DataMuseum.dk

Presents historical artifacts from the history of:

DKUUG/EUUG Conference tapes

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about DKUUG/EUUG Conference tapes

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics - download
Index: T U

⟦04e3c6ac3⟧ TextFile

    Length: 739665 (0xb4951)
    Types: TextFile
    Notes: Uncompressed file

Derivation

└─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen
    └─⟦98bf13d1f⟧ »./papers/Misc/OpenSystemsSecurity.ps.Z« 
        └─⟦this⟧ 

TextFile

%%Title: "Laser Prep -- The Apple PostScript Dictionary (md)"
%%Creator: Apple Software Engineering
%{appledict version #68 0
% ▶a9◀ CopyRight Apple Computer, Inc. 1984,1985,1986,1987,1988 All Rights Reserved.
%%EndComments
%%BeginProcSet: "(AppleDict md)" 68 0
% (changed) statusdict begin waittimeout 300 lt{0 60 300 setdefaulttimeouts}if end
currentfile statusdict begin serverdict begin product (LaserWriter II NT) eq revision 1 eq and {/setrealdevice {% (changed) //setrealdevice
 exec 31 sendpcmd 4 eq tonerlight} bind def
/execjob {31 sendpcmd 4 eq tonerlight % (changed) //execjob
 exec} bind def end end eexec}{end end 722{currentfile read pop pop}repeat}ifelse 
35de8eabfc7fa5eac0431edc501ad43f5fcbdf9fdd321cce93b525f4439dd94696bf56ac13a0a2aad1e6bcf444711e941d7217138d20ae0500145f815439cc14e697ad201df728ea4ccad4ac331aa03a7aacde10760bf4ee12bbf73c77cdcbf1796f26f0dd255d2407e1ac41
d27489a69d6b69c6a841468b46720b75ad65650700e0c528e7af61e7e3e821b59445c44b69831ebc9deaf0e3aecc14b7a1c2e18bc1fa42a59219f1e36f236e3d6c89114b1f231999c3dbce6b43f3e2918fcb85575941a9d1e65c86aa08e6eea86cc66ce90e5e4add57f2585e
7b1c0b5203cfc46868d6e3c0d66db79174e7091e32e307679732da062e440e41dabd36a161b611a7e4523a49694026206803dbfd5be5c5fe433f0f18a40057db6f1302848c8da4a10a7f14c63d512806362b1be092ad5dbd36d75fe63e4cae2ba9b72390f580cac344a08bdf
6eb9e36ec45bad2a0b82829a72e0efa2d87332c482196e690361168271c55053341ab3
/sc {60 45 {abs exch abs 2 copy add 1 gt{1.0 sub dup mul exch 1.0 sub dup mul add 1.0 sub}{dup mul exch dup mul add 1.0 exch sub}
ifelse}setscreen} bind def statusdict begin product(LaserWriter II)anchorsearch end
{pop pop/letter [/letter load /exec load /sc load /exec load]cvx def/legal [/legal load /exec load /sc load /exec load]cvx def/a4 [/a4 load /exec load /sc load /exec load]cvx def/b5 [/b5 load /exec load /sc load /exec load]cvx def
/lettersmall [/lettersmall load /exec load /sc load /exec load]cvx def/a4small [/a4small load /exec load /sc load /exec load]cvx def/note [/note load /exec load /sc load /exec load]cvx def}{pop}ifelse
systemdict/currentpacking known{currentpacking true setpacking}if
/LW{save statusdict/product get(LaserWriter)anchorsearch
exch pop{length 0 eq{1}{2}ifelse}{0}ifelse exch restore}bind def
/LW+{LW 2 eq}bind def
/ok{systemdict/statusdict known dup{LW 0 gt and}if}bind def
ok{statusdict begin 9 sccinteractive 3 ne exch 0 ne or{9 0 3 setsccinteractive}if end}if
/md 250 dict def md begin
/av 0 def
/T true def/F false def/mtx matrix def/s75 75 string def/s8 8 string def/s1 ( ) def/pxs 1 def/pys 1 def
1 0 mtx defaultmatrix dtransform exch atan/pa exch def/nlw .24 def/ppr [-32 -29.52 762 582.48] def
/pgs 1 def/por true def/xb 500 array def/so true def/tso true def/fillflag false def/pnm 1 def/fmv true def
/sfl false def/ma 0 def/invertflag false def/dbinvertflag false def/xflip false def/yflip false def/noflips true def/scaleby96 false def/fNote true def/fBitStretch true def
/fg (Rvd\001\001\000\000\177) def
/bdf{bind def}bind def
/xdf{exch def}bdf
/xl{neg exch neg translate}bdf
/fp{pnsh 0 ne pnsv 0 ne and}bdf
/nop{}bdf/lnop[/nop load]cvx bdf
/vrb[
{fp{fg 6 get 0 ne{gsave stroke grestore}{gsave 1 setlinewidth pnsh pnsv scale stroke grestore}ifelse}if newpath}bind
/eofill load
dup
/newpath load
2 index
dup
{clip newpath}bind
{}bind
dup
2 copy
]def
currentscreen/spf xdf/rot xdf/freq xdf
/doop{vrb exch get exec}bdf
/psu{/tso xdf /fNote xdf/fBitStretch xdf/scaleby96 xdf/yflip xdf/xflip xdf
/invertflag xdf/dbinvertflag invertflag statusdict begin version cvr 47.0 ge product (LaserWriter) eq not and end invertflag and {not}if def
xflip yflip or{/noflips false def}if
/pgs xdf 2 index .72 mul exch div/pys xdf div .72 mul/pxs xdf ppr astore pop/por xdf sn and/so xdf}bdf
/tab{statusdict /11x17 known{statusdict begin /11x17 load end}{statusdict /setpage known{statusdict begin 792 1224 1 setpage end}{statusdict /setpageparams known{statusdict begin 792 1224 0 1 setpageparams end}if}ifelse}ifelse}bdf
/txpose{fNote{smalls}{bigs}ifelse pgs get exec pxs pys scale ppr aload pop por{noflips{pop exch neg exch translate pop 1 -1 scale}if
xflip yflip and{pop exch neg exch translate 180 rotate 1 -1 scale ppr 3 get ppr 1 get neg sub neg ppr 2 get ppr 0 get neg sub neg translate}if 
xflip yflip not and{pop exch neg exch translate pop 180 rotate ppr 3 get ppr 1 get neg sub neg 0 translate}if yflip xflip not and{ppr 1 get neg ppr 0 get neg translate}if}
{noflips{translate pop pop 270 rotate 1 -1 scale}if xflip yflip and{translate pop pop 90 rotate 1 -1 scale ppr 3 get ppr 1 get neg sub neg ppr 2 get ppr 0 get neg sub neg translate}if
xflip yflip not and{translate pop pop 90 rotate ppr 3 get ppr 1 get neg sub neg 0 translate}if yflip xflip not and{translate pop pop 270 rotate ppr 2 get ppr 0 get neg sub neg 0 exch translate}if}ifelse
statusdict begin waittimeout 300 lt{/waittimeout 300 def}if end scaleby96{ppr aload pop 4 -1 roll add 2 div 3 1 roll add 2 div 2 copy translate .96 dup scale neg exch neg exch translate}if}bdf
/fr{4 copy ppr aload pop 3 -1 roll add 3 1 roll exch add 6 2 roll 3 -1 roll
sub 3 1 roll exch sub 3 -1 roll exch div 3 1 roll div exch scale pop pop xl}bdf
/obl{{0.212557 mul}{pop 0}ifelse}bdf
/sfd{ps fg 5 -1 roll get mul 100 div 0 ps 5 -1 roll obl ps neg 0 0 6a astore makefont setfont}bdf
/fnt{findfont sfd}bdf
/bt{sa 3 1 roll 3 index and put}bdf
/sa(\000\000\000\000\000\000\000\000\000\000)def
/fs{0 1 bt 1 2 bt 2 4 bt 3 8 bt 4 16 bt 5 32 bt 6 64 bt 7 128 bt sa exch 8 exch put}bdf
/mx1 matrix def
/mx2 matrix def
/mx3 matrix def
/bu{currentpoint currentgray currentlinewidth currentlinecap currentlinejoin currentdash exch aload length
fg 5 sfl{1}{0}ifelse put pnsv pnsh
2t aload pop 3a aload pop mx2 aload pop mx1 aload pop mtx currentmatrix aload pop
mx3 aload pop ps pm restore/ps xdf mx3 astore pop}bdf
/bn{/pm save def mx3 setmatrix newpath 0 0 moveto ct dup 39 get 0 exch getinterval cvx exec
mtx astore setmatrix mx1 astore pop mx2 astore pop 3a astore pop
2t astore pop/pnsh xdf/pnsv xdf gw
