BS ISO/IEC 10736-1995 信息技术.系统间信和信息交换.传输层安全协议

百检网 2021-08-02
标准号:BS ISO/IEC 10736-1995
中文标准名称:信息技术.系统间信和信息交换.传输层安全协议
英文标准名称:Information technology - Telecommunications and information exchange between systems - Transport layer security protocol
标准类型:L78
发布日期:1995/9/15 12:00:00
实施日期:1995/9/15 12:00:00
中国标准分类号:L78
国际标准分类号:35.100.40
适用范围:The procedures specified in this Recommendation | International Standard operate as extensions to those defined in ITU-T Rec. X.224 | ISO/IEC 8073 and ITU-T Rec. X.234 | ISO/IEC 8602 and do not preclude unprotected communication between transport entities implementing ITU-T Rec. X.224 | ISO/IEC 8073 or ITU-T Rec. X.234 | ISO 8602. The protection achieved by the security protocol defined in this Recommendation | International Standard depends on the proper operation of security management including key management. However, this Recommendation | International Standard does not specify the management functions and protocols needed to support this security protocol. This protocol can support all the integrity, confidentiality, authentication and access control services identified in CCITT Rec. X.800 | ISO 7498-2 as relevant to the transport layer. The protocol supports these services through use of cryptographic mechanisms, security labelling and attributes, such as keys and authenticated identities, pre-established by security management or established through the use of the Security Association - Protocol (SA-P). Protection can be provided only within the context of a security policy. This protocol supports peer-entity authentication at the time of connection establishment. In addition, rekeying is supported within the protocol through the use of SA-P or through means outside the protocol. Security associations can only be established within the context of a security policy. It is a matter for the users to establish their own security policy, which may be constrained by the procedures specified in this Recommendation | International Standard. The following items could be included in a Security Policy: a) the method of SA establishment/release, the lifetime of SA; b) Authentication/Access Control mechanisms; c) Label mechanism; d) the procedure of the receiving an invalid TPDU during SA establishment procedure or transmission of protected PDU; e) the lifetime of Key; f) the interval of the rekey procedure in order to update key and security control information (SCI) exchange procedure; g) the time out of SCI exchange and rekey procedure; h) the number of retries of sci exchange and rekey procedure. This Recommendation | International Standard defines a protocol which may be used for Security Association establishment. Entities wishing to establish an SA must share common mechanisms for authentication and key distribution. This Recommendation | International Standard specifies one algorithm for authentication and key distribution which is based on public key crypto systems. The implementation of this algorithm is not mandatory; however, when an alternative mechanism is used, it shall satisfy the following conditions: a) All SA attributes defined in 5.2 are derived. b) Derived keys are authenticated.

百检能给您带来哪些改变?

1、检测行业全覆盖,满足不同的检测;

2、实验室全覆盖,就近分配本地化检测;

3、工程师一对一服务,让检测更精准;

4、免费初检,初检不收取检测费用;

5、自助下单 快递免费上门取样;

6、周期短,费用低,服务周到;

7、拥有CMA、CNAS、CAL等权威资质;

8、检测报告权威有效、中国通用;

客户案例展示

  • 上海朗波王服饰有限公司
  • 浙江圣达生物药业股份有限公司
  • 天津市长庆电子科技有限公司
  • 上海纽特丝纺织品有限公司
  • 无锡露米娅纺织有限公司
  • 东方电气风电(凉山)有限公司