ITU-T T 36-1997 Security Capabilities for Use with Group 3 Facsimile Terminals Series T Terminals for Telematic Services《三类传真终端的安全能力-T系列 远程信息处理业务的终端 研究组8 41页》.pdf
《ITU-T T 36-1997 Security Capabilities for Use with Group 3 Facsimile Terminals Series T Terminals for Telematic Services《三类传真终端的安全能力-T系列 远程信息处理业务的终端 研究组8 41页》.pdf》由会员分享,可在线阅读,更多相关《ITU-T T 36-1997 Security Capabilities for Use with Group 3 Facsimile Terminals Series T Terminals for Telematic Services《三类传真终端的安全能力-T系列 远程信息处理业务的终端 研究组8 41页》.pdf(40页珍藏版)》请在麦多课文档分享上搜索。
1、 STD-ITU-T RECMN T.3b-ENGL 1777 I 48b2591 Ob3b947 7b4 INTERNATIONAL TELECOMM UN KATION UNION ITU=T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU T.36 (07197) SERIES T: TERMINALS FOR TELEMATIC SERVICES Security capabilities for use with Group 3 facsimile terminals ITU-T Recommendation T.36 (Previou
2、sly CCITT Recommendation) STD-ITU-T RECMN T.3b-ENGL 1997 m 48b2591 Ob3b948 bTO ITU-T T-SERIES RECOMMENDATIONS TERMINALS FOR TELEMATIC SERVICES For further details, please refer to ITU-T List of Recommendations. ITU-T RECOMMENDATION T.36 SECURITY CAPABILITIES FOR USE WITH GROUP 3 FACSIMILE TERMINALS
3、Summary This Recommendation defines the two independent technical solutions which may be used in the context of secure facsimile transmission. The two technical solutions are based upon the HKM/HFX40 algorithms and the RSA algorithm. Annex A contains information regarding the HKWHFX4O algorithms. An
4、nex B contains information regarding the RSA algorithm. Annex C describes the use of the HKM system to provide secure key management capabilities for facsimile terminals. The provision of the capabilities is described in terms of two main procedures: - the procedure for one way registration between
5、entities X and Y (procREGxy); and - the procedure for the secure transmission of a secret key between entities X and Y (procSTKxy). Annex D covers the procedures for the use of the HFX4O carrier cipher system to provide message confidentiality for facsimile terminals. Annex E describes the HFX40-I h
6、ashing algorithm, in terms of its use, the necessary calculations and the information to be exchanged between the facsimile terminais to provide integrity for a transmitted facsimile message as either a selected or pre-programmed alternative to the encryption of the message. Source ITU-T Recommendat
7、ion T.36 was prepared by ITU-T Study Group 8 (1997-2000) and was approved under the WTSC Resolution No. 1 procedure on the 2nd of July 1997. Recommendation T.36 (07/97) i FOREWORD ITU (International Telecommunication Union) is the United Nations Specialized Agency in the field of telecommuni- cation
8、s. The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of the ITU. The ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing telecommunications on a worldwide basis. The World Telecommuni
9、cation Standardization Conference (WTSC), which meets every four years, establishes the topics for study by the ITU-T Study Groups which, in their turn, produce Recommendations on these topics. The approval of Recommendations by the Members of the ITU-T is covered by the procedure laid down in WTSC
10、Resolution No. 1. In some areas of information technology which fall within ITU-Ts purview, the necessary standards are prepared on a collaborative basis with IS0 and IEC. NOTE In this Recommendation, the expression “Administration“ is used for conciseness to indicate both a telecommunication admini
11、stration and a recognized operating agency. INTELLECTUAL PROPERTY RIGHTS The ITU draws attention to the possibility that the practice or implementation of this Recommendation may involve the use of a claimed Intellectual Property Right. The ITU takes no position concerning the evidence, validity or
12、applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others outside of the Recommendation development process. As of the date of approval of this Recommendation, the ITU hadhad not received notice of intellectual property, protected by patents, which may be requi