/sfl fg 5 get 0 ne def array astore exch setdash setlinejoin setlinecap
setlinewidth setgray moveto}bdf
/fc{save vmstatus exch sub 50000 lt
{(%%[|0|]%%)=print flush}if pop restore}bdf
/tc{32768 div add 3 1 roll 32768 div add 2t astore pop}bdf
/3a [0 0 0] def
/2t 2 array def
/tp{3a astore pop}bdf
/tt{mx2 currentmatrix pop currentpoint 2 copy 2t aload pop qa 2 copy translate 3a aload pop exch dup 0 eq
{pop}{1 eq{-1 1}{1 -1}ifelse scale}ifelse rotate pop neg exch neg exch translate moveto}bdf
/te{mx2 setmatrix}bdf
/th{3 -1 roll div 3 1 roll exch div 2 copy mx1 scale pop scale/sfl true def}bdf
/tu{1 1 mx1 itransform scale/sfl false def}bdf
/ts{1 1 mx1 transform scale/sfl true def}bdf
/fz{/ps xdf}bdf
/dv{dup 0 ne{div}{pop}ifelse}bdf
/pop4{pop pop pop pop}bdf
/it{sfl{mx1 itransform}if}bdf
/gm{exch it moveto}bdf/rm{it rmoveto}bdf
/lm{currentpoint sfl{mx1 transform}if exch pop sub 0 exch it rmoveto}bdf
/fm{statusdict/manualfeed known}bdf
/se{statusdict exch/manualfeed exch put}bdf
/mf{dup/ma exch def 0 gt{fm se/t1 5 st ok ma 1 gt and{/t2 0 st/t3 0 st
statusdict/manualfeedtimeout 3600 put
}if}if}bdf
/jn{/statusdict where exch pop{statusdict exch /jobname exch put}if}bdf
/pen{pnm mul/pnsh xdf pnm mul/pnsv xdf pnsh setlinewidth}bdf
/min{2 copy gt{exch}if pop}bdf
/max{2 copy lt{exch}if pop}bdf
/dh{fg 6 1 put array astore dup {1 pxs div mul exch}forall astore exch pop exch pop exch setdash}bdf
/ih[currentdash]def
/rh{fg 6 0 put ih aload pop setdash}bdf
/dl{gsave nlw pys div setlinewidth 0 setgray}bdf
/dlin{exch currentpoint currentlinewidth 2 div dup
translate newpath moveto lineto currentpoint stroke grestore moveto}bdf
/lin{fg 6 get 0 ne{exch lineto currentpoint 0 doop moveto}
{exch currentpoint/pnlv xdf/pnlh xdf gsave newpath/@1 xdf/@2 xdf fp{pnlh @2 lt{pnlv @1 ge
{pnlh pnlv moveto @2 @1 lineto pnsh 0 rlineto
0 pnsv rlineto pnlh pnsh add pnlv pnsv add lineto pnsh neg 0 rlineto}
{pnlh pnlv moveto pnsh 0 rlineto @2 pnsh add @1 lineto 0 pnsv rlineto
pnsh neg 0 rlineto pnlh pnlv pnsv add lineto}ifelse}{pnlv @1 gt
{@2 @1 moveto pnsh 0 rlineto pnlh pnsh add pnlv lineto 0 pnsv rlineto
pnsh neg 0 rlineto @2 @1 pnsv add lineto}{pnlh pnlv moveto pnsh 0 rlineto
0 pnsv rlineto @2 pnsh add @1 pnsv add lineto pnsh neg 0 rlineto
0 pnsv neg rlineto}ifelse}ifelse
closepath fill}if @2 @1 grestore moveto}ifelse}bdf
/gw{/pnm fg 3 get fg 4 get div def}bdf
/lw{fg exch 4 exch put fg exch 3 exch put gw pnsv pnsh pen}bdf
/barc{/@1 xdf/@2 xdf/@3 xdf/@4 xdf/@5 xdf
/@6 xdf/@7 xdf/@8 xdf gsave
@5 @7 add 2 div @6 @8 add 2 div translate newpath 0 0 moveto
@5 @7 sub @6 @8 sub mtx currentmatrix pop scale @1{newpath}if
0 0 0.5 @4 @3 arc @4 @3 sub abs 360 ge{closepath}if
mtx setmatrix @2 doop grestore}bdf
/ar{dup 0 eq barc}bdf
/ov{0 exch 360 exch true barc}bdf
/rc{/@t xdf currentpoint 6 2 roll newpath 4 copy 4 2 roll exch moveto
6 -1 roll lineto lineto lineto closepath @t doop moveto}bdf
/mup{dup pnsh 2 div le exch pnsv 2 div le or}bdf
/rr{/@1 xdf 2. div/@2 xdf 2. div/@3 xdf
/@4 xdf/@5 xdf/@6 xdf/@7 xdf
@7 @5 eq @6 @4 eq @2 mup or or{@7 @6 @5 @4 @1 rc}
{@4 @6 sub 2. div dup @2 lt{/@2 xdf}{pop}ifelse
@5 @7 sub 2. div dup @2 lt{/@2 xdf}{pop}ifelse
@1 0 eq{/@2 @2 pnsh 2 div 2 copy gt{sub def}{0 pop4}ifelse}if
currentpoint newpath
@4 @6 add 2. div @7 moveto
@4 @7 @4 @5 @2 arcto pop4
@4 @5 @6 @5 @2 arcto pop4
@6 @5 @6 @7 @2 arcto pop4
@6 @7 @4 @7 @2 arcto pop4
closepath @1 doop moveto}ifelse}bdf
/pr{gsave newpath/pl{exch moveto/pl{exch lineto}def}def}bdf
/pl{exch lineto}bdf
/ep{dup 0 eq{{moveto}{exch lin}{}{(%%[|1|]%%)= flush}pathforall
pop grestore}{doop grestore}ifelse currentpoint newpath moveto}bdf
/gr{64. div setgray}bdf
/pat{s8 copy pop 9.375 pa por not{90 add}if{1 add 4 mul cvi s8 exch get exch 1 add 4 mul cvi 7 sub bitshift 1 and}setscreen gr}bdf
/sg{freq rot/spf load setscreen gr}bdf
/dc{transform round .5 sub exch round .5 sub exch itransform}bdf
/sn{userdict/smooth4 known}bdf
/x8{3 bitshift}bdf
/x4{2 bitshift}bdf
/d4{-2 bitshift}bdf
/d8{-3 bitshift}bdf
/rb{15 add -4 bitshift 1 bitshift}bdf
/db{/@7 save def/@1 xdf/@2 xdf/@3 xdf/@4 xdf/@5 xdf/@6 @5 @3 4 add mul def
dc translate scale/xdbit 1 1 idtransform abs/ydbit exch def abs def{0 0 1 ydbit add 1 10 rc clip}if
@1 0 eq @1 4 eq or{1 setgray ydbit 0 1 ydbit add 1 2 rc}if
@1 3 eq @1 7 eq or{1}{0}ifelse setgray/@9 @1 0 eq @1 1 eq @1 3 eq or or dbinvertflag xor def/@13 @6 def
@2 fBitStretch or{/@10 @4 x4 def/@11 @3 x4 def/@12 @10 rb def/@13 @12 @11 mul def/@15 1 1 dtransform abs/calcY 1 index def round cvi/@14 exch def
abs/calcX 1 index def round cvi scaleby96 not{1 add}if def/@16 @15 rb def/@17 @16 @14 mul def}if
sn @13 60000 lt and @2 fBitStretch or and{mtx currentmatrix dup 1 get exch 2 get 0. eq exch 0. eq and @17 60000 lt and fBitStretch and{@16 3 bitshift @14 @9 [calcX 0 0 calcY 0 0]{@17 string @13 string
currentfile @6 string readhexstring pop 1 index @4 @3 @5 @12 @2 smooth4
@10 @11 @12 dup string 5 index @15 @14 @16 dup string stretch}imagemask}{@12 x8 @11 @9 [@10 0 0 @11 0 0]{@13 string
currentfile @6 string readhexstring pop 1 index @4 @3 @5 @12 @2 smooth4}imagemask}ifelse}{@5 3 bitshift @3 4 add @9 [@4 0 0 @3 0 2]{currentfile @6 string readhexstring pop}imagemask}ifelse
@7 restore}bdf
/multibit{/mbdeep exch def/mbY exch def/mbX exch def
save mbX mbY mbdeep[mbX 0 0 mbY 0 0]{currentfile picstr readhexstring pop}image
restore}bdf
/wd 16 dict def
/mfont 14 dict def
/mdf{mfont wcheck not{/mfont 14 dict def}if mfont begin xdf end}bdf
/cf{{1 index/FID ne{def}{pop pop}ifelse}forall}bdf/rf{/@1 exch def/@2 exch def
FontDirectory @2 known{cleartomark pop}{findfont dup begin dup length @1 add dict begin
cf{/Encoding macvec def}{Encoding dup length array copy/Encoding exch def
counttomark 2 idiv{Encoding 3 1 roll put}repeat}ifelse
pop
exec currentdict end end @2 exch definefont pop}ifelse}bdf
/bmbc{exch begin wd begin
/cr xdf
save
CharTable cr 6 mul 6 getinterval{}forall
/bitheight xdf/bitwidth xdf
.96 div/width xdf
Gkernmax add/XOffset xdf Gdescent add/YOffset xdf/rowbytes xdf
rowbytes 255 eq{0 0 0 0 0 0 setcachedevice}
{Gnormsize dup scale
width 0 XOffset YOffset bitwidth XOffset add bitheight YOffset add
setcachedevice
rowbytes 0 ne{
XOffset YOffset translate newpath 0 0 moveto
bitwidth bitheight scale
sn{
/xSmt bitwidth x4 def
/ySmt bitheight x4 def
/rSmt xSmt rb def
rSmt x8 ySmt true
[xSmt 0 0 ySmt neg 0 ySmt]
{rSmt ySmt mul string CharData cr get
1 index bitwidth bitheight rowbytes rSmt tso smooth4}
}{rowbytes 3 bitshift bitheight 4 add true
[bitwidth 0 0 bitheight neg 0 bitheight 2 add]
{CharData cr get}
}ifelse
