• IEEE 802.10c-1998

IEEE 802.10c-1998

IEEE Standards for Local and Metropolitan Area Networks: Supplement to Standard for Interoperable LAN/MAN Security (SILS)--Key Management (Clause 3)

IEEE, 04/28/1998

Publisher: IEEE

File Format: PDF

$90.00$181.00


Published:28/04/1998

Pages:97

File Size:1 file , 1.1 MB

Note:This product is unavailable in Russia, Belarus

To define a standard for services, protocols, data formats, and interfaces that will allow secure IEEE 802 LAN products to interoperate. IEEE 802.10 has specified three areas for standardization: Secure Data Exchange, Key Management, and Security Management, and the objects necessary to manage each protocol. The goals of each of these areas of SILS are to be as independent as possible of any particular encryption algorithm, such as DES or RSA, and of the transmission media. The work in each area is based on the OSI Seven Layer model (IS 7498) and on the OSI Security Architecture (IS 7498/2). The Key Management Standard specifies a Layer 7 protocol that will provide secure automated management of the cryptographic keys to be used by the Secure Data Exchange at Layer 2 or by Security Management at Layer 7. The standard will draw on work already done for Key Management by other standards groups. The ANSI X9.E9 group has written a Key Management standard for use by the Banking Community. ECMA TC32/TG9 has proposed a framework for secure applications, and the Secure Data Network System (SDNS) project has developed a key management standard for use with public key algorithms. The 802.10 Key Management standard will consider each of these standards to determine if the standard or some form of the standard is appropriate for use with LANs. The appendices to the SILS Key Management standard will provide explanatory information for the standard. The Rationale for Security Services Appendix will explain why the services that Key Management provides are appropriate for the management of cryptographic keys on LANs and how those services address the threats posed to the security of automated key distribution on LANs. The Examples of Algorithms Appendix will give an example of the use of Key Management withparticular algorithms. The Philosophy of Key Management Appendix will provide guidelines on the manual aspects of key management such as the secure distribution of Initialization Keys.

More IEEE standard pdf

IEEE 1484.4-2007

IEEE 1484.4-2007

IEEE Recommended Practice for Digital Rights Expression Languages (DRELs) Suitable for eLearning Technologies

$55.00 $111.00

IEEE 1502-2007

IEEE 1502-2007

IEEE Recommended Practice for Radar Cross-Section Test Procedures

$52.00 $104.00

IEEE 269a-2007

IEEE 269a-2007

IEEE Standard Methods for Measuring Transmission Performance of Analog and Digital Telephone Sets, Handsets, and Headsets Amendment 1

$52.00 $104.00

IEEE 802.3-1998

IEEE 802.3-1998

IEEE Standards for Information technology¿¿¿Telecommunications and information exchange between systems¿¿¿Local and metropolitan area networks-Specific requirements-Part 3: Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Access Method and Physical Layer Specifications

$45.00 $90.00