ImageVerifierCode 换一换
格式:PDF , 页数:35 ,大小:233.75KB ,
资源ID:739796      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-739796.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ETSI TS 103 097-2015 Intelligent Transport Systems (ITS) Security Security header and certificate formats (V1 2 1)《智能运输系统 (ITS) 安全性 安全头和证书格式 (V1 2 1)》.pdf)为本站会员(terrorscript155)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ETSI TS 103 097-2015 Intelligent Transport Systems (ITS) Security Security header and certificate formats (V1 2 1)《智能运输系统 (ITS) 安全性 安全头和证书格式 (V1 2 1)》.pdf

1、 ETSI TS 103 097 V1.2.1 (2015-06) Intelligent Transport Systems (ITS); Security; Security header and certificate formats TECHNICAL SPECIFICATION ETSI ETSI TS 103 097 V1.2.1 (2015-06)2 Reference RTS/ITS-00531 Keywords ITS, privacy, protocol, security ETSI 650 Route des Lucioles F-06921 Sophia Antipol

2、is Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice The present document can be downloaded from: http:/www.etsi.org/standards-search The present docu

3、ment may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/

4、or in print, the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current st

5、atus of this and other ETSI documents is available at http:/portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: https:/portal.etsi.org/People/CommiteeSupportStaff.aspx Copyright Notification No part may be reprod

6、uced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI. The content of the PDF version shall not be modified without the written authorization of ETSI. The copyright and the foregoing restriction

7、 extend to reproduction in all media. European Telecommunications Standards Institute 2015. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM and LTE are Trade Marks of ETSI registered for the benefit of its Me

8、mbers and of the 3GPP Organizational Partners. GSM and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI TS 103 097 V1.2.1 (2015-06)3 Contents Intellectual Property Rights 5g3Foreword . 5g3Modal verbs terminology 5g3Introduction 5g31 Scope 6g32 References 6g32.1 Nor

9、mative references . 6g32.2 Informative references 6g33 Definitions and abbreviations . 7g33.1 Definitions 7g33.2 Abbreviations . 7g34 Basic format elements 7g34.1 Presentation Language . 7g34.2 Specification of basic format elements . 9g34.2.1 IntX . 9g34.2.2 PublicKeyAlgorithm . 9g34.2.3 SymmetricA

10、lgorithm 9g34.2.4 PublicKey . 9g34.2.5 EccPoint 10g34.2.6 EccPointType 11g34.2.7 EncryptionParameters . 11g34.2.8 Signature . 11g34.2.9 EcdsaSignature . 12g34.2.10 SignerInfo . 12g34.2.11 SignerInfoType . 13g34.2.12 HashedId8 . 13g34.2.13 HashedId3 . 13g34.2.14 Time32 14g34.2.15 Time64 14g34.2.16 Ti

11、me64WithStandardDeviation 14g34.2.17 Duration 14g34.2.18 TwoDLocation 15g34.2.19 ThreeDLocation 15g34.2.20 GeographicRegion 15g34.2.21 RegionType. 16g34.2.22 CircularRegion 16g34.2.23 RectangularRegion 16g34.2.24 PolygonalRegion . 17g34.2.25 IdentifiedRegion . 17g34.2.26 RegionDictionary 17g35 Speci

12、fication of security header . 17g35.1 SecuredMessage . 17g35.2 Payload . 18g35.3 PayloadType . 18g35.4 HeaderField 18g35.5 HeaderFieldType 20g35.6 TrailerField . 20g35.7 TrailerFieldType . 20g35.8 RecipientInfo 21g35.9 EciesEncryptedKey 21g36 Specification of certificate format 22g36.1 Certificate .

13、 22g36.2 SubjectInfo . 23g3ETSI ETSI TS 103 097 V1.2.1 (2015-06)4 6.3 SubjectType 23g36.4 SubjectAttribute . 23g36.5 SubjectAttributeType . 24g36.6 SubjectAssurance . 24g36.7 ValidityRestriction . 25g36.8 ValidityRestrictionType . 25g36.9 ItsAidSsp 25g37 Security profiles . 26g37.1 Security profile

14、for CAMs 26g37.2 Security profile for DENMs . 27g37.3 Generic security profile for other signed messages 28g37.4 Profiles for certificates . 29g37.4.1 Introduction. 29g37.4.2 Authorization tickets (pseudonymous certificates) . 30g37.4.3 Enrolment credential (long-term certificates) . 30g37.4.4 Certi

