《ITU-R M 1223-1997 Evaluation of Security Mechanisms for IMT-2000《IMT-2000安全机制的评估》.pdf(19页珍藏版)》请在麦多课文档分享上搜索。
1、 . STD-ITU-R RECMN M.1223-ENGL 1797 Li855212 0529235 Li52 Rec . ITU-R M.1223 181 RECOMMENDATION ITU-R M . 1223 EVALUATION OF SECURITY MECHANISMS FOR IMT-2000“ (Question ITU-R 39/8) CONTENTS Introduction scope Structure of the Recommendation Related documents . Definitions Considerations Recommendati
2、on. . 7.1 7.2 Requirements on security mechanisms . Classes of security mechanisms 7.2.1 7.2.2 7.2.3 7.2.4 7.2.5 7.2.6 7.2.7 Authentication mechanisms 7.2.1.1 Symmetric key 7.2.1.2 Asymmetric key 7.2.1.3 Zero knowledge 7.2.2.1 Temporary identities using symmetric key . 7.2.2.2 7.2.2.3 Anonymous acce
3、ss 7.2.3.1 Block ciphers 7.2.3.2 Stream ciphers . Non-cryptographic security mechanisms 7.2.4.1 User verification 7.2.4.2 Registration . 7.2.4.3 Call count Integrity mechanisms 7.2.5.1 Encipherment 7.2.5.2 Symmetric key 7.2.5.3 Asymmetric key Non-repudiation mechanisms . Security management 7.2.7.1
4、Key management . 7.2.7.2 Version management . Anonymity mechanisms Identity confidentiality using asymmetric key Confidentiality mechanisms Annex 1 . Candidate security mechanisms 1 Mutual authentication mechanism based on a secret key check function 1.1 Features provided . 1.2 Initial requirements
5、. 1.3 Mechanism description . 1.3.1 Current registrations 1.3.2 New registrations (1997) Page 182 183 183 183 183 184 185 185 185 185 185 186 187 187 187 187 188 188 188 188 188 188 189 189 189 189 190 190 190 190 190 190 191 191 191 191 192 192 192 * International Mobile Telecommunications-2000 (IM
6、T-200) is also known as Future Public Land Mobile Telecommunication Systems (FPLMTS) . COPYRIGHT International Telecommunications Union/ITU RadiocommunicationsLicensed by Information Handling ServicesSTD-ITU-R RECMN M-1223-ENGL 1777 m Li855212 05272Lb 397 m 182 Rec . ITU-R M.1223 1.4 Evaluation . 1.
7、4.1 Security service provision . 1.4.2 Communications overheads 1.4.3 Administration overheads . 1.4.4 Processing and other hardware overheads 1.4.5 Adherence to international standards 1.4.6 Limitations on use . 2 Unilateral authentication mechanism based on digital signatures 2.1 Features provided
8、 . 2.2 Initial requirements . 2.3 Mechanism description . 2.3.1 Current registrations 2.3.2 New registrations 2.4 Evaluation . 2.4.1 Security service provision . 2.4.2 Communications overheads 2.4.3 Administration overheads . 2.4.4 Processing and other hardware overheads 2.4.5 Adherence to internati
9、onal standards 2.4.6 Limitations on use . Unilateral authentication mechanism based on public key schemes 3.2 Initial requirements . 3.3 Mechanism description . 3.3,l Public key certificates . 3.3.2 The authentication mechanism 3.3.3 A variant . 3.4 Evaluation . 3.4.1 Security service provision . 3.
