BS-ISO-IEC-10736-1995.pdf

上传人:爱问知识人 文档编号:3748770 上传时间:2019-09-22 格式:PDF 页数:62 大小:639.57KB
返回 下载 相关 举报
BS-ISO-IEC-10736-1995.pdf_第1页
第1页 / 共62页
BS-ISO-IEC-10736-1995.pdf_第2页
第2页 / 共62页
BS-ISO-IEC-10736-1995.pdf_第3页
第3页 / 共62页
BS-ISO-IEC-10736-1995.pdf_第4页
第4页 / 共62页
BS-ISO-IEC-10736-1995.pdf_第5页
第5页 / 共62页
亲,该文档总共62页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述

《BS-ISO-IEC-10736-1995.pdf》由会员分享,可在线阅读,更多相关《BS-ISO-IEC-10736-1995.pdf(62页珍藏版)》请在三一文库上搜索。

1、BRITISH STANDARD BS ISO/IEC 10736:1995 Implementation of ISO/IEC 10736:1995 Information technology Telecommunications and information exchange between systems Transport layer security protocol Licensed Copy: sheffieldun sheffieldun, na, Wed Nov 22 06:51:22 GMT+00:00 2006, Uncontrolled Copy, (c) BSI

2、BS ISO/IEC 10736:1995 This British Standard, having been prepared under the direction of the Information Systems Technology Assembly, was published under the authority of the Standards Board and comes into effect on 15 September 1995 BSI 01-2000 The following BSI references relate to the work on thi

3、s standard: Committee reference IST/6 Draft for comment 91/69325 DC ISBN 0 580 24459 8 Committees responsible for this British Standard The preparation of this British Standard was entrusted to Technical Committee IST/6 Data communications, upon which the following bodies were represented: British C

4、omputer Society British Telecommunications CCTA (Government Centre for Information Systems) Digital Equipment Co. Ltd. IBM United Kingdom Ltd. Institution of Electrical Engineers International Computers Limited Logica UK Ltd. Nine Tiles Computer Systems Ltd. Rank Xerox (UK) Ltd. Amendments issued si

5、nce publication Amd. No.DateComments Licensed Copy: sheffieldun sheffieldun, na, Wed Nov 22 06:51:22 GMT+00:00 2006, Uncontrolled Copy, (c) BSI BS ISO/IEC 10736:1995 BSI 01-2000i Contents Page Committees responsibleInside front cover National forewordii Forewordvii Text of ISO/IEC 107361 Licensed Co

6、py: sheffieldun sheffieldun, na, Wed Nov 22 06:51:22 GMT+00:00 2006, Uncontrolled Copy, (c) BSI BS ISO/IEC 10736:1995 ii BSI 01-2000 National foreword This British Standard reproduces verbatim ISO/IEC 10736:1995 and implements it as the UK national standard. This British Standard is published under

7、the direction of the Information Systems Technology Assembly whose Technical Committee IST/6, Data communications, has the responsibility to: aid enquirers to understand the text; present to the responsible international committee any enquiries on interpretation, or proposals for change, and keep UK

8、 interests informed; monitor related international and European developments and promulgate them in the UK. NOTEInternational and European Standards, as well as overseas standards, are available from Customer Services, BSI, 389 Chiswick High Road, London W4 4AL. A British Standard does not purport t

9、o include all the necessary provisions of a contract. Users of British Standards are responsible for their correct application. Compliance with a British Standard does not of itself confer immunity from legal obligations. Summary of pages This document comprises a front cover, an inside front cover,

10、 pages i and ii, the ISO/IEC title page, pages ii to viii, pages 1 to 48 and a back cover. This standard has been updated (see copyright date) and may have had amendments incorporated. This will be indicated in the amendment table on the inside front cover. Licensed Copy: sheffieldun sheffieldun, na

11、, Wed Nov 22 06:51:22 GMT+00:00 2006, Uncontrolled Copy, (c) BSI Licensed Copy: sheffieldun sheffieldun, na, Wed Nov 22 06:51:22 GMT+00:00 2006, Uncontrolled Copy, (c) BSI ISO/IEC 10736:1995(E) ii BSI 01-2000 Contents Page Forewordvii Introduction1 1Scope1 2Normative references2 2.1Identical Recomme

