{"id":363678,"date":"2024-10-20T01:46:54","date_gmt":"2024-10-20T01:46:54","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-9594-112020\/"},"modified":"2024-10-26T02:47:57","modified_gmt":"2024-10-26T02:47:57","slug":"bs-iso-iec-9594-112020","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-9594-112020\/","title":{"rendered":"BS ISO\/IEC 9594-11:2020"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nundefined <\/td>\n<\/tr>\n
11<\/td>\n1 Scope
2 Normative references
2.1 Identical Recommendations | International Standards <\/td>\n<\/tr>\n
12<\/td>\n2.2 Paired Recommendations | International Standards equivalent in technical content
2.3 Other references
3 Definitions
3.1 OSI Reference Model definitions
3.2 Directory model definitions
3.3 Public-key and attribute certificate definitions <\/td>\n<\/tr>\n
13<\/td>\n3.4 Terms defined in this Recommendation | International Standard
4 Abbreviations <\/td>\n<\/tr>\n
14<\/td>\n5 Conventions
6 Common data types and special cryptographic algorithms
6.1 Introduction <\/td>\n<\/tr>\n
15<\/td>\n6.2 ASN.1 information object class specification tool
6.2.1 General information object class concept
6.2.2 The ALGORITHM information object class <\/td>\n<\/tr>\n
16<\/td>\n6.3 Multiple-cryptographic algorithm specifications
6.3.1 General
6.3.2 Multiple signatures algorithm <\/td>\n<\/tr>\n
17<\/td>\n6.3.3 Multiple symmetric key algorithm
6.3.4 Multiple public-key algorithms
6.3.5 Multiple hash algorithm
6.3.6 Multiple authenticated encryption with associated data algorithm
6.3.7 Multiple integrity check value algorithm <\/td>\n<\/tr>\n
18<\/td>\n6.4 Key establishment algorithms
6.4.1 General
6.4.2 Diffie-Hellman group 14 algorithm with HKDF-256
6.4.3 Diffie-Hellman group 23 algorithm with HKDF-256 <\/td>\n<\/tr>\n
19<\/td>\n6.4.4 Diffie-Hellman group 28 algorithm with HKDF-256
6.4.5 Key derivation
6.4.5.1 General
6.4.5.2 HMAC-based extract-and-expand key derivation function <\/td>\n<\/tr>\n
20<\/td>\n6.4.6 Special conditions
6.5 Multiple-cryptographic algorithm-value pairs
6.5.1 Multiple digital signatures attached to data
6.5.2 Double digital signature attached to data
6.5.3 Duplicate integrity check values attached to data <\/td>\n<\/tr>\n
21<\/td>\n6.6 Formal specification of encipherment
6.6.1 Formal specification of encryption
6.6.2 Formal specification of authenticated encryption with associated data <\/td>\n<\/tr>\n
22<\/td>\n7 General concepts for securing protocols
7.1 Introduction
7.2 Protected protocol plug-in concept
7.3 Communications structure
7.4 Another view of the relationship between the wrapper protocol and the protected protocol <\/td>\n<\/tr>\n
23<\/td>\n7.5 Structure of application protocol data unit
7.6 Exception conditions <\/td>\n<\/tr>\n
24<\/td>\n8 Wrapper protocol general concepts
8.1 Introduction
8.2 UTC time specification
8.3 Use of alternative cryptographic algorithms
8.4 Establishment of shared keys <\/td>\n<\/tr>\n
25<\/td>\n8.5 Sequence numbers
8.6 Use of invocation identification in the wrapper protocol
8.7 Mapping to underlying services
8.8 Definition of protected protocols
8.9 Overview of wrapper protocol data units <\/td>\n<\/tr>\n
26<\/td>\n9 Association management
9.1 Introduction to association management
9.2 Association handshake request <\/td>\n<\/tr>\n
28<\/td>\n9.3 Association accept <\/td>\n<\/tr>\n
29<\/td>\n9.4 Association reject due to security issues <\/td>\n<\/tr>\n
30<\/td>\n9.5 Association reject by the protected protocol <\/td>\n<\/tr>\n
31<\/td>\n9.6 Handshake security abort
9.7 Handshake abort by protected protocol <\/td>\n<\/tr>\n
32<\/td>\n9.8 Data transfer security abort
9.9 Abort by protected protocol <\/td>\n<\/tr>\n
33<\/td>\n9.10 Release request WrPDU
9.11 Release response WrPDU <\/td>\n<\/tr>\n
34<\/td>\n9.12 Release collision
10 Data transfer phase
10.1 Symmetric keys renewal
10.2 Data transfer by the client
10.2.1 General <\/td>\n<\/tr>\n
35<\/td>\n10.2.2 Client using authenticated encryption with associated data
10.2.3 Client not using authenticated encryption with associated data
10.2.4 Client non-encrypted data <\/td>\n<\/tr>\n
36<\/td>\n10.3 Data transfer by the server
10.3.1 General
10.3.2 Server using authenticated encryption with associated data
10.3.3 Server not using authenticated encryption with associated data <\/td>\n<\/tr>\n
37<\/td>\n10.3.4 Server non-encrypted data <\/td>\n<\/tr>\n
38<\/td>\n11 Information flow
11.1 Purpose and general model <\/td>\n<\/tr>\n
39<\/td>\n11.2 Protected protocol SAOC
11.3 Wrapper SAOC
11.3.1 General
11.3.2 Handshake request subclass
11.3.3 Handshake accept subclass
11.3.4 Handshake security reject subclass
11.3.5 Handshake reject by protected protocol subclass <\/td>\n<\/tr>\n
40<\/td>\n11.3.6 Handshake security abort subclass
11.3.7 Handshake abort by protected protocol subclass
11.3.8 Data transfer security abort subclass
11.3.9 Data transfer application abort subclass
11.3.10 Release request subclass
11.3.11 Release response subclass <\/td>\n<\/tr>\n
41<\/td>\n11.3.12 Client data transfer with authenticated encryption with associated data subclass
