• IEEE 802.10c-1998

IEEE 802.10c-1998

IEEE Standards for Local and Metropolitan Area Networks: Supplement to Standard for Interoperable LAN/MAN Security (SILS)--Key Management (Clause 3)

IEEE, 04/28/1998

Publisher: IEEE

File Format: PDF

$90.00$181.00


Published:28/04/1998

Pages:97

File Size:1 file , 1.1 MB

Note:This product is unavailable in Russia, Belarus

To define a standard for services, protocols, data formats, and interfaces that will allow secure IEEE 802 LAN products to interoperate. IEEE 802.10 has specified three areas for standardization: Secure Data Exchange, Key Management, and Security Management, and the objects necessary to manage each protocol. The goals of each of these areas of SILS are to be as independent as possible of any particular encryption algorithm, such as DES or RSA, and of the transmission media. The work in each area is based on the OSI Seven Layer model (IS 7498) and on the OSI Security Architecture (IS 7498/2). The Key Management Standard specifies a Layer 7 protocol that will provide secure automated management of the cryptographic keys to be used by the Secure Data Exchange at Layer 2 or by Security Management at Layer 7. The standard will draw on work already done for Key Management by other standards groups. The ANSI X9.E9 group has written a Key Management standard for use by the Banking Community. ECMA TC32/TG9 has proposed a framework for secure applications, and the Secure Data Network System (SDNS) project has developed a key management standard for use with public key algorithms. The 802.10 Key Management standard will consider each of these standards to determine if the standard or some form of the standard is appropriate for use with LANs. The appendices to the SILS Key Management standard will provide explanatory information for the standard. The Rationale for Security Services Appendix will explain why the services that Key Management provides are appropriate for the management of cryptographic keys on LANs and how those services address the threats posed to the security of automated key distribution on LANs. The Examples of Algorithms Appendix will give an example of the use of Key Management withparticular algorithms. The Philosophy of Key Management Appendix will provide guidelines on the manual aspects of key management such as the secure distribution of Initialization Keys.

More IEEE standard pdf

IEEE C93.3-2017

IEEE C93.3-2017

IEEE Standard Requirements for Power-Line Carrier Line Traps (30 kHz to 500 kHz)

$31.00 $62.00

IEEE C62.55-2017

IEEE C62.55-2017

IEEE Guide for Surge Protection of DC Power Feeds to Remote Radio Heads

$31.00 $62.00

IEEE C2-2012-HB

IEEE C2-2012-HB

NESC Handbook: A Discussion of the National Electrical Safety Code, 7th Edition

$148.00 $296.08

IEEE 1904.1-2017

IEEE 1904.1-2017

IEEE Standard for Service Interoperability in Ethernet Passive Optical Networks (SIEPON)

$203.00 $406.00