12、ndations|International Standards2 2.2Paired Recommendations|International Standards equivalent in technical content2 2.3Additional references2 3Definitions3 3.1Security reference model definitions3 3.2Additional definitions3 4Symbols and abbreviations4 5Overview of the Protocol5 5.1Introduction5 5.2

13、Security Associations and attributes6 5.2.1Security services for connection-oriented Transport protocol9 5.2.2Security Service for connectionless Transport protocol9 5.3Service assumed of the Network Layer9 5.4Security management requirements9 5.5Minimum algorithm characteristics10 5.6Security encap

14、sulation function10 5.6.1Data encipherment function10 5.6.2Integrity function10 5.6.3Security label function11 5.6.4Security padding function11 5.6.5Peer Entity Authentication function11 5.6.6SA Function using in band SA-P11 6Elements of procedure11 6.1Concatenation and separation12 6.2Confidentiali

15、ty12 6.2.1Purpose12 6.2.2TPDUs and parameters used12 6.2.3Procedure12 6.3Integrity processing13 6.3.1Integrity Check Value (ICV) processing13 6.3.1.1Purpose13 6.3.1.2TPDUs and parameters used13 6.3.1.3Procedure13 6.3.2Direction indicator processing15 6.3.2.1Purpose15 6.3.2.2TPDUs and parameters used

16、15 6.3.2.3Procedure15 6.3.3Connection integrity sequence number processing15 6.3.3.1Unique sequence numbers15 6.3.3.2Purpose16 6.3.3.3Procedure16 6.4Peer address check processing16 6.4.1Purpose16 6.4.2Procedure16 6.5Security labels for Security Associations16 Licensed Copy: sheffieldun sheffieldun,

17、na, Wed Nov 22 06:51:22 GMT+00:00 2006, Uncontrolled Copy, (c) BSI ISO/IEC 10736:1995(E) BSI 01-2000iii Page 6.5.1Purpose16 6.5.2TPDUs and parameters used16 6.5.3Procedure17 6.6Connection release17 6.7Key replacement17 6.8Unprotected TPDUs17 6.9Protocol identification17 6.10Security Association-Prot

18、ocol17 7Use of elements of procedure18 8Structure and encoding of TPDUs18 8.1Structure of TPDU18 8.2Security encapsulation TPDU19 8.2.1Clear header19 8.2.1.1PDU clear header length19 8.2.1.2PDU type19 8.2.1.3SA-ID19 8.2.2Crypto sync19 8.2.3Protected contents20 8.2.3.1Structure of protected contents

19、field20 8.2.3.2Content length20 8.2.3.3Flags21 8.2.3.4Label21 8.2.3.5Protected data21 8.2.3.6Integrity PAD21 8.2.4ICV22 8.2.5Encipherment PAD22 8.3Security Association PDU22 8.3.1LI22 8.3.2PDU Type22 8.3.3SA-ID22 8.3.4SA-P Type22 8.3.5SA PDU Contents22 9Conformance23 9.1General23 9.2Common static co

20、nformance requirements23 9.3TLSP with ITU-T Rec. X.234|ISO 8602 static conformance requirements23 9.4TLSP with ITU-T Rec. X.224|ISO/IEC 8073 static conformance requirements23 9.5Common dynamic conformance requirements23 9.6TLSP with ITU-T Rec. X.234|ISO 8602 dynamic conformance requirements23 9.7TLS

21、P with ITU-T Rec. X.224|ISO/IEC 8073 dynamic conformance requirements23 10Protocol implementation conformance statement (PICS)23 Annex A PICS proforma24 A.1Introduction24 A.1.1Background24 A.1.2Approach24 Licensed Copy: sheffieldun sheffieldun, na, Wed Nov 22 06:51:22 GMT+00:00 2006, Uncontrolled Co

22、py, (c) BSI ISO/IEC 10736:1995(E) iv BSI 01-2000 Page A.2Implementation identification24 A.3General statement of conformance25 A.4Protocol implementation25 A.5Security services supported25 A.6Supported functions27 A.7Supported Protocol Data Units (PDUs)29 A.7.1Supported Transport PDUs (TPDUs)29 A.7.

