ITU-T T 36 AMD 1-1999 Security Capabilities for Use with Group 3 Facsimile Terminals Amendment 1 Series T Terminals for Telematic Services (Study Group 8 7 pp)《三类传真终端的安全能力 第1次修改-T系.pdf

上传人:eveningprove235 文档编号:803657 上传时间:2019-02-04 格式:PDF 页数:7 大小:197.85KB
下载 相关 举报
ITU-T T 36 AMD 1-1999 Security Capabilities for Use with Group 3 Facsimile Terminals Amendment 1 Series T Terminals for Telematic Services (Study Group 8 7 pp)《三类传真终端的安全能力 第1次修改-T系.pdf_第1页
第1页 / 共7页
ITU-T T 36 AMD 1-1999 Security Capabilities for Use with Group 3 Facsimile Terminals Amendment 1 Series T Terminals for Telematic Services (Study Group 8 7 pp)《三类传真终端的安全能力 第1次修改-T系.pdf_第2页
第2页 / 共7页
ITU-T T 36 AMD 1-1999 Security Capabilities for Use with Group 3 Facsimile Terminals Amendment 1 Series T Terminals for Telematic Services (Study Group 8 7 pp)《三类传真终端的安全能力 第1次修改-T系.pdf_第3页
第3页 / 共7页
ITU-T T 36 AMD 1-1999 Security Capabilities for Use with Group 3 Facsimile Terminals Amendment 1 Series T Terminals for Telematic Services (Study Group 8 7 pp)《三类传真终端的安全能力 第1次修改-T系.pdf_第4页
第4页 / 共7页
ITU-T T 36 AMD 1-1999 Security Capabilities for Use with Group 3 Facsimile Terminals Amendment 1 Series T Terminals for Telematic Services (Study Group 8 7 pp)《三类传真终端的安全能力 第1次修改-T系.pdf_第5页
第5页 / 共7页
点击查看更多>>
资源描述

1、STD-ITU-T RECMN T.3b AMD 1-ENGL 1999 = 48b2573 Ob64395 O8T I NTE R NAT I O N AL TEL ECO M M U N I CATI ON U N I ON ITU=T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU T.36 Amendment 1 (04/99) SERIES T: TERMINALS FOR TELEMATIC SERVICES Security capabilities for use with Group 3 facsimile terminals

2、Amendment I ITU-T Recommendation T.36 - Amendment 1 (Previously CCIlT Recommendation) - STD.ITU-T RECIN Te36 AID 3-ENGL 3799 4862593 0664396 T3b ITU-T T-SERIES RECOMMENDATIONS TERMINALS FOR TELEMATIC SERVICES For further details, please refer to TU-T List of Recommendations. STD.ITU-T RECMN T.36 AND

3、 1-ENGL 1999 m 4862591 Obb4L97 952 W ITU-T RECOMMENDATION T.36 SECURITY CAPABILITIES FOR USE WITH GROUP 3 FACSIMILE TERMINALS AMENDMENT 1 Summary Amendment i to Recommendation T.36 defines the override mode associated with the HKMMFX encryption system. Source Amendment 1 to ITU-T Recommendation T.36

4、 was prepared by ITU-T Study Group 8 (1997-2000) and was approved under the WTSC Resolution No. 1 procedure on the 1st of April 1999. i Recommendation T.36/Amd.l (04/99) . FOREWORD ITU (International Telecommunication Union) is the United Nations Specialized Agency in the field of telecommuni- catio

5、ns. The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of the ITU. The ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing telecommunications on a worldwide basis. The World Telecommun

6、ication Standardization Conference (WTSC), which meets every four years, establishes the topics for study by the ITU-T Study Groups which, in their turn, produce Recommendations on these topics. The approval of Recommendations by the Members of the ITU-T is covered by the procedure laid down in WTSC

7、 Resolution No. 1. In some areas of information technology which fall within ITU-Ts purview, the necessary standards are prepared on a collaborative basis with IS0 and EC. NOTE In this Recommendation the term recognized operating agency (ROA) includes any individual, company, corporation or governme