imagemask
}if
}ifelse
restore
end end
}bdf
/bb{.96 exch div/Gnormsize mdf 2 index
/Gkernmax mdf 1 index/Gdescent mdf
3 index div 4 1 roll
2 index div 1. 5 2 roll
exch div 4 1 roll
4 array astore/FontBBox mdf
}bdf
/cdf{mfont/CharData get 3 1 roll put}bdf
/bf{
mfont begin
/FontType 3 def
/FontMatrix [1 0 0 1 0 0] def
/Encoding macvec def
/BuildChar/bmbc load def
end
mfont definefont pop
}bdf
/wi LW 1 eq{{gsave 0 0 0 0 0 0 0 0 moveto lineto lineto lineto closepath clip stringwidth grestore}bind}{/stringwidth load}ifelse def
/aps{0 get 124 eq}bdf
/xc{s75 cvs dup}bdf
/xp{put cvn}bdf
/scs{xc 3 67 put dup 0 95 xp}bdf
/sos{xc 3 79 xp}bdf
/sbs{xc 1 66 xp}bdf
/sis{xc 2 73 xp}bdf
/sob{xc 2 79 xp}bdf
/sss{xc 4 83 xp}bdf
/dd{exch 1 index add 3 1 roll add exch}bdf
/smc{moveto dup show}bdf
/kwn{FontDirectory 1 index known{findfont exch pop}}bdf
/gl{1 currentgray sub setgray}bdf
/mm{/mfont 10 dict def mfont begin
/FontMatrix [1 0 0 1 0 0] def
/FontType 3 def
/Encoding macvec def
/df 4 index findfont def
/FontBBox [0 0 1 1] def
/xda xdf/mbc xdf
/BuildChar{wd begin/cr xdf/fd xdf/cs s1 dup 0 cr put def fd/mbc get exec end}def
exec end mfont definefont}bdf
/ac{dup scs kwn{exch findfont dup length 1 add dict begin{1 index/FID ne 2 index/UniqueID ne and{def}{pop pop}ifelse}forall
fmv{/Encoding macvec def}if/StrokeWidth nlw 1000 mul pys div ps div dup 12 lt{pop 12}if def
/PaintType 2 def currentdict end definefont}ifelse}bdf
/mb{dup sbs kwn{exch{pop}{bbc}{}mm}ifelse sfd}bdf
/mo{dup sos kwn{exch{pop}{boc}{}mm}ifelse sfd}bdf
/ms{dup sss kwn{exch{pop}{bsc}{}mm}ifelse sfd}bdf
/ou{dup sos kwn{exch dup ac pop{scs findfont /df2 xdf}{aoc}{}mm}ifelse sfd}bdf
/su{dup sss kwn{exch dup ac pop{scs findfont /df2 xdf}{asc}{}mm}ifelse sfd}bdf
/ao{/fmv true def ou}bdf/as{/fmv true def su}bdf
/vo{/fmv false def ou}bdf/vs{/fmv false def su}bdf
/bbc{/da .03 def fd/df get setfont
gsave cs wi 1 index 0 ne{exch da add exch}if grestore setcharwidth
cs 0 0 smc da 0 smc da da smc 0 da moveto show}bdf
/boc{/da 1 ps div def fd/df get setfont
gsave cs wi 1 index 0 ne{exch da add exch}if grestore setcharwidth
cs 0 0 smc da 0 smc da da smc 0 da smc gl da 2. div dup moveto show}bdf
/bsc{/da 1 ps div def
/ds .05 def/da2 da 2. div def fd/df get setfont
gsave cs wi 1 index 0 ne{exch ds add da2 add exch}if grestore setcharwidth
cs ds da2 add .01 add 0 smc 0 ds da2 sub translate 0 0 smc
da 0 smc da da smc 0 da smc gl da 2. div dup moveto show}bdf
/aoc{fd/df get setfont
gsave cs wi grestore setcharwidth
gl cs 0 0 smc fd/df2 get setfont gl 0 0 moveto show}bdf
/asc{/da .05 def fd/df get setfont
gsave cs wi 1 index 0 ne{exch da add exch}if grestore setcharwidth
cs da .01 add 0 smc 0 da translate gl 0 0 smc gl fd/df2 get setfont 0 0 moveto show}bdf
/st{1000 mul usertime add dup 2147483647 gt{2147483647 sub}if def}bdf
/the{usertime sub dup 0 lt exch -2147483648 gt and}bdf
/6a 6 array def
/2a 2 array def
/3q 3 array def
/qs{3 -1 roll sub exch 3 -1 roll sub exch}bdf
/qa{3 -1 roll add exch 3 -1 roll add exch}bdf
/qm{3 -1 roll 1 index mul 3 1 roll mul}bdf
/qn{6a exch get mul}bdf
/qA .166667 def/qB .833333 def/qC .5 def
/qx{6a astore pop
qA 0 qn qB 2 qn add   qA 1 qn qB 3 qn add
qB 2 qn qA 4 qn add   qB 3 qn qA 5 qn add
qC 2 qn qC 4 qn add   qC 3 qn qC 5 qn add}bdf
/qp{6 copy 12 -2 roll pop pop}bdf
/qc{exch qp qx curveto}bdf
/qi{{exch 4 copy 2a astore aload pop qa .5 qm newpath moveto}{exch 2 copy 6 -2 roll 2 qm qs 4 2 roll}ifelse}bdf
/qq{{qc 2a aload pop qx curveto}{exch 4 copy qs qa qx curveto}ifelse}bdf
/pt{currentpoint newpath moveto}bdf
/qf{/fillflag true def}bdf
/ec{1 and 0 ne{0 doop}if grestore currentpoint newpath moveto/fillflag false def}bdf
/eu{currentpoint fp{0 ep}{grestore newpath}ifelse moveto/fillflag false def}bdf
/bp{currentpoint newpath 2 copy moveto}bdf
/ef{gsave fillflag{gsave eofill grestore}if}bdf
/sm{0 exch{@1 eq{1 add}if}forall}bdf
/lshow{4 1 roll exch/@1 exch def{1 index wi pop sub 1 index sm dv 0 @1 4 -1 roll widthshow}{1 index wi pop sub
1 index dup sm 10 mul exch length 1 sub add dv dup 10. mul 0 @1 4 -1 roll 0 6 -1 roll awidthshow}ifelse}bdf
/setTxMode{sa 9 2 index put 3 eq{1}{0}ifelse setgray}bdf
/SwToSym{{}mark false/Symbol/|______Symbol 0 rf 0 sa 6 get 0 ne{pop 1}{sa 7 get 0 eq{pop 2}if}ifelse
sa 1 get 0 ne/|______Symbol
sa 4 get 0 ne{vs}{sa 3 get 0 ne{vo}{fnt}ifelse}ifelse}bdf
/mc{0 3 1 roll transform neg exch pop}bdf
/ul{dup 0 ne sa 2 get 0 ne and{gsave 0 0
/UnderlinePosition kif{mc}{ps -10 div}ifelse/UnderlineThickness kif{mc}{ps 15 div}ifelse
abs setlinewidth neg rmoveto
sa 4 get 0 ne{gsave currentlinewidth 2. div dup rmoveto currentpoint newpath moveto
2 copy rlineto stroke grestore}if
sa 3 get sa 4 get or 0 ne{gsave gl 2 copy rlineto stroke grestore rlineto strokepath nlw pys div setlinewidth}{rlineto}ifelse
stroke grestore}{pop}ifelse}bdf
/sgt{2 copy known{get true}{pop pop false}ifelse}bdf
/kif{currentfont dup/FontMatrix get exch/FontInfo sgt{true}{currentfont/df sgt
{dup/FontInfo sgt{3 1 roll/FontMatrix get mtx concatmatrix exch true}{pop pop pop false}
ifelse}{pop pop false}ifelse}ifelse{3 -1 roll sgt{exch true}{pop false}ifelse}{false}ifelse}bdf
/blank/Times-Roman findfont/CharStrings get/space get def
/macvec 256 array def
/NUL/SOH/STX/ETX/EOT/ENQ/ACK/BEL/BS/HT/LF/VT/FF/CR/SO/SI
/DLE/DC1/DC2/DC3/DC4/NAK/SYN/ETB/CAN/EM/SUB/ESC/FS/GS/RS/US
macvec 0 32 getinterval astore pop
macvec 32/Times-Roman findfont/Encoding get
32 96 getinterval putinterval macvec dup 39/quotesingle put 96/grave put
/Adieresis/Aring/Ccedilla/Eacute/Ntilde/Odieresis/Udieresis/aacute
/agrave/acircumflex/adieresis/atilde/aring/ccedilla/eacute/egrave
/ecircumflex/edieresis/iacute/igrave/icircumflex/idieresis/ntilde/oacute
/ograve/ocircumflex/odieresis/otilde/uacute/ugrave/ucircumflex/udieresis
/dagger/degree/cent/sterling/section/bullet/paragraph/germandbls
/registered/copyright/trademark/acute/dieresis/notequal/AE/Oslash
/infinity/plusminus/lessequal/greaterequal/yen/mu/partialdiff/summation
/product/pi/integral/ordfeminine/ordmasculine/Omega/ae/oslash
/questiondown/exclamdown/logicalnot/radical/florin/approxequal/Delta/guillemotleft
/guillemotright/ellipsis/blank/Agrave/Atilde/Otilde/OE/oe
/endash/emdash/quotedblleft/quotedblright/quoteleft/quoteright/divide/lozenge
/ydieresis/Ydieresis/fraction/currency/guilsinglleft/guilsinglright/fi/fl
/daggerdbl/periodcentered/quotesinglbase/quotedblbase/perthousand/Acircumflex/Ecircumflex/Aacute
/Edieresis/Egrave/Iacute/Icircumflex/Idieresis/Igrave/Oacute/Ocircumflex
/apple/Ograve/Uacute/Ucircumflex/Ugrave/dotlessi/circumflex/tilde
