{"id":351098,"date":"2024-10-20T00:45:44","date_gmt":"2024-10-20T00:45:44","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-107361995\/"},"modified":"2024-10-26T00:36:59","modified_gmt":"2024-10-26T00:36:59","slug":"bs-iso-iec-107361995","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-107361995\/","title":{"rendered":"BS ISO\/IEC 10736:1995"},"content":{"rendered":"
The procedures specified in this Recommendation | International Standard operate as extensions to those defined in ITU-T Rec. X.224 | ISO\/IEC 8073 and ITU-T Rec. X.234 | ISO\/IEC 8602 and do not preclude unprotected communication between transport entities implementing ITU-T Rec. X.224 | ISO\/IEC 8073 or ITU-T Rec. X.234 | ISO 8602.<\/p>\n
The protection achieved by the security protocol defined in this Recommendation | International Standard depends on the proper operation of security management including key management. However, this Recommendation | International Standard does not specify the management functions and protocols needed to support this security protocol.<\/p>\n
This protocol can support all the integrity, confidentiality, authentication and access control services identified in CCITT Rec. X.800 I ISO 7498-2 as relevant to the transport layer. The protocol supports these services through use of cryptographic mechanisms, security labelling and attributes, such as keys and authenticated identities, pre-established by security management or established through the use of the Security Association – Protocol (SA-P).<\/p>\n
Protection can be provided only within the context of a security policy.<\/p>\n
This protocol supports peer-entity authentication at the time of connection establishment. In addition, rekeying is supported within the protocol through the use of SA-P or through means outside the protocol.<\/p>\n
Security associations can only be established within the context of a security policy. It is a matter for the users to establish their own security policy, which may be constrained by the procedures specified in this Recommendation | International Standard.<\/p>\n
The following items could be included in a Security Policy:<\/p>\n
the method of SA establishment\/release, the lifetime of SA;<\/p>\n<\/li>\n
Authentication\/Access Control mechanisms;<\/p>\n<\/li>\n
Label mechanism;<\/p>\n<\/li>\n
the procedure of the receiving an invalid TPDU during SA establishment procedure or transmission of protected PDU;<\/p>\n<\/li>\n
the lifetime of Key;<\/p>\n<\/li>\n
the interval of the rekey procedure in order to update key and security control information (SCI) exchange procedure;<\/p>\n<\/li>\n
the time out of SCI exchange and rekey procedure;<\/p>\n<\/li>\n
the number of retries of sci exchange and rekey procedure.<\/p>\n<\/li>\n<\/ol>\n
this Recommendation | International Standard defines a protocol which may be used for Security Association establishment. Entities wishing to establish an SA must share common mechanisms for authentication and key distribution. this Recommendation | International Standard specifies one algorithm for authentication and key distribution which is based on public key crypto systems. The implementation of this algorithm is not mandatory; however, when an alternative mechanism is used, it shall satisfy the following conditions:<\/p>\n
All SA attributes defined in 5.2 are derived.<\/p>\n<\/li>\n
Derived keys are authenticated.<\/p>\n<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"
Information technology. Telecommunications and information exchange between systems. Transport layer security protocol<\/b><\/p>\n\n\n
\n Published By<\/td>\n Publication Date<\/td>\n Number of Pages<\/td>\n<\/tr>\n \n BSI<\/b><\/a><\/td>\n 1995<\/td>\n 62<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":351103,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[672,2641],"product_tag":[],"class_list":{"0":"post-351098","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-100-40","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/351098","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/351103"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=351098"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=351098"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=351098"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}