8、ntal organization that operates a public correspondence service. The terms Administration, ROA and public correspondence are defined in the Constitution of the ITU (Geneva, 1992). INTELLECTUAL PROPERTY RIGHTS The ITU draws attention to the possibility that the practice or implementation of this Reco

9、mmendation may involve the use of a claimed Intellectual Property Right. The ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others outside of the Recommendation development process. As of the date o

10、f approval of this Recommendation, the ITLJ had not received notice of intellectual property, protected by patents, which may be required to implement this Recommendation. However, implementors are cautioned that this may not represent the latest information and are therefore strongly urged to consu

11、lt the TSB patent database. O ITU 1999 All rights reserved. No part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from the ITU. 11 Recommendation T.36/Amd.l (04199) STDmITU-

12、T RECMN T.3b AMD 1-ENGL 1999 - 48b2591 Obb4199 725 D CONTENTS 1) Subclause A.2.2 2) New subclause C.7 . Page 1 1 . Recommendation T.36/Amd.l (04/99) 111 STD-ITU-T RECMN Te36 AID 1-ENGL 1977 4862591 O664200 277 Recommendation T.36 SECURITY CAPABILITIES FOR USE WITH GROUP 3 FACSIMILE TERMINALS AMENDME

13、NT 1 (Geneva, 1999) 1) Subclause A.2.2 Amend A.2.2 to read as follows: A.2.2 Functions Key management is provided using the HKM system defined in Annex CR.36. Three procedures are defined: 1) 2) 3) the registration mode (see C.4); the secure mode (see C.5); and the override mode (see C.7). Registrat

14、ion establishes mutual secrets and enables all subsequent transmissions to be provided securely. In subsequent transmissions, the HKM system provides mutual authentication, a secret session key for document confidentiality and integrity, confirmation of receipt and a confirmation or denial of docume

15、nt integrity. Document confidentiality is provided using the carrier cipher defined in Annex DiT.36. The carrier cipher uses a 12-decimal digit key which is approximately equivalent to 40 bits. Document integrity is provided using the system defined in Annex EK.36. This annex defines the hashing alg

16、orithm including the associated calculations and information exchange. 2) New subclause C.7 Add a new subclause C. 7 to read as follows: C.7 Override mode The override mode allows the terminal operators to communicate independently and in secret using two secure facsimile terminals conforming to Rec

17、ommendation T.36 without carrying out a registration process between the two terminals. This is accomplished by by-passing the automatic key management procedures of the secure mode (see C.5). No mutual primitive is generated, no registered crypt number is retrieved and no secret session key is esta

18、blished. Instead, a mutually agreed pre-arranged 12-digit secret session key is entered by the terminal user at the sending terminal which is used with a carrier cipher to provide document confidentially. The terminal user at the receiving terminal enters the same mutually agreed key which is used w

19、ith the carrier cipher to decrypt the received document. Recommendation T.36Amd.l (04/99) 1 - STD-ITU-T RECflN Ta36 AMD 3-ENGL 3999 D 4862593 Obb420L II03 D series A Series B Series C Series D Series E Series F Series G Series H Series I Series J Series K Series L Series M Series N Series O Series P

20、 Series Q Series R Series S Series T Series U Series V Series X Series Y Series Z ITU-T RECOMMENDATIONS SERIES Organization of the work of the ITU-T Means of expression: definitions, symbols, classification General telecommunication statistics General tariff principles Overall network operation, tel

21、ephone service, service operation and human factors Non-telephone telecommunication services Transmission systems and media, digital systems and networks Audiovisual and multimedia systems Integrated services digital network Transmission of television, sound programme and other multimedia signals Pr

22、otection against interference Construction, installation and protection of cables and other elements of outside plant TMN and network maintenance: international transmission systems, telephone circuits, telegraphy, facsimile and leased circuits Maintenance: international sound programme and televisi

23、on transmission circuits Specifications of measuring equipment Telephone transmission quality, telephone installations, local line networks Switching and signalling Telegraph transmission Telegraph services terminal equipment Terminals for telematic services Tel e graph switching Data communication over the telephone network Data networks and open system communications Global information infrastructure Languages and general software aspects for telecommunication systems Printed in Switzerland Geneva, 1999

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 标准规范 > 国际标准 > 其他

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1