/macron/breve/dotaccent/ring/cedilla/hungarumlaut/ogonek/caron
macvec 128 128 getinterval astore pop
{}mark true/Courier/|______Courier 0 rf
{/Metrics 21 dict begin/zero 600 def/one 600 def/two 600 def/three 600 def/four 600 def/five 600 def/six 600 def/seven 600 def/eight 600 def
/nine 600 def/comma 600 def/period 600 def/dollar 600 def/numbersign 600 def/percent 600 def/plus 600 def/hyphen 600 def/E 600 def/parenleft 600 def/parenright 600 def/space 600 def
currentdict end def currentdict/UniqueID known{/UniqueID 16#800000 def}if/FontBBox FontBBox 4 array astore def}mark true/Helvetica/|______Seattle 1 rf
/oldsettransfer/settransfer load def
/concatprocs{/proc2 exch cvlit def/proc1 exch cvlit def/newproc proc1 length proc2 length add array def
newproc 0 proc1 putinterval newproc proc1 length proc2 putinterval newproc cvx}def
/settransfer{currenttransfer concatprocs oldsettransfer}def
/PaintBlack{{1 exch sub}settransfer gsave newpath clippath 1 setgray fill grestore}def
/od{(Rvd\001\001\000\000\177) fg copy pop txpose
1 0 mtx defaultmatrix dtransform exch atan/pa exch def
newpath clippath mark
{transform{itransform moveto}}{transform{itransform lineto}}
{6 -2 roll transform 6 -2 roll transform 6 -2 roll transform
{itransform 6 2 roll itransform 6 2 roll itransform 6 2 roll curveto}}
{{closepath}}pathforall newpath counttomark array astore/gc xdf pop ct 39 0 put
10 fz 0 fs 2 F/|______Courier fnt invertflag{PaintBlack}if}bdf
/cd{}bdf
/op{/sfl false def/pm save def}bdf
/cp{not{userdict/#copies 0 put}if ma 0 gt{{t1 the{exit}if}loop}if{copypage}{showpage}ifelse pm restore}bdf
/px{0 3 1 roll tp tt}bdf
/psb{/us save def}bdf
/pse{us restore}bdf
/ct 40 string def
/nc{currentpoint initclip newpath gc{dup type dup/arraytype eq exch/packedarraytype eq or{exec}if}
forall clip newpath moveto}def
/kp{ct 0 2 index length 2 index 39 2 index put getinterval copy cvx exec mx3 currentmatrix pop}bdf
/av 68 def
end
LW 1 eq userdict/a4small known not and{/a4small
[[300 72 div 0 0 -300 72 div -120 3381]
280 3255
{statusdict/jobstate (printing) put 0 setblink
margins
exch 196 add exch 304 add 8 div round cvi frametoroket
statusdict/jobstate (busy) put
1 setblink}
/framedevice load
60 45{dup mul exch dup mul add 1.0 exch sub}/setscreen load
{}/settransfer load/initgraphics load/erasepage load]cvx
statusdict begin bind end readonly def}if
md begin/bigs[lnop userdict/letter known{/letter load}{lnop}ifelse userdict/legal known{/legal load}{lnop}ifelse userdict/a4 known{/a4 load}{lnop}ifelse userdict/b5 known{/b5 load}{lnop}ifelse 
lnop lnop lnop /tab load]def
/smalls[lnop userdict/lettersmall known{/lettersmall load}{userdict/note known{/note load}{lnop}ifelse}ifelse
userdict/legal known{/legal load}{lnop}ifelse userdict/a4small known{/a4small load}{lnop}ifelse 
userdict/b5 known{/b5 load}{userdict/note known{/note load}{lnop}ifelse}ifelse lnop lnop lnop /tab load]def end
systemdict/currentpacking known{setpacking}if
currentfile ok userdict/stretch known not and{eexec}{flushfile}ifelse
373A767D4B7FD94FE5903B7014B1B8D3BED02632C855D56F458B118ACF3AF73FC4EF5E81F5749042B5F9CF1016D093B75F250B7D8280B2EACE05A37037F7BDF6E12226D7D4E2DF2C52FAFD5FD40FE72A0D3AC4BD485D8369D4C87636E920D1DAF222D92155A9CB1667E715F0B82799B37CC8F5B32B74B39CF494536DC39C7EF04A7BCB29E2CEC79073CADCCFB23B4AA1363F876F5121B618071B7B4EB1E5DE75FAA2368A3E5DB2B198623AFE92AE9484270FE7F57A850E88C0D3EEA156611C91D8E480D4370B025CCA6929A2BF40AD3D01B2CB7EE6DFB46E12A830542337F7819B67F9765210F76DB06F34DA5B13A11759305C582E16D2B854939F6D9121F2A4F285282F5DCD3D15896D121E3D6F5BE79E087451BB0ED233CDBEF090D3B4AC2DC34B97E70C61D95FB072B8C12D2ABD843520949A39DCF99E2C1AA8FBCD025E47E0A82A8D96E75BAF40F52AD402495BBD4DE0F356C8B14E764874E639C9F045A0D1908EC6456EB6C5B8A6F826192F767EF2C55A21C58F5F9CC1F59247B55F2387828C7FE89D5E7D8484D1BC86CB6673BDBE4FE17DD9BDE95224FE645136F41330BF155A4DDE1B0A32233BF471CE58FBC660DC7E641B0A0D30018454E2191C414A3011FF3FED1C0D88FE1FF9F75DCC456D097947226FBEC92509146D3A4CFFC0471B31C53222ED9DD88566F60F6C0D705AD79DACF53B070026F083ED28B5CF757AAA0A169F6F320A75E9D2ED50ABD939AF85B6346C2ADB25D168F10508E1516D194C635E6B187FADEA0829DBF0390C0F003F0265E215BC96CA3CC13D4A8E01570BE193CA75A620728CD275ACF1986EFFB3A13419FE55EA7C4467B7E7EEDC1FC29C9F8C46A557D2CCDB914EF7B93E7530D555DFC2398AFC68CAD991F062EF85BAA1884EC166C7C5DF8543666D8C41BE267D706BD1588F1F662F705CAE4D29DC38EF66BFAA89470D8A099B6F1B4587F7B024412276106FCD3EB5AE17A5D1DF1781992DC40EA0A992F706F701304CEA9D9073E7A74F1E687D81C3E5841D31CF86855BAAAD9B5D30317C75150A857C6B114735315CDD1AEF36C26BBB0645499406DEE2F24B3B1C72FEC97C7BA31AA2CDAB25418BB1DC4C7E4757F1D625087B0FD0300C03A65F2A72CE734925735277E034CDCF599129679F70CC8B66E03878851DB75041F275E1E5761F3EC753BE1359CA364A22047AE4886217F9259FE19FF5B116E8019B98B143114B313E8BEF87EC949D85C82E0812E6F50525E73890AF362CC8EE8A85F4197E6AC18638EF12E56A808D439AF1BFD363F140314BF4E534485C42F1856688CC35288E8D770120A420FB9F1FCF8AE8BD6D6156CC23E6C51119FE4DE1B68C9DF3487E9974BF9ED31F8D3CE93FF101867319F2FF492D5D398B4F09A66F2F55BCAB34B99173B7EE89039D00DD21A7B3A52E9F028F8301B5FC12D409412E064513BC579AAC498F577EA8ECD1FE3E42DC3CC320786C7B00194FEDF344402C33FC492D4BA86992B01683F440220FFE756BC88A94223D316078D69D33560E8EAB76B24CB7AA4320CF435593D76F624324ABE00B5587A4F283C725EA24567133F25F472B5E2E4474DDB5A16AC5F2DF32350395D3E3892FE361F4D5C9A610C654C9227614FBBAFF3356A90A2266E00F66234061075491571A65616211257F160000000000000000000000000000000000000000000000000000000000000000
0000000000000000000000000000000000000000000000000000000000000000
0000000000000000000000000000000000000000000000000000000000000000
0000000000000000000000000000000000000000000000000000000000000000
0000000000000000000000000000000000000000000000000000000000000000
0000000000000000000000000000000000000000000000000000000000000000
0000000000000000000000000000000000000000000000000000000000000000
0000000000000000000000000000000000000000000000000000000000000000
cleartomark
currentfile ok userdict/smooth4 known not and{eexec}{flushfile}ifelse
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
0000000000000000000000000000000000000000000000000000000000000000
0000000000000000000000000000000000000000000000000000000000000000
0000000000000000000000000000000000000000000000000000000000000000
0000000000000000000000000000000000000000000000000000000000000000
0000000000000000000000000000000000000000000000000000000000000000
0000000000000000000000000000000000000000000000000000000000000000
0000000000000000000000000000000000000000000000000000000000000000
cleartomark
%%EndProcSet

