BS ISO IEC 9798-6-2010 Information technology Security techniques Entity authentication Mechanisms using manual data transfer《信息技术 安全技术 实体鉴别 使用人工数据传送的机制》.pdf

上传人:花仙子 文档编号:396940 上传时间:2018-10-18 格式:PDF 页数:46 大小:2MB
下载 相关 举报
BS ISO IEC 9798-6-2010 Information technology Security techniques Entity authentication Mechanisms using manual data transfer《信息技术 安全技术 实体鉴别 使用人工数据传送的机制》.pdf_第1页
第1页 / 共46页
BS ISO IEC 9798-6-2010 Information technology Security techniques Entity authentication Mechanisms using manual data transfer《信息技术 安全技术 实体鉴别 使用人工数据传送的机制》.pdf_第2页
第2页 / 共46页
BS ISO IEC 9798-6-2010 Information technology Security techniques Entity authentication Mechanisms using manual data transfer《信息技术 安全技术 实体鉴别 使用人工数据传送的机制》.pdf_第3页
第3页 / 共46页
BS ISO IEC 9798-6-2010 Information technology Security techniques Entity authentication Mechanisms using manual data transfer《信息技术 安全技术 实体鉴别 使用人工数据传送的机制》.pdf_第4页
第4页 / 共46页
BS ISO IEC 9798-6-2010 Information technology Security techniques Entity authentication Mechanisms using manual data transfer《信息技术 安全技术 实体鉴别 使用人工数据传送的机制》.pdf_第5页
第5页 / 共46页
亲,该文档总共46页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述

1、raising standards worldwide NO COPYING WITHOUT BSI PERMISSION EXCEPT AS PERMITTED BY COPYRIGHT LAW BSI Standards Publication BS ISO/IEC 9798-6:2010 Information technology Security techniques Entity authentication Part 6: Mechanisms using manual data transferBS ISO/IEC 9798-6:2010 BRITISH STANDARD Na

2、tional foreword This British Standard is the UK implementation of ISO/IEC 9798-6:2010. It supersedes BS ISO/IEC 9798-6:2005 which is withdrawn. The UK participation in its preparation was entrusted to Technical Committee IST/33, IT - Security techniques. A list of organizations represented on this c

3、ommittee can be obtained on request to its secretary. This publication does not purport to include all the necessary provisions of a contract. Users are responsible for its correct application. BSI 2010 ISBN 978 0 580 68073 1 ICS 35.040 Compliance with a British Standard cannot confer immunity from

4、legal obligations. This British Standard was published under the authority of the Standards Policy and Strategy Committee on 31 December 2010. Amendments issued since publication Date Text affectedBS ISO/IEC 9798-6:2010Reference number ISO/IEC 9798-6:2010(E) ISO/IEC 2010INTERNATIONAL STANDARD ISO/IE

5、C 9798-6 Second edition 2010-12-01 Information technology Security techniques Entity authentication Part 6: Mechanisms using manual data transfer Technologies de linformation Techniques de scurit Authentification dentit Partie 6: Mcanismes utilisant un transfert manuel de donnes BS ISO/IEC 9798-6:20

6、10 ISO/IEC 9798-6:2010(E) PDF disclaimer This PDF file may contain embedded typefaces. In accordance with Adobes licensing policy, this file may be printed or viewed but shall not be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing.

7、In downloading this file, parties accept therein the responsibility of not infringing Adobes licensing policy. The ISO Central Secretariat accepts no liability in this area. Adobe is a trademark of Adobe Systems Incorporated. Details of the software products used to create this PDF file can be found

8、 in the General Info relative to the file; the PDF-creation parameters were optimized for printing. Every care has been taken to ensure that the file is suitable for use by ISO member bodies. In the unlikely event that a problem relating to it is found, please inform the Central Secretariat at the a

9、ddress given below. COPYRIGHT PROTECTED DOCUMENT ISO/IEC 2010 All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from eit

10、her ISO at the address below or ISOs member body in the country of the requester. ISO copyright office Case postale 56 CH-1211 Geneva 20 Tel. + 41 22 749 01 11 Fax + 41 22 749 09 47 E-mail copyrightiso.org Web www.iso.org Published in Switzerland ii ISO/IEC 2010 All rights reservedBS ISO/IEC 9798-6:

11、2010 ISO/IEC 9798-6:2010(E) ISO/IEC 2010 All rights reserved iiiContents Page Foreword iv Introduction.v 1 Scope1 2 Normative references1 3 Terms and definitions .1 4 Symbols and abbreviated terms 3 5 Overall requirements.4 6 Mechanisms using a short check-value5 6.1 General .5 6.2 Mechanism 1 One d

12、evice with simple input, one device with simple output 5 6.3 Mechanism 2 Devices with simple input capabilities.7 7 Mechanisms using a manual transfer of a short digest-value or a short key.8 7.1 General .8 7.2 Mechanism 3 One device with simple input, one device with simple output 8 7.3 Mechanism 4

13、 One device with simple input, one device with simple output 10 7.4 Mechanism 5 Devices with simple input capabilities.11 7.5 Mechanism 6 Devices with simple input capabilities.13 8 Mechanisms using a MAC 15 8.1 General .15 8.2 Mechanism 7 Devices with simple output capabilities.15 8.3 Mechanism 8 O

14、ne device with simple input, one device with simple output 18 Annex A (normative) ASN.1 modules .20 Annex B (informative) Using manual authentication protocols for the exchange of secret keys21 Annex C (informative) Using manual authentication protocols for the exchange of public keys23 Annex D (inf

15、ormative) On mechanism security and choices for parameter lengths.25 Annex E (informative) A method for generating short check-values 28 Annex F (informative) Comparative analysis in security and efficiency of mechanisms 18 .30 Annex G (informative) Methods for generating short digest-values .33 Bib

16、liography34 BS ISO/IEC 9798-6:2010 ISO/IEC 9798-6:2010(E) iv ISO/IEC 2010 All rights reservedForeword ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) form the specialized system for worldwide standardization. National bodies that are m

17、embers of ISO or IEC participate in the development of International Standards through technical committees established by the respective organization to deal with particular fields of technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international

18、organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1. International Standards are drafted in accordance with the rules given in the IS

19、O/IEC Directives, Part 2. The main task of the joint technical committee is to prepare International Standards. Draft International Standards adopted by the joint technical committee are circulated to national bodies for voting. Publication as an International Standard requires approval by at least

20、75 % of the national bodies casting a vote. Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights. ISO/IEC 9798-6 was prepared by Joint Technical Co

21、mmittee ISO/IEC JTC 1, Information technology, Subcommittee SC 27, IT Security techniques. This second edition cancels and replaces the first edition (ISO/IEC 9798-6:2005), to which a new Clause 7 has been added to provide four new mechanisms. It also incorporates the Technical Corrigendum ISO/IEC 9

22、798-6:2005/Cor.1:2009. Implementations conformant to the first edition will be conformant to the second edition. ISO/IEC 9798 consists of the following parts, under the general title Information technology Security techniques Entity authentication: Part 1: General Part 2: Mechanisms using symmetric

23、encipherment algorithms Part 3: Mechanisms using digital signature techniques Part 4: Mechanisms using a cryptographic check function Part 5: Mechanisms using zero-knowledge techniques Part 6: Mechanisms using manual data transfer BS ISO/IEC 9798-6:2010 ISO/IEC 9798-6:2010(E) ISO/IEC 2010 All rights

24、 reserved vIntroduction Within networks of communicating devices it is often necessary for two devices to perform an entity authentication procedure using a channel which may be subject to both passive and active attacks, where an active attack can include a malicious third party introducing data in

25、to the channel and/or modifying, deleting or repeating data legitimately sent on the channel. Other parts of ISO/IEC 9798 specify entity authentication mechanisms applicable when the two devices share a secret key, or where one device has an authenticated copy of a public key for the other device. I

26、n this part of ISO/IEC 9798, entity authentication mechanisms where there is no such assumption of pre- established keying relationships, referred to as manual authentication mechanisms, are specified. Instead entity authentication is achieved by manually transferring short data strings from one dev

27、ice to the other, or by manually comparing short data strings output by the two devices. For the purposes of this part of ISO/IEC 9798, the meaning of the term entity authentication is different from the meaning applied in other parts of ISO/IEC 9798. Instead of one device verifying that the other d

28、evice has a claimed identity (and vice versa), both devices in the possession of a user verify that they correctly share a data string with the other device at the time of execution of the mechanism. Of course, this data string could contain identifiers for one or both of the devices. As described i