23、2Supported parameters of issued TPDUs30 A.7.3Supported parameters of received TPDUs30 A.7.4Allowed values of issued TPDU parameters31 A.8Service, function, and protocol relationships31 A.8.1Relationship between services and functions31 A.8.2Relationship between services and protocol32 A.9Supported a

24、lgorithms32 A.10Error handling33 A.10.1Security errors33 A.10.2Protocol errors33 A.11Security Association33 A.11.1SA Generic Fields33 A.11.2Content Fields Specific to Key Exchange SA-P35 Annex B Security Association Protocol Using Key Token Exchange and Digital Signatures36 B.1Overview36 B.2Key Toke

25、n Exchange (KTE)37 B.3SA-Protocol Authentication37 B.4SA Attribute Negotiation38 B.4.1Service Negotiation38 B.4.2Label Set Negotiation38 B.4.3Key and ISN Selection38 B.4.4Miscellaneous SA Attribute Negotiation38 B.4.5Re-keying Overview39 B.4.6SA Abort/Release Overview39 B.5Mapping of SA-Protocol Fun

26、ctions to Protocol Exchanges39 B.5.1KTE (First) Exchange39 B.5.1.1Request to Initiate the SA-Protocol39 B.5.1.2Receipt of the First Exchange PDU by Recipient40 B.5.2Authentication and Security Negotiation (Second) Exchange40 B.5.2.1Receipt of First Exchange PDU by Initiator40 B.5.2.2Receipt of the S

27、econd Exchange PDU by Recipient41 B.5.3Rekey Procedure41 B.5.4SA Release/Abort Exchange42 B.5.4.1Request to Initiate SA Release/Abort42 B.5.4.2Receipt of SA Abort/Release Requests42 B.6SA PDU SA Contents42 B.6.1Exchange ID43 B.6.2Content Length43 B.6.3Content Fields43 B.6.3.1My SA-ID44 Licensed Copy

28、: sheffieldun sheffieldun, na, Wed Nov 22 06:51:22 GMT+00:00 2006, Uncontrolled Copy, (c) BSI ISO/IEC 10736:1995(E) BSI 01-2000v Page B.6.3.2Old Your SA-ID44 B.6.3.3Key Token 1, Key Token 2, Key Token 3, and Key Token 444 B.6.3.4Authentication Digital Signature, Certificate44 B.6.3.5Service Selectio

29、n44 B.6.3.6SA Rejection Reason44 B.6.3.7SA Abort/Release Reason45 B.6.3.8Label45 B.6.3.9Key Selection45 B.6.3.10 SA Flags46 B.6.3.11 ASSR46 Annex C An example of an agreed set of security rules (ASSR)46 Annex D Overview of EKE Algorithm47 Figure 1 TLSP with ITU-T Rec. X.234|ISO 86026 Figure 2 TLSP w

30、ith ITU-T Rec. X.224|ISO/IEC 80736 Figure 3 Illustration of exchanges to support peer entity authentication11 Figure 4 TLSP Encapsulation Methods (TLSPs method for encapsulation and encipherment in support of Confidentiality as indicated in 6.2)13 Figure 5 TLSP Encapsulation Methods (TLSPs method fo

31、r encapsulation and ICV generation in support of integrity as indicated in 6.3)14 Figure 6 TLSP Encapsulation Method (TLSPs method for encapsulation and ICV generation in support of “Integrity and Confidentiality” as indicated in 6.2 and 6.3)15 Figure 7 Structure of the TPDU19 Figure 8 Format of the

32、 clear header19 Figure 9 Protected contents20 Figure 10 Flags field21 Figure 11 Format of the label field21 Figure 12 Format of the protected data field21 Figure 13 SA PDU Structure22 Figure B.2 SA Contents43 Figure D.1 Illustration of On-Line Key Derivation and Digital Signature using EKE48 Table 1

33、 TLSP elements of procedure18 Table A.1 TLSP Implementation Identification25 Table A.2 General Conformance Statement25 Table A.3 CO and CL Transport Implemented25 Table A.4 Service Element Proforma for CO26 Table A.5 Service Element Proforma for C1, C2, C326 Table A.6 Service Element Proforma for C4

34、26 Table A.7 Service Element Proforma for C4L27 Table A.8 Service Element Proforma for CLTP27 Table A.9 Mandatory Functions for C027 Table A.10 Optional Functions for C027 Table A.11 Mandatory Functions for C128 Table A.12 Optional Functions for C128 Table A.13 Mandatory Functions for C2, C328 Licen