10、4.2 Communications overheads 3.4.3 Administration overheads . 3.4.4 Processing and other hardware overheads 3.4.5 Adherence to international standards 3.4.6 Limitations on use . 3 3.1 Features provided . Page 193 193 194 194 194 194 194 194 194 194 195 195 195 196 196 196 196 196 196 196 196 197 197
11、 197 198 198 198 198 198 199 199 199 199 199 1 Introduction International Mobile Telecommunications-2000 (iMT.2000). also known as Future Public Land Mobile Telecommuni- cation Systems (FPLMTS). are third generation mobile systems that are scheduled to start service around the year 2000. subject to
12、market considerations . They will provide access. by means of one or more radio links. to a wide range of telecommunication services supported by the fixed telecommunication networks (e.g. PSTNDSDN). and to other services specific to mobile users . A range of mobile terminal types is encompassed. ac
13、cessing terrestrial or satellite-based networks. with terminals being designed for mobile or fixed use . Key features of IMT-2ooO are: - - high degree of commonality of design worldwide. compatibility of services within IMT-2OOO and with fixed networks. COPYRIGHT International Telecommunications Uni
14、on/ITU RadiocommunicationsLicensed by Information Handling ServicesRec. ITU-R M.1223 183 - high quality, - - low cost. use of a small pocket-terminal with worldwide roaming capability, IMT-2000 are defined by a set of interdependent ITU Recommendations of which this one is a member. The subject matt
15、er of JMT-2000 is complex and its representation in the form of Recommendations is evolving. To maintain the pace of progress on the subject it is necessary to produce a sequence of Recommendations on a variety of aspects. The Recommendations strive to avoid apparent conflicts between themselves. Ne
16、vertheless, future Recom- mendations, or revisions, will be used to resolve any discrepancies. Due to the particular radiating nature of wireless communications, IMT-2000 needs to incorporate security measures to prevent transmitted data from being accessed by unauthorized parties. In addition, the
17、nature of mobile communication requires security measures to prevent fraudulent access to services, and misappropriation of provider and operator resources. 2 Scope The scope of this Recommendation is to identify classes of security mechanisms appropriate for implementing the IMT-2000 security featu
18、res defined in Recommendation ITU-R M.1078 on security principles for FPLMTS, and thus for satisfying the FPLMTS security requirements identified in the same Recommendation. Annex 1 to this Recommendation describes specific candidate security mechanisms, and assesses their suitability for use in IMT
19、-2000FFLMTS. This Recommendation is intended to be a starting point for the development of more detailed IMT-2000 Recommen- dations relevant to security which will be developed by various ITU Study Groups. 3 Structure of the Recommendation A number of requirements on security mechanisms are identifi
20、ed in 37.1. Section 7.2 identifies various classes of security mechanisms, and discusses their suitability for implementing the IMT-2000 security features identified in Recommendation ITU-R M.1078. In Annex 1, several candidate security mechanisms for IMT-2OOO are described, and their suitability as
21、sessed. 4 Related documents The following ITU Recommendations contain information on IMT-2000FFLMTS relating to this Recommendation: Recommendation ITU-R M.687: Future Public Land Mobile Telecommunication Systems; Recommendation ITU-R M. 1078: Security principles for Future Public Land Mobile Teleco
22、mmunication Systems (FPLMTS); ITU-T Recommendation F.115: Service objectives and principles for Future Public Land Mobile Telecommu- nication Systems. 5 Definitions The following acronyms are used in this Recommendation: IMUI: international mobile user identity TMUI: temporary mobile user identity I
23、MTI: international mobile terminal identity TMTI: temporary mobile terminal identity SPID: service provider identity NOD: network operator identity COPYRIGHT International Telecommunications Union/ITU RadiocommunicationsLicensed by Information Handling Services184 bu: Ksu: Kpu: Ksigu: Kss: Kps: Ksn:
24、 Kpn: Ks: Au: At: As : An: Ak: Cu: E: D: S: V: H: RND: RES: CERT: CE“: SIG: KO: 1 I 6 Considerations Rec. ITU-R M.1223 user-network operator secret key (symmetric key schemes) user-service provider secret key (symmetric key schemes) user public verification key (asymmetric key schemes) user private
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ITURM12231997EVALUATIONOFSECURITYMECHANISMSFORIMT2000IMT2000 安全 机制 评估 PDF

链接地址:http://www.mydoc123.com/p-791655.html