15、ficate authority certificates 30g3Annex A (informative): Data structure examples 32g3A.1 Example security envelope structure for CAM 32g3A.2 Example structure of a certificate . 33g3Annex B (informative): Usage of ITS-AID and SSPs 34g3History 35g3ETSI ETSI TS 103 097 V1.2.1 (2015-06)5 Intellectual P

16、roperty Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR 000 314: “Intellectual Property Rights (IPRs)

17、; Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (http:/ipr.etsi.org). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carr

18、ied out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Foreword This Technical Specification (TS) has been produced by ETSI Technica

19、l Committee Intelligent Transport Systems (ITS). Modal verbs terminology In the present document “shall“, “shall not“, “should“, “should not“, “may“, “need not“, “will“, “will not“, “can“ and “cannot“ are to be interpreted as described in clause 3.2 of the ETSI Drafting Rules (Verbal forms for the e

20、xpression of provisions). “must“ and “must not“ are NOT allowed in ETSI deliverables except when used in direct citation. Introduction Security mechanisms for ITS consist of a number of parts. An important part for interoperability is a common format for data elements being transferred between ITS s

21、tations for security purposes. The present document intends to provide such a format definition. A special focus is to include as much as possible from existing standards. At the same time, the major goal is simplicity and extensibility of data structures. ETSI ETSI TS 103 097 V1.2.1 (2015-06)6 1 Sc

22、ope The present document specifies security header and certificate formats for Intelligent Transport Systems. These formats are defined specifically for securing G5 communication. 2 References 2.1 Normative references References are either specific (identified by date of publication and/or edition n

23、umber or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the reference document (including any amendments) applies. Referenced documents which are not found to be publicly available in the expected location

24、might be found at http:/docbox.etsi.org/Reference. NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long term validity. The following referenced documents are necessary for the application of the present document. 1 IEEE 1363-2000:

25、 “IEEE Standard Specifications For Public Key Cryptography“. 2 NIMA Technical Report TR8350.2: “Department of Defense World Geodetic System 1984. Its Definition and Relationships with Local Geodetic Systems“. 3 ISO 3166-1: “Codes for the representation of names of countries and their subdivisions -

26、Part 1: Country codes“. 4 NIST SP 800-38C: “Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality“. 5 IETF RFC 2246: “The TLS Protocol Version 1.0“. 6 ETSI TS 102 940: “Intelligent Transport Systems (ITS); Security; ITS communications security archit

27、ecture and security management“. 7 ETSI TS 102 965 (V1.2.1): “Intelligent Transport Systems (ITS); Application Object Identifier (ITS-AID); Registration“. 2.2 Informative references References are either specific (identified by date of publication and/or edition number or version number) or non-spec

28、ific. For specific references, only the cited version applies. For non-specific references, the latest version of the reference document (including any amendments) applies. NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long term

29、 validity. The following referenced documents are not necessary for the application of the present document but they assist the user with regard to a particular subject area. i.1 IEEE 1363a-2004: “Standard Specifications For Public Key Cryptography - Amendment 1: Additional Techniques“. i.2 IEEE 160

30、9.2-2012 (draft D12): “Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages“. i.3 IEEE 1609.2-2012 (draft D17): “Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages“. i.4 IEEE 1609.3-2010: “Wireless

31、Access in Vehicular Environments (WAVE) - Networking Services“. ETSI ETSI TS 103 097 V1.2.1 (2015-06)7 i.5 Standards for Efficient Cryptography 4 (SEC 4): “Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV)“. i.6 Antipa A., R. Gallant, and S. Vanstone: “Accelerated verification of ECDSA s

32、ignatures“, Selected Areas in Cryptography, 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005: Springer, 2005, pp. 307-318. 3 Definitions and abbreviations 3.1 Definitions For the purposes of the present document, the following terms and definitions apply: enumeration:

33、set of values with distinct meaning 3.2 Abbreviations For the purposes of the present document, the following abbreviations apply: AES Advanced Encryption Standard CA Certificate Authority CAM Cooperative Awareness Message CRL Certificate Revocation List DENM Decentralized Environmental Notification

34、 Message DHAES Diffie-Hellman: An Encryption Scheme ECC Elliptic Curve Cryptography ECDSA Elliptic Curve Digital Signature Algorithm ECIES Elliptic Curve Integrated Encryption Scheme ECQV Elliptic Curve Qu-Vanstone NOTE: Implicit Certificate Scheme. G5 5,9 GHz radio communications ITS Intelligent Tr