%!PS-Adobe-2.0
%%Title: Cover
%%Creator: NoWord
%%Pages: (atend)
%%BoundingBox: ? ? ? ?
%%PageBoundingBox: 28 30 566 811
%%For: AriA
%%IncludeProcSet: "(AppleDict md)" 68 0
%%EndComments
%%EndProlog
%%BeginDocumentSetup
md begin

T T -30 -28 811 566 100 72 72 3 F F F F T T T psu
(AriA; document: Cover)jn
0 mf
od
%%EndDocumentSetup
%%Page: ? 1
op
30 28 xl
1 1 pen
99 90 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
bu fc
{}mark T /Times-Roman /|______Times-Roman 0 rf
bn
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
currentfont SwToSym
-0.07540 0.(\323)ashow
setfont
-0.07540 0.( Copyright Arto Karila, 1991)ashow
760 232 gm
14 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.12351 0.(Helsinki, May 31, 1991)ashow
131 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.17135 0. 32 0.01713 0.(This paper may be freely copied and distributed for non-profit purposes provided that)awidthshow
147 90 gm
-0.00610 0.(this front page \(including the copyright text\) is included in the copies. For commercial)ashow
163 90 gm
1.26327 0. 32 0.12632 0.(use a written permission from the author is required. Please, send any comments,)awidthshow
179 90 gm
-0.08451 0.(corrections and enquiries \(preferably by E-mail\) to the address below.)ashow
416 100 gm
18 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.28976 0. 32 0.02897 0.(Open Systems Security \320 an Architectural Framework)awidthshow
561 90 gm
14 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.70297 0. 32 0.07029 0.(Arto T. Karila)awidthshow
593 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.18864 0.(Telecom Finland)ashow
609 90 gm
-0.03498 0.(Business Systems R&D)ashow
625 90 gm
0.53604 0. 32 0.05360 0.(P.O. Box 140)awidthshow
641 90 gm
-0.05065 0.(00511 Helsinki)ashow
657 90 gm
-0.10777 0.(FINLAND)ashow
689 90 gm
-0.07275 0.(atk@ajk.tele.fi)ashow
F T cp
%%Trailer
cd
end
%%Pages: 1 0

% Next: Abstract

%!PS-Adobe-2.0
%%Title: Abstract
%%Creator: NoWord
%%Pages: (atend)
%%BoundingBox: ? ? ? ?
%%PageBoundingBox: 28 30 566 811
%%For: AriA
%%IncludeProcSet: "(AppleDict md)" 68 0
%%EndComments
%%EndProlog
%%BeginDocumentSetup
md begin