35、sed Copy: sheffieldun sheffieldun, na, Wed Nov 22 06:51:22 GMT+00:00 2006, Uncontrolled Copy, (c) BSI ISO/IEC 10736:1995(E) vi BSI 01-2000 Page Table A.14 Optional Functions for C2, C328 Table A.15 Mandatory Functions for C4, C4L29 Table A.16 Optional Functions for C4, C4L29 Table A.17 Mandatory Fun

36、ctions for CLTP29 Table A.18 Optional Functions for CLTP29 Table A.19 TPDUs Supported30 Table A.20 Mandatory Parameters for COTP, CLTP30 Table A.21 Optional Parameters for COTP, CLTP30 Table A.22 Mandatory parameters for COTP, CLTP30 Table A.23 Values for Parameters of issued TPDUs for COTP, CLTP31

37、Table A.24 Values for parameters of received TPDUs for COTP, CLTP31 Table A.25 Mapping of security services to supported functions32 Table A.26 Mapping of security services to SE TPDU parameters32 Table A.27 Supported algorithms33 Table A.28 Mandatory security error actions for COTP, CLTP33 Table A.

38、29 Protocol error actions for COTP, CLTP33 Table A.3034 Table A.3135 Licensed Copy: sheffieldun sheffieldun, na, Wed Nov 22 06:51:22 GMT+00:00 2006, Uncontrolled Copy, (c) BSI ISO/IEC 10736:1995(E) BSI 01-2000vii Foreword ISO (the International Organization for Standardization) and IEC (the Internat

39、ional Electrotechnical Commission) form the specialized system for worldwide standardization. National bodies that are members of ISO or IEC participate in the development of International Standards through technical committees established by the respective organization to deal with particular field

40、s of technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information technology, ISO and IEC have established a jo

41、int technical committee, ISO/IEC JTC 1. Draft International Standards adopted by the joint technical committee are circulated to national bodies for voting. Publication as an International Standard requires approval by at least 75 % of the national bodies casting a vote. International Standard ISO/I

42、EC 10736 was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology, Subcommittee SC 6, Telecommunications and information exchange between systems, in collaboration with ITU-T. The identical text is published as ITU-T Recommendation X.274. Annex A and Annex B form an integral p

43、art of this International Standard. Annex C and Annex D are for information only. Licensed Copy: sheffieldun sheffieldun, na, Wed Nov 22 06:51:22 GMT+00:00 2006, Uncontrolled Copy, (c) BSI viii blank Licensed Copy: sheffieldun sheffieldun, na, Wed Nov 22 06:51:22 GMT+00:00 2006, Uncontrolled Copy, (

44、c) BSI ISO/IEC 10736:1995(E) BSI 01-20001 Introduction The transport protocol specified in ITU-T Rec. X.224|ISO/IEC 8073 provides the connection oriented transport service described in ITU-T Rec. 234|ISO/IEC 8072. The transport protocol specified in ITU-T Rec. 234|ISO/IEC 8602 provides the connectio

45、nless-mode transport service described in ISO/IEC 8072. This Recommendation|International Standard specifies optional additional functions to ITU-T Rec. X.224|ISO/IEC 8073 and ITU-T Rec. X.234|ISO/IEC 8602 permitting the use of cryptographic techniques to provide data protection for transport connec

46、tions or for connectionless-mode TPDU transmission. 1 Scope The procedures specified in this Recommendation|International Standard operate as extensions to those defined in ITU-T Rec. X.224|ISO/IEC 8073 and ITU-T Rec. X.234|ISO/IEC 8602 and do not preclude unprotected communication between transport

47、 entities implementing ITU-T Rec. X.224|ISO/IEC 8073 or ITU-T Rec. X.234|ISO 8602. The protection achieved by the security protocol defined in this Recommendation|International Standard depends on the proper operation of security management including key management. However, this Recommendation|Inte

48、rnational Standard does not specify the management functions and protocols needed to support this security protocol. This protocol can support all the integrity, confidentiality, authentication and access control services identified in CCITT Rec. X.800|ISO 7498-2 as relevant to the transport layer.

49、The protocol supports these services through use of cryptographic mechanisms, security labelling and attributes, such as keys and authenticated identities, pre-established by security management or established through the use of the Security Association Protocol (SA-P). Protection can be provided only within the context of a security policy. This protocol supports peer-entity authentication at the time of connection establishment. In addition, rekeying is supported wit

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 其他


经营许可证编号:宁ICP备18001539号-1