13、red to implement this Recommendation. However, implementors are cautioned that this may not represent the latest information and are therefore strongly urged to consult the TSB patent database. O ITU 1997 All rights reserved. No part of this publication may be reproduced or utilized in any form or b
14、y any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from the ITU. 11 Recommendation T.36 (07/97) CONTENTS i Scope 2 References 3 Abbreviations . Annex A - Procedures for secure Group 3 document facsimile transmission using the HKM and HFX system
15、 A.l Introduction . A.2 Outline of the secure facsimile document procedure Annex B - Security in facsimile G3 based on the RSA algorithm B.l Preamble . B.2 Introduction . B.3 References . B.4 Technical description AnnexC-Procedures for the use of the HKM key management system for secure document fac
16、simile transmission c . 1 c.2 c.3 c.4 c.5 C.6 Scope . Conventions C.2.1 General Description of the HKM algorithm for use with facsimile terminals Registration mode . (2.4.1 Procedure for the registration between entities X and Y (procREGxy) C.4.2 Procedure for the registration between entities Y and
17、 X (procREGyx) C.4.3 Procedure for registration in a single call C.4.4 Authentication of registration Secure mode C.5. I Procedure for the secure transmission of SK from X to Y (procSTKxy) C.5.2 Use ofprocSTKxy and procSTKyx in secure mode . C.5.3 Mutual authentication of X and Y . C.5.4 Secre sessi
18、on key establishment between X and Y . C.5.5 Confirmation of receipt . C.5.6 Confirmation or denial of integrity . The HKM algorithm C.2.2 Symbols . C.6.1 C.6.2 C.6.3 C.6.4 C.6.5 (2.6.6 Introduction . Stored information Securely stored information Registration mode . C.6.4.1 procREGxy using algebrai
19、c notation C.6.4.2 Calculations at X to derive MPx . C.6.4.3 Calculations at X to derive TKx (2.6.4.4 C.6.4.5 Calculations at Y to derive RCNy . Secure mode C.6.5.1 procSTKxy using algebraic notation . C.6.5.2 Calculations at X to re-create MPx . C.6.5.3 Calculations at X to form ESSKx using HKMD+l
20、. C.6.5.4 Calculations at Y to recover SKx Calculations at Y to recover MPx by decrypting TKx The use of the HKM algorithm in secure mode Recommendation T.36 (07/97) Page 1 1 1 3 3 3 4 4 4 4 4 4 4 5 5 5 5 6 6 6 6 7 8 8 8 8 9 10 10 11 11 11 II 12 12 12 13 14 15 16 16 16 17 18 21 . III Page Annex D .
21、Procedures for the use of the HFX40 carrier cipher to provide message confidentiality for secure document facsimile transmission D.l Scope . D.2 Description of the HFX4O algorithm for use with facsimile terminals in secure mode D.3 D.3.1 Introduction . D.3.2 Stored information D.3.3 Selection of the
22、 primes D.3.4 D.3.5 Use of the tables to encrypt the message and of the multiplexer to modify the tables Annex E - Procedures for the use of the HFX40-I hashing system to provide message integrity for secure document facsimile transmission E.l Scope . E.2 Use ofthe HFX40-I hashing system . E.3 The H
23、FX40-I hashing system for use with facsimile terminals Re-ordering of the system modulating prime numbers . Calculation of the primitives to be used with HFX4O-I First encryption (scrambling) of PH to form SH . Encryption of SH to form ESH . Use of the HKM Algorithm to produce a PseudoRandom Sequenc
24、e . Calculations using HKM to generate a PRS Example calculations for the HFX40 algorithm . Calculations using HFX40 to generate 3 PRSs . E.3.1 Introduction . E.3.2 Stored information E.3.3 E.3.4 E.3.5 Calculation of PH E.3.6 E.3.7 E.4.1 Introduction . E.4 E.4.1.1 21 21 22 22 22 23 23 23 24 27 27 27
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ITUTT361997SECURITYCAPABILITIESFORUSEWITHGROUP3FACSIMILETERMINALSSERIESTTERMINALSFORTELEMATICSERVICES

链接地址:http://www.mydoc123.com/p-803660.html