11.3.13 Client data transfer with integrity check value protection subclass
11.3.14 Server data transfer with authenticated encryption with associated data subclass
11.3.15 Client data transfer with integrity check value protection subclass <\/td>\n<\/tr>\n
42<\/td>\n12 Wrapper error handling
12.1 General
12.2 Checking of a wrapper handshake request
12.2.1 General
12.2.2 Digital signature checking
12.2.3 Checking of the to-be-signed part <\/td>\n<\/tr>\n
43<\/td>\n12.3 Checking of a wrapper handshake accept
12.3.1 General
12.3.2 Digital signature checking
12.3.3 Checking of the to-be-signed part <\/td>\n<\/tr>\n
44<\/td>\n12.4 Checking of data transfer WrPDUs
12.4.1 General
12.4.2 Common checking for data transfer
12.4.2.1 Common checking for use of authenticate encryption with associated data
12.4.2.2 Common checking for non-use of authenticate encryption with associated data <\/td>\n<\/tr>\n
45<\/td>\n12.4.2.3 Common checking for AadClient and AadServer data types
12.4.5 AadClient data value specific checking
12.4.6 AadServer data value specific checking <\/td>\n<\/tr>\n
46<\/td>\n12.5 Wrapper diagnostic codes <\/td>\n<\/tr>\n
47<\/td>\n13 Authorization and validation list management
13.1 General on authorization and validation management
13.1.1 Introduction
13.1.2 Invocation identification
13.1.3 Exception conditions
13.2 Defined protected protocol data unit types <\/td>\n<\/tr>\n
48<\/td>\n13.3 Authorization and validation management protocol initialization request
13.4 Authorization and validation management protocol initialization accept
13.5 Authorization and validation management protocol initialization reject
13.6 Authorization and validation management protocol initialization abort <\/td>\n<\/tr>\n
49<\/td>\n13.7 Add authorization and validation list request <\/td>\n<\/tr>\n
50<\/td>\n13.8 Add authorization and validation list response
13.9 Replace authorization and validation list request
13.10 Replace authorization and validation list response <\/td>\n<\/tr>\n
51<\/td>\n13.11 Delete authorization and validation list request
13.12 Delete authorization and validation list response <\/td>\n<\/tr>\n
52<\/td>\n13.13 Authorization and validation list abort
13.14 Authorization and validation list error codes <\/td>\n<\/tr>\n
53<\/td>\n14 Certification authority subscription protocol
14.1 Certification authority subscription introduction
14.2 Defined protected protocol data unit types
14.3 Certification authority subscription protocol initialization request <\/td>\n<\/tr>\n
54<\/td>\n14.4 Certification authority subscription protocol initialization accept
14.5 Certification authority subscription protocol initialization reject
14.6 Certification authority subscription protocol initialization abort
14.7 Public-key certificate subscription request <\/td>\n<\/tr>\n
55<\/td>\n14.8 Public-key certificate subscription response <\/td>\n<\/tr>\n
56<\/td>\n14.9 Public-key certificate un-subscription request
14.10 Public-key certificate un-subscription response <\/td>\n<\/tr>\n
57<\/td>\n14.11 Public-key certificate replacements request <\/td>\n<\/tr>\n
58<\/td>\n14.12 Public-key certificate replacement response <\/td>\n<\/tr>\n
59<\/td>\n14.13 End-entity public-key certificate updates request
14.14 End-entity public-key certificate updates response <\/td>\n<\/tr>\n
60<\/td>\n14.15 Certification authority subscription abort
14.16 Certification authority subscription error codes <\/td>\n<\/tr>\n
61<\/td>\n15 Trust broker protocol
15.1 Introduction
15.2 Defined protected protocol data unit types
15.3 Trust broker protocol initialization request
15.4 Trust broker protocol initialization accept <\/td>\n<\/tr>\n
62<\/td>\n15.5 Trust broker protocol initialization reject
15.6 Trust broker protocol initialization abort
15.7 Trust broker request syntax
15.8 Trust broker response syntax <\/td>\n<\/tr>\n
63<\/td>\n15.9 Trust broker error information <\/td>\n<\/tr>\n
86<\/td>\nH.1 Introduction
H.2 Negotiation of cryptographic algorithms
H.2.1 Cryptographic negotiation for new protocols
H.2.2 Cryptographic negotiation for existing protocols <\/td>\n<\/tr>\n
87<\/td>\nH.3 Non-negotiable digital signature algorithms
H.3.1 General <\/td>\n<\/tr>\n
88<\/td>\nH.3.2 Duplicate signatures for new protocols
H.3.3 Duplicate signatures for existing protocols <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Information technology. Open systems interconnection directory – Protocol specifications for secure operations<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2021<\/td>\n96<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":363688,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[675,2641],"product_tag":[],"class_list":{"0":"post-363678","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-100-70","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/363678","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/363688"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=363678"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=363678"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=363678"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}