T T -30 -28 811 566 100 72 72 3 F F F F T T T psu
(AriA; document: Abstract)jn
0 mf
od
%%EndDocumentSetup
%%Page: ? 1
op
30 28 xl
1 1 pen
45 295 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
bu fc
{}mark T /Times-Roman /|______Times-Roman 0 rf
bn
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(I)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 427 gm
-0.16108 0.(Acknowledgements)ashow
85 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.07638 0.(Key words: Data Security, Security Architecture, Data Communication, Open Systems,)ashow
101 90 gm
-0.08222 0.(OSI, FTAM)ashow
142 90 gm
1 fs
bu fc
{}mark T /Times-Bold /|______Times-Bold 0 rf
bn
18 fz
bu fc
2 F /|______Times-Bold fnt
bn
0.29148 0.(Abstract)ashow
175 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.15441 0. 32 0.01544 0.(An architecture for building secure open systems communicating via untrusted global)awidthshow
191 90 gm
0.03631 0. 32 0.00363 0.(data networks is presented. The work is based on the ISO OSI reference model and its)awidthshow
207 90 gm
0.36636 0. 32 0.03663 0.(security architecture addendum but the results are directly applicable to virtually any)awidthshow
223 90 gm
0.28305 0. 32 0.02830 0.(layered communications architecture such as the DoD Internet architecture \(TCP/IP\).)awidthshow
239 90 gm
-0.08055 0.(Also, several extensions and modifications to the OSI model are suggested.)ashow
271 90 gm
-0.10122 0.(A semiformal model for the security of communications between peer entities within an)ashow
287 90 gm
-0.07565 0.(OSI layer and between entire application instances is presented. This model, along with)ashow
303 90 gm
-0.06401 0.(some new concepts introduced, is successfully used to analyze the security functions of)ashow
319 90 gm
0.55099 0. 32 0.05509 0.(open systems. This work brings a whole new research area at the boundary between)awidthshow
335 90 gm
0.56716 0. 32 0.05671 0.(formal protocol research and cryptology within the reach of formal study. Complete)awidthshow
351 90 gm
-0.08323 0.(formalization of and further elaboration on the model are beyond the scope of this work)ashow
367 90 gm
-0.03619 0.(and left for further study.)ashow
399 90 gm
-0.04054 0.(The degree of freedom offered by the OSI Security Architecture in placing the security)ashow
415 90 gm
-0.06289 0.(services and mechanisms defined in the OSI reference model into its layers is restricted)ashow
431 90 gm
0.42083 0. 32 0.04208 0.(in such a way as to not affect the security of the over-all communication service and)awidthshow
447 90 gm
-0.07170 0.(well-founded placements for various services and mechanisms are proposed.)ashow
479 90 gm
-0.09403 0.(In order to demonstrate the implementability of the solutions proposed here, actual low-)ashow
495 90 gm
0.17639 0. 32 0.01763 0.(level security mechanisms are chosen to fill in the missing parts. Finally, a communi-)awidthshow
511 90 gm
-0.08453 0.(cations profile for secure FTAM is drawn up and a subset of it is implemented based on)ashow
527 90 gm
-0.11808 0.(existing OSI implementations.)ashow
F T cp
%%Page: ? 2
op
30 28 xl
1 1 pen
45 293 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(II)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 427 gm
-0.16108 0.(Acknowledgements)ashow
110 90 gm
1 fs
18 fz
bu fc
2 F /|______Times-Bold fnt
bn
0.29093 0.(Foreword)ashow
143 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.02198 0.(This paper is a cosmetically updated version of my Doctoral Dissertation completed in)ashow
159 90 gm
-0.08961 0.(late 1990 and defended in March 1991 at Helsinki University of Technology.)ashow
191 90 gm
-0.04953 0.(This work is based on the experience of several years of protocol implementation work)ashow
207 90 gm
0.30914 0. 32 0.03091 0.(with the Technical Research Centre of Finland and my more recent experience in the)awidthshow
223 90 gm
1.51428 0. 32 0.15142 0.(development of value added services for our customers at Telecom Finland. The)awidthshow
239 90 gm
0.27435 0. 32 0.02743 0.(approach is rather pragmatic \(for a dissertation\) and the problems are taken from real)awidthshow
255 90 gm
-0.02053 0.(life. I hope this paper will serve a purpose in raising the general level of consciousness)ashow
271 90 gm
-0.08157 0.(of the security risks of open systems and stimulating discussion and research in the area)ashow
287 90 gm
-0.03857 0.(of developing secure open systems.)ashow
319 90 gm
1.29791 0. 32 0.12979 0.(I hope my possible American readers will not be scared off by the seeming OSI-)awidthshow
335 90 gm
0.73822 0. 32 0.07382 0.(orientation of this work. I am by no means an OSI pedantic and most of the results)awidthshow
351 90 gm
-0.12014 0.(obtained here are directly applicable to other layered communications architectures such)ashow
367 90 gm
-0.11936 0.(as the DoD Internet \(TCP/IP\) architecture.)ashow
399 90 gm
1.10733 0. 32 0.11073 0.(I wish to thank my reviewers Dr. Kaisa Nyberg of the Finnish Army and Dr. Olli)awidthshow
415 90 gm
-0.10122 0.(Martikainen of the Technical Research Centre of Finland for their constructive criticism)ashow
431 90 gm
0.38208 0. 32 0.03820 0.(and many comments on the draft versions of this paper. I also thank professor Jarmo)awidthshow
447 90 gm
-0.06970 0.(Harju of Lappeenranta University of Technology for the many discussions on this topic)ashow
463 90 gm
1.80419 0. 32 0.18041 0.(at the early stage of this work. I thank my opponent professor David Farber of)awidthshow
479 90 gm
0.00640 0. 32 0.00064 0.(University of Pennsylvania, who urged me make these minor changes to my work and)awidthshow
495 90 gm
-0.05886 0.(make it publicly available through the internet, for his careful examination of my thesis)ashow
511 90 gm
-0.10006 0.(and the stimulating conversations with him in March 1991.)ashow
543 90 gm
-0.04449 0.(Comments, suggestions, corrections and critique is welcome.)ashow
583 90 gm
0.09780 0. 32 0.00978 0.(Helsinki, Finland, May 31, 1991)awidthshow
611 90 gm
-0.09971 0.(Arto T. Karila)ashow
F T cp
%%Trailer
cd
end
%%Pages: 2 0

% Next: Dissertation

%!PS-Adobe-2.0
%%Title: Dissertation
%%Creator: NoWord
%%Pages: (atend)
%%BoundingBox: ? ? ? ?
%%PageBoundingBox: 28 30 566 811
%%For: AriA
%%IncludeProcSet: "(AppleDict md)" 68 0
%%EndComments
%%EndProlog
%%BeginDocumentSetup
md begin

T T -30 -28 811 566 100 72 72 3 F F F F T T T psu
(AriA; document: Dissertation)jn
0 mf
od
%%EndDocumentSetup
%%Page: ? 1
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
bu fc
{}mark T /Times-Roman /|______Times-Roman 0 rf
bn
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.65621 0.(IV)ashow
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 468 gm
0.06370 0.(Contents)ashow
110 90 gm
1 fs
bu fc
{}mark T /Times-Bold /|______Times-Bold 0 rf
bn
18 fz
bu fc
2 F /|______Times-Bold fnt
bn
0.43197 0.(Contents)ashow
141 90 gm
12 fz
bu fc
2 F /|______Times-Bold fnt
bn
(1)show
141 126 gm
0.42515 0.(Introduction)ashow
141 497 gm
(1)show
165 126 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.5 0.(1.1)ashow
165 162 gm
-0.06504 0.(Evolution towards Open Networks)ashow
165 498 gm
(1)show
189 126 gm
0.5 0.(1.2)ashow
189 162 gm
-0.11930 0.(On the Security of LANs)ashow
189 498 gm
(5)show
213 126 gm
0.5 0.(1.3)ashow
213 162 gm
-0.08152 0.(Need for Security in Open Systems)ashow
213 498 gm
(6)show
237 126 gm
0.5 0.(1.4)ashow
237 162 gm
-0.10951 0.(Standardization of Open Systems Security)ashow
237 498 gm
(7)show
261 126 gm
0.5 0.(1.5)ashow
261 162 gm
-0.12220 0.(The Motivation and Goal of This Work)ashow
261 498 gm
(9)show
291 90 gm
1 fs
bu fc
2 F /|______Times-Bold fnt
bn
(2)show
291 126 gm
2.34329 0. 32 0.23432 0.(The Basis and Scope of This Work)awidthshow
291 490 gm
2.00006 0.(12)ashow
315 126 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.5 0.(2.1)ashow
315 162 gm
-0.18861 0.(The Basic Model)ashow
315 492 gm
(12)show
331 161 gm
0.49996 0.(2.1.1)ashow
331 197 gm
-0.10964 0.(End Systems and Application Instances)ashow
331 492 gm
(13)show
347 161 gm
0.49996 0.(2.1.2)ashow
347 197 gm
(Network)show
347 492 gm
(15)show
363 161 gm
0.49996 0.(2.1.3)ashow
363 197 gm
-0.09298 0.(Trusted Parties)ashow
363 492 gm
(15)show
379 161 gm
0.49996 0.(2.1.4)ashow
379 197 gm
-0.16458 0.(The Outside World)ashow
379 492 gm
(16)show
403 126 gm
0.5 0.(2.2)ashow
403 162 gm
-0.13761 0.(Communications Categories)ashow
403 492 gm
(16)show
427 126 gm
0.5 0.(2.3)ashow
427 162 gm
-0.05949 0.(The Scope of This Study)ashow
427 492 gm
(19)show
451 126 gm
0.5 0.(2.4)ashow
451 162 gm
-0.11468 0.(Approach to the Goals)ashow
451 492 gm
(21)show
481 90 gm
1 fs
bu fc
2 F /|______Times-Bold fnt
bn
(3)show
481 126 gm
2.51632 0. 32 0.25163 0.(On Security Requirements and Functions)awidthshow
481 490 gm
2.00006 0.(22)ashow
505 126 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.5 0.(3.1)ashow
505 162 gm
-0.19827 0.(A Security Model)ashow
505 492 gm
(23)show
529 126 gm
0.5 0.(3.2)ashow
529 162 gm
-0.13148 0.(Security Requirements)ashow
529 492 gm
(27)show
545 161 gm
0.49996 0.(3.2.1)ashow
545 197 gm
-0.14118 0.(Security Requirements of FTAM)ashow
545 492 gm
(28)show
561 161 gm
0.49996 0.(3.2.2)ashow
561 197 gm
-0.14196 0.(Security Requirements of the Directory)ashow
561 492 gm
(29)show
577 161 gm
0.49996 0.(3.2.3)ashow
577 197 gm
-0.10298 0.(Security Requirements of the Message Handling System)ashow
577 492 gm
(31)show
593 161 gm
0.49996 0.(3.2.4)ashow
593 197 gm
-0.11262 0.(Summary of the Security Requirements)ashow
593 492 gm
(33)show
617 126 gm
0.5 0.(3.3)ashow
617 162 gm
-0.07742 0.(Security Functions)ashow
617 492 gm
(33)show
641 126 gm
0.5 0.(3.4)ashow
641 162 gm
-0.10449 0.(On the Formal Analysis of Secure Open Systems)ashow
641 492 gm
(38)show
665 126 gm
0.5 0.(3.5)ashow
665 162 gm
-0.12461 0.(On the Placement of Security Functions)ashow
665 492 gm
(40)show
681 161 gm
0.49996 0.(3.5.1)ashow
681 197 gm
-0.12783 0.(Application Process)ashow
681 492 gm
(42)show
697 161 gm
0.49996 0.(3.5.2)ashow
697 197 gm
-0.14508 0.(Application and Presentation Layers)ashow
697 492 gm
(42)show
713 161 gm
0.49996 0.(3.5.3)ashow
713 197 gm
-0.10745 0.(The Lower Layers)ashow
713 492 gm
(47)show
F T cp
%%Page: ? 2
op
30 28 xl
1 1 pen
45 293 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(V)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 468 gm
0.06370 0.(Contents)ashow
99 90 gm
1 fs
12 fz
bu fc
2 F /|______Times-Bold fnt
bn
(4)show
99 126 gm
2.42523 0. 32 0.24252 0.(A Secure General Purpose OSI Protocol Stack)awidthshow
99 490 gm
2.00006 0.(49)ashow
123 126 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.5 0.(4.1)ashow
123 162 gm
-0.25469 0.(Authentication)ashow
123 492 gm
(51)show
139 161 gm
0.49996 0.(4.1.1)ashow
139 197 gm
-0.14106 0.(Authentication and its Significance with Various Services)ashow
139 492 gm
(51)show
155 161 gm
0.49996 0.(4.1.2)ashow
155 197 gm
-0.17669 0.(Placement of Authentication in the OSI model)ashow
155 492 gm
(52)show
171 161 gm
0.49996 0.(4.1.3)ashow
171 197 gm
-0.20661 0.(Authentication Mechanisms)ashow
171 492 gm
(52)show
195 126 gm
0.5 0.(4.2)ashow
195 162 gm
-0.16430 0.(Integrity)ashow
195 492 gm
(53)show
211 161 gm
0.49996 0.(4.2.1)ashow
211 197 gm
-0.11578 0.(Integrity and its Significance with Various Services)ashow
211 492 gm
(53)show
227 161 gm
0.49996 0.(4.2.2)ashow
227 197 gm
-0.15614 0.(Placement of Integrity in the OSI Model)ashow
227 492 gm
(53)show
243 161 gm
0.49996 0.(4.2.3)ashow
243 197 gm
-0.15585 0.(Integrity Mechanisms)ashow
243 492 gm
(54)show
267 126 gm
0.5 0.(4.3)ashow
267 162 gm
-0.18949 0.(Confidentiality)ashow
267 492 gm
(56)show
283 161 gm
0.49996 0.(4.3.1)ashow
283 197 gm
-0.12707 0.(Confidentiality and its Significance with Various Services)ashow
283 492 gm
(56)show
299 161 gm
0.49996 0.(4.3.2)ashow
299 197 gm
-0.16531 0.(Placement of Confidentiality in the OSI Model)ashow
299 492 gm
(56)show
315 161 gm
0.49996 0.(4.3.3)ashow
315 197 gm
-0.17204 0.(Confidentiality Mechanisms)ashow
315 492 gm
(57)show
339 126 gm
0.5 0.(4.4)ashow
339 162 gm
-0.09388 0.(Non-Repudiation)ashow
339 492 gm
(57)show
355 161 gm
0.49996 0.(4.4.1)ashow
355 197 gm
-0.10360 0.(Non-Repudiation and its Significance with Various Services)ashow
355 492 gm
(57)show
371 161 gm
0.49996 0.(4.4.2)ashow
371 197 gm
-0.13484 0.(Placement of Non-Repudiation in the OSI Model)ashow
371 492 gm
(58)show
387 161 gm
0.49996 0.(4.4.3)ashow
387 197 gm
-0.11848 0.(Non-Repudiation Mechanisms)ashow
387 492 gm
(58)show
411 126 gm
0.5 0.(4.5)ashow
411 162 gm
-0.12619 0.(Access Control)ashow
411 492 gm
(59)show
427 161 gm
0.49996 0.(4.5.1)ashow
427 197 gm
-0.11125 0.(Access Control and its Significance with Various Services)ashow
427 492 gm
(59)show
443 161 gm
0.49996 0.(4.5.2)ashow
443 197 gm
-0.14556 0.(Placement of Access Control in the OSI Model)ashow
443 492 gm
(60)show
459 161 gm
0.49996 0.(4.5.3)ashow
459 197 gm
-0.13703 0.(Access Control Mechanisms)ashow
459 492 gm
(60)show
489 90 gm
1 fs
bu fc
2 F /|______Times-Bold fnt
bn
(5)show
489 126 gm
3.47244 0. 32 0.34724 0.(Management Issues)awidthshow
489 490 gm
2.00006 0.(61)ashow
513 126 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.5 0.(5.1)ashow
513 162 gm
-0.12638 0.(Activation and Negotiation of Security Functions)ashow
513 492 gm
(61)show
537 126 gm
0.5 0.(5.2)ashow
537 162 gm
-0.13554 0.(Distribution and Management of Keys)ashow
537 492 gm
(62)show
553 161 gm
0.49996 0.(5.2.1)ashow
553 197 gm
-0.15008 0.(Management of Master Keys)ashow
553 492 gm
(63)show
569 161 gm
0.49996 0.(5.2.2)ashow
569 197 gm
-0.07817 0.(Management of Session Keys)ashow
569 492 gm
(65)show
585 161 gm
0.49996 0.(5.2.3)ashow
585 197 gm
-0.09069 0.(On the Generation of Public Key Pairs)ashow
585 492 gm
(66)show
615 90 gm
1 fs
bu fc
2 F /|______Times-Bold fnt
bn
(6)show
615 126 gm
3.75900 0. 32 0.37590 0.(Implementational Issues)awidthshow
615 490 gm
2.00006 0.(67)ashow
639 126 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.5 0.(6.1)ashow
639 162 gm
-0.08122 0.(Software Environments)ashow
639 492 gm
(67)show
655 161 gm
0.49996 0.(6.1.1)ashow
655 197 gm
-0.11485 0.(Some Sample Environments)ashow
655 492 gm
(67)show
671 161 gm
0.49996 0.(6.1.2)ashow
671 197 gm
-0.08448 0.(The Effects of Software Environment on Systems Security)ashow
671 492 gm
(70)show
695 126 gm
0.5 0.(6.2)ashow
695 162 gm
-0.05578 0.(On the Use of Hardware and Software)ashow
695 492 gm
(71)show
719 126 gm
0.5 0.(6.3)ashow
719 162 gm
-0.10513 0.(On the Role of Smart Cards)ashow
719 492 gm
(71)show
743 126 gm
0.5 0.(6.4)ashow
743 162 gm
-0.07745 0.(Real Cryptosystems)ashow
743 492 gm
(75)show
F T cp
%%Page: ? 3
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.65621 0.(VI)ashow
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 468 gm
0.06370 0.(Contents)ashow
99 90 gm
1 fs
12 fz
bu fc
2 F /|______Times-Bold fnt
bn
(7)show
99 126 gm
2.56988 0. 32 0.25698 0.(Implementing Secure FTAM)awidthshow
99 490 gm
2.00006 0.(76)ashow
123 126 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.5 0.(7.1)ashow
123 162 gm
-0.11750 0.(Requirements and Restrictions)ashow
123 492 gm
(76)show
147 126 gm
0.5 0.(7.2)ashow
147 162 gm
-0.14837 0.(FTAM Security Profile)ashow
147 492 gm
(76)show
171 126 gm
0.5 0.(7.3)ashow
171 162 gm
-0.12252 0.(Management Issues)ashow
171 492 gm
(78)show
195 126 gm
0.5 0.(7.4)ashow
195 162 gm
-0.18507 0.(Implementation Environment)ashow
195 492 gm
(79)show
219 126 gm
0.5 0.(7.5)ashow
219 162 gm
-0.09358 0.(Current Status of the Project)ashow
219 492 gm
(79)show
249 90 gm
1 fs
bu fc
2 F /|______Times-Bold fnt
bn
(8)show
249 126 gm
0.79965 0.(Conclusions)ashow
249 490 gm
2.00006 0.(82)ashow
279 90 gm
0.50004 0.(Appendix:)ashow
309 90 gm
1.33685 0.(A1)ashow
309 126 gm
3.70407 0. 32 0.37040 0.(Security Mechanisms)awidthshow
309 490 gm
2.00006 0.(84)ashow
333 126 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.11228 0.(A1.1)ashow
333 162 gm
-0.18453 0.(Data Encryption Mechanisms)ashow
333 492 gm
(85)show
349 162 gm
0.26733 0.(A1.1.1)ashow
349 207 gm
-0.15391 0.(Symmetric Encryption Mechanisms)ashow
349 492 gm
(86)show
365 162 gm
0.26733 0.(A1.1.2)ashow
365 207 gm
-0.17022 0.(Asymmetric Encryption Mechanisms)ashow
365 492 gm
(87)show
381 162 gm
0.26733 0.(A1.1.3)ashow
381 207 gm
-0.11576 0.(On the Use of Encryption Mechanisms)ashow
381 492 gm
(87)show
405 126 gm
0.11228 0.(A1.2)ashow
405 162 gm
-0.13848 0.(Signature Mechanisms)ashow
405 492 gm
(88)show
429 126 gm
0.11228 0.(A1.3)ashow
429 162 gm
-0.15585 0.(Integrity Mechanisms)ashow
429 492 gm
(89)show
453 126 gm
0.11228 0.(A1.4)ashow
453 162 gm
-0.25469 0.(Authentication)ashow
453 492 gm
(93)show
477 126 gm
0.11228 0.(A1.5)ashow
477 162 gm
-0.09434 0.(Zero-Knowledge Techniques)ashow
477 486 gm
(102)show
501 126 gm
0.11228 0.(A1.6)ashow
501 162 gm
-0.12812 0.(Physical Mechanisms)ashow
501 486 gm
(103)show
531 90 gm
1 fs
bu fc
2 F /|______Times-Bold fnt
bn
1.33685 0.(A2)ashow
531 126 gm
3.61679 0. 32 0.36167 0.(Some Commonly Used Cryptosystems)awidthshow
531 483 gm
1.50004 0.(105)ashow
555 126 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.11228 0.(A2.1)ashow
555 162 gm
-0.33200 0.(DES)ashow
555 486 gm
(105)show
579 126 gm
0.11228 0.(A2.2)ashow
579 162 gm
-0.16897 0.(RSA)ashow
579 486 gm
(107)show
603 126 gm
0.11228 0.(A2.3)ashow
603 162 gm
-0.20751 0.(The Diffie-Hellman Algorithm)ashow
603 486 gm
(108)show
633 90 gm
1 fs
bu fc
2 F /|______Times-Bold fnt
bn
1.33685 0.(A3)ashow
633 126 gm
2.60314 0. 32 0.26031 0.(The Kerberos Authentication Server)awidthshow
633 483 gm
1.50004 0.(109)ashow
663 90 gm
1.33685 0.(A4)ashow
663 126 gm
4.17831 0. 32 0.41783 0.(Security Policy)awidthshow
663 483 gm
1.50004 0.(111)ashow
693 90 gm
0.60507 0.(Bibliography)ashow
693 483 gm
1.50004 0.(113)ashow
723 90 gm
0.81022 0.(Glossary)ashow
723 483 gm
1.50004 0.(132)ashow
F T cp
%%Page: ? 4
op
30 28 xl
1 1 pen
45 294 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(1)show
802 288 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
110 90 gm
1 fs
18 fz
bu fc
2 F /|______Times-Bold fnt
bn
(1)show
110 126 gm
0.27415 0.(Introduction)ashow
143 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.15554 0. 32 0.11555 0.(The role of information networks in today's world is becoming ever more central.)awidthshow
159 90 gm
0.76385 0. 32 0.07638 0.(Information systems are taking over new areas of application and replacing manual)awidthshow
175 90 gm
0.40008 0. 32 0.04000 0.(systems in private, public and corporate life. Electronic Data Processing \(EDP\) is no)awidthshow
191 90 gm
-0.06631 0.(longer seen as simply a way to rationalize the internal operations of an organization but)ashow
207 90 gm
-0.03979 0.(it is expanding from within the organization to its external relations, such as those with)ashow
223 90 gm
-0.00549 0.(customers, partners, suppliers and officials.)ashow
255 90 gm