29、n informative Annexes B and C, a manual authentication mechanism can be used as the basis for secret key establishment or the reliable exchange of public keys. A manual authentication mechanism could also be used for the reliable exchange of other secret or public security parameters, including secu

30、rity policy statements or timestamps. BS ISO/IEC 9798-6:2010BS ISO/IEC 9798-6:2010 INTERNATIONAL STANDARD ISO/IEC 9798-6:2010(E) ISO/IEC 2010 All rights reserved 1Information technology Security techniques Entity authentication Part 6: Mechanisms using manual data transfer 1 Scope This part of ISO/I

31、EC 9798 specifies eight entity authentication mechanisms based on manual data transfer between authenticating devices. It indicates how these mechanisms can be used to support key management functions, and provides guidance on secure choices of parameters for the mechanisms. A comparison of the leve

32、ls of security and efficiency provided by the eight mechanisms is given. Such mechanisms can be appropriate in a variety of circumstances. One such application occurs in personal networks, where the owner of two personal devices capable of wireless communications wishes them to perform an entity aut

33、hentication procedure as part of the process of preparing them for use in the network. 2 Normative references The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of

34、 the referenced document (including any amendments) applies. ISO/IEC 9798-1:2010, Information technology Security techniques Entity authentication Part 1: General 3 Terms and definitions For the purposes of this document, the terms and definitions given in ISO/IEC 9798-1 and the following apply. 3.1

35、 check-value string of bits, computed as the output of a check-value function, sent from the data originator to the data recipient that enables the recipient of data to check its correctness 3.2 check-value function function f which maps a string of bits and a short secret key, i.e. a key that can r

36、eadily be entered into or read from a user device, to a fixed-length string of bits, i.e. a b-bit check-value, satisfying the following properties: for any key k and any input string d, the function f(d, k) can be computed efficiently; it is computationally infeasible to find a pair of distinct data

37、 strings (d, d ) for which the number of keys which satisfy f(d, k) = f(d , k) is more than a small fraction of the possible set of keys. NOTE In practice, a short key would typically contain 46 digits or alphanumeric characters. BS ISO/IEC 9798-6:2010 ISO/IEC 9798-6:2010(E) 2 ISO/IEC 2010 All right

38、s reserved3.3 data origin authentication corroboration that the source of data received is as claimed ISO 7498-2 3.4 digest-value string of bits, computed as the output of a digest function, sent from the data originator to the data recipient that enables the recipient of data to check its correctne

39、ss 3.5 digest function function d which maps a string of bits and a long secret key to a short and fixed-length string of bits, i.e. a b-bit digest-value, that can readily be entered into or read from a user device, satisfying the following properties: for any key k and any input string m, the funct

40、ion d(m, k) can be computed efficiently; it is computationally infeasible to find a pair of distinct data strings (m, m ) for which the proportion of keys which satisfy d(m, k) = d(m , k) is greater than (2 -b+ ), where b is the bit length of a digest-value and is a value that is negligible relative

41、 to 2 -b . NOTE 1 In practice, the second digest function property should be satisfied if the key k is of the size of a typical cryptographic hash value, for example, 160 bits. This requirement derives from theoretical lower bounds on the key length for universal hash-functions, which are a general

42、class of digest functions. More detailed discussions of this issue can be found in Annex F. NOTE 2 See Annexes D, F, and G for further discussions of key and digest lengths. 3.6 hash-function function which maps strings of bits to fixed-length strings of bits, satisfying the following two properties

43、: it is computationally infeasible to find for a given output an input which maps to this output; it is computationally infeasible to find for a given input a second input which maps to the same output. ISO/IEC 10118-1 3.7 manual authentication certificate combination of a secret key and a check-val

44、ue, generated by one of the two devices engaging in manual authentication, with the property that, when entered into the other device, this pair of values can be used to complete the manual authentication process at some later time 3.8 Message Authentication Code MAC string of bits which is the outp

45、ut of a MAC algorithm ISO/IEC 9797-1 BS ISO/IEC 9798-6:2010 ISO/IEC 9798-6:2010(E) ISO/IEC 2010 All rights reserved 33.9 Message Authentication Code algorithm MAC algorithm algorithm for computing a function which maps strings of bits and a secret key to fixed-length strings of bits, satisfying the

46、following properties: for any key and any input string the function can be computed efficiently; for any fixed key, and given no prior knowledge of the key, it is computationally infeasible to compute the function value on any new input string, even given knowledge of the set of input strings and co

