{"id":351098,"date":"2024-10-20T00:45:44","date_gmt":"2024-10-20T00:45:44","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-107361995\/"},"modified":"2024-10-26T00:36:59","modified_gmt":"2024-10-26T00:36:59","slug":"bs-iso-iec-107361995","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-107361995\/","title":{"rendered":"BS ISO\/IEC 10736:1995"},"content":{"rendered":"

The procedures specified in this Recommendation | International Standard operate as extensions to those defined in ITU-T Rec. X.224 | ISO\/IEC 8073 and ITU-T Rec. X.234 | ISO\/IEC 8602 and do not preclude unprotected communication between transport entities implementing ITU-T Rec. X.224 | ISO\/IEC 8073 or ITU-T Rec. X.234 | ISO 8602.<\/p>\n

The protection achieved by the security protocol defined in this Recommendation | International Standard depends on the proper operation of security management including key management. However, this Recommendation | International Standard does not specify the management functions and protocols needed to support this security protocol.<\/p>\n

This protocol can support all the integrity, confidentiality, authentication and access control services identified in CCITT Rec. X.800 I ISO 7498-2 as relevant to the transport layer. The protocol supports these services through use of cryptographic mechanisms, security labelling and attributes, such as keys and authenticated identities, pre-established by security management or established through the use of the Security Association – Protocol (SA-P).<\/p>\n

Protection can be provided only within the context of a security policy.<\/p>\n

This protocol supports peer-entity authentication at the time of connection establishment. In addition, rekeying is supported within the protocol through the use of SA-P or through means outside the protocol.<\/p>\n

Security associations can only be established within the context of a security policy. It is a matter for the users to establish their own security policy, which may be constrained by the procedures specified in this Recommendation | International Standard.<\/p>\n

The following items could be included in a Security Policy:<\/p>\n

    \n
  1. \n

    the method of SA establishment\/release, the lifetime of SA;<\/p>\n<\/li>\n

  2. \n

    Authentication\/Access Control mechanisms;<\/p>\n<\/li>\n

  3. \n

    Label mechanism;<\/p>\n<\/li>\n

  4. \n

    the procedure of the receiving an invalid TPDU during SA establishment procedure or transmission of protected PDU;<\/p>\n<\/li>\n

  5. \n

    the lifetime of Key;<\/p>\n<\/li>\n

  6. \n

    the interval of the rekey procedure in order to update key and security control information (SCI) exchange procedure;<\/p>\n<\/li>\n

  7. \n

    the time out of SCI exchange and rekey procedure;<\/p>\n<\/li>\n

  8. \n

    the number of retries of sci exchange and rekey procedure.<\/p>\n<\/li>\n<\/ol>\n

    this Recommendation | International Standard defines a protocol which may be used for Security Association establishment. Entities wishing to establish an SA must share common mechanisms for authentication and key distribution. this Recommendation | International Standard specifies one algorithm for authentication and key distribution which is based on public key crypto systems. The implementation of this algorithm is not mandatory; however, when an alternative mechanism is used, it shall satisfy the following conditions:<\/p>\n

      \n
    1. \n

      All SA attributes defined in 5.2 are derived.<\/p>\n<\/li>\n

    2. \n

      Derived keys are authenticated.<\/p>\n<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"

      Information technology. Telecommunications and information exchange between systems. Transport layer security protocol<\/b><\/p>\n\n\n\n\n
      Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
      BSI<\/b><\/a><\/td>\n1995<\/td>\n62<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":351103,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[672,2641],"product_tag":[],"class_list":{"0":"post-351098","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-100-40","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/351098","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/351103"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=351098"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=351098"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=351098"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}