35、ansport Systems ITS-AID ITS Application ID ITS-S Intelligent Transport Systems Station LSB Least Significant Bit NIMA National Imagery and Mapping Agency NIST SP National Institute of Standards and Technology, Special Publication PSID Provider Service Identifier NOTE: It is a synonym for ITS-AID. SS

36、P Service Specific Permissions TAI Temps Atomique International (International Atomic Time) TLS Transport Layer Security UTC Universal Time Coordinated WGS World Geodetic System 4 Basic format elements 4.1 Presentation Language The presentation language is derived from the Internet Engineering Task

37、Force (IETF) RFC 2246 (TLS) 5 and from IEEE 1609.2-2012 i.2 (draft D12) and is described in table 1. The encoding of multi-byte elements of the presentation language shall always use network byte order, i.e. big endian byte order, if applicable. NOTE: The presentation language is not formally define

38、d. Parsing tools based on this notation cannot be guaranteed to be consistent or complete. ETSI ETSI TS 103 097 V1.2.1 (2015-06)8 Table 1: Presentation language Element Description Example(s) Variable names Variable names are given in lower case variable_name Basic data types Basic data types are gi

39、ven in lower case uint8, uint16, uint32, uint64 Composed data types Composed data types are given with at least the first letter in upper case MyDataType Comments Comments start with the “/“ indicator / This is a comment Numbers Numbers are given as signed or unsigned big-endian octets uint8, uint16

40、, uint32, uint64, sint32 Fixed-length vectors Fixed-length vectors have a data type and a fixed octet size given in square brackets uint8 Coordinates2; / two uint8 values uint32 Coordinates8; / two uint32 values Variable-length vectors with fixed-length length encoding The number in angle brackets g

41、ives the maximum number of octets. Depending on the maximum size, the first 1 byte, 2 bytes, 4 bytes or 8 bytes encode the actual field length uint8 AsciiChar; AsciiChar Name; / “abc“ encoded as / 0x03, 0x61, 0x62, 0x63 AsciiChar LongName; / “abc“ encoded as / 0x00, 0x03, 0x61, 0x62, 0x63 Variable-l

42、ength vectors with variable-length length encoding indicates variable-length encoding. The length itself is encoded with a number of “1“ bits according to the additional number of octets used to encode the length, followed by a “0“ bit and the actual length value. The maximum length shall be 256- 1,

43、 i.e. at most seven “1“ bits followed by a “0“ bit shall be used for the variable-length length encoding. The length of variable-length vectors with variable-length length encoding shall be encoded as positive integer using the minimum number of bits necessary uint8 AsciiChar; AsciiChar Name; / enco

44、ding examples: (the bits with / grey background represent the / length encoding of the vectors / length, X the first of the / vectors following payload bits) / Vector length 5: / Bits: 00000101 XXXXXXXX XXXXXXXX / Vector length 123: / Bits: 01111011 XXXXXXXX XXXXXXXX / Vector length 388: / Bits: 100

45、00001 10000100 XXXXXXXX Opaque fields Opaque fields are blocks of data whose content interpretation is not further specified opaque fieldnamen; opaque fieldname; opaque fieldname; Enumerations Enumerations are list of labels with a unique value for each label, and optionally a maximum value (which t

46、hen determines length of encoding) enum de(0), fr(1), it(2) Country; enum de(0), fr(1), it(2), (28-1) Country; / both variants encoding in one / octet enum de(0), fr(1), it(2), (216-1) Country; / Encoding in two octets Constructed types Constructed types contain other types struct Name name; Country

47、 country; Person; Case statements Case statements are used inside constructed types to change the contents of the constructed type depending on the value of the variable given in brackets struct Name name; Country country; select(country) case de: uint8 age; case fr: AsciiChar given_name; Person; Ex

48、ternal data This is external data that has impact on a struct, e.g. in a select statement. It shall be described from where the external data is obtained struct Name name; extern Country country; select(country) case de: uint8 age; case fr: AsciiChar given_name; Person; ETSI ETSI TS 103 097 V1.2.1 (

49、2015-06)9 4.2 Specification of basic format elements 4.2.1 IntX g139g144g150g591g154g3g3 g12g144g150g27g346g3This data type encodes an integer of variable length. The length of this integer is encoded by a number of 1 bits followed by a 0 bit, where the number of 1 bits is equal to the number of additional octets used to encode the integer besides those used (partially) to encode the length. The encoding of the length shall use at most 7 bits set to 1. EXAMPLE: 00001010 encodes th

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1