47、rresponding function values, where the value of the ith input string may have been chosen after observing the value of the first i-1 function values. ISO/IEC 9797-1 3.10 manual entity authentication process achieving entity authentication between two devices using a combination of message exchanges

48、via a (potentially insecure) communications channel and the manual transfer of limited amounts of data between the devices 3.11 simple input interface interface for a device that allows the user to indicate to the device the successful or unsuccessful completion of a procedure, e.g. as could be impl

49、emented as a pair of buttons or a single button which is either pressed or not within a certain time interval 3.12 simple output interface interface for a device that allows the device to indicate to the user the successful or unsuccessful completion of a procedure, e.g. as could be implemented by red and green lights or as single light which is lit in different ways to indicate success or failure 4 Symbols and abbreviated terms A, B Labels used for the tw

展开阅读全文
相关资源
  • BS ISO IEC 29150-2011 Information technology Security techniques Signcryption《信息技术 安全技术 签密》.pdfBS ISO IEC 29150-2011 Information technology Security techniques Signcryption《信息技术 安全技术 签密》.pdf
  • BS ISO IEC 15408-1-2009 Information technology - Security techniques - Evaluation criteria for IT Security - Introduction and general model《信息技术 安全技术 IT安全评价准则 一.pdfBS ISO IEC 15408-1-2009 Information technology - Security techniques - Evaluation criteria for IT Security - Introduction and general model《信息技术 安全技术 IT安全评价准则 一.pdf
  • BS ISO 7295-1988+A1-2014 Tyre valves for aircraft Interchangeability dimensions《飞机轮胎汽门嘴 互换性尺寸》.pdfBS ISO 7295-1988+A1-2014 Tyre valves for aircraft Interchangeability dimensions《飞机轮胎汽门嘴 互换性尺寸》.pdf
  • BS ISO 15118-1-2013 Road vehicles Vehicle to grid communication interface General information and use-case definition《道路车辆 车辆到电力通讯接口 通用信息和使用案例定义》.pdfBS ISO 15118-1-2013 Road vehicles Vehicle to grid communication interface General information and use-case definition《道路车辆 车辆到电力通讯接口 通用信息和使用案例定义》.pdf
  • BS ISO 13765-2-2004 Refractory mortars - Determination of consistency using the reciprocating flow table method《耐熔灰浆 使用往复流动表法测定一致性》.pdfBS ISO 13765-2-2004 Refractory mortars - Determination of consistency using the reciprocating flow table method《耐熔灰浆 使用往复流动表法测定一致性》.pdf
  • BS ISO 10998-2008+A1-2014 Agricultural tractors Requirements for steering《农业拖拉机 操纵要求》.pdfBS ISO 10998-2008+A1-2014 Agricultural tractors Requirements for steering《农业拖拉机 操纵要求》.pdf
  • BS Z 9-1998 Space data and information transfer systems - Advanced orbiting systems - Networks and data links - Architectural specification《空间数据和信息传输系统 高级轨道系统 网络和数据链接 结构规范》.pdfBS Z 9-1998 Space data and information transfer systems - Advanced orbiting systems - Networks and data links - Architectural specification《空间数据和信息传输系统 高级轨道系统 网络和数据链接 结构规范》.pdf
  • BS Z 7-1998 Space data and information transfer systems - ASCII encoded English《空间数据和信息传输系统 ASCII 编码英语》.pdfBS Z 7-1998 Space data and information transfer systems - ASCII encoded English《空间数据和信息传输系统 ASCII 编码英语》.pdf
  • BS Z 5-1997 Space data and information transfer systems - Standard formatted data units - Control authority procedures《航天数据和信息发送系统 标准格式数据单元 控制授权程序》.pdfBS Z 5-1997 Space data and information transfer systems - Standard formatted data units - Control authority procedures《航天数据和信息发送系统 标准格式数据单元 控制授权程序》.pdf
  • BS Z 4-1997 Space data and information transfer systems - Standard formatted data units - Structure and construction rules《航天数据和信息传输系统 标准格式数据单元 结构和构造规则》.pdfBS Z 4-1997 Space data and information transfer systems - Standard formatted data units - Structure and construction rules《航天数据和信息传输系统 标准格式数据单元 结构和构造规则》.pdf
  • 猜你喜欢
    相关搜索

    当前位置:首页 > 标准规范 > 国际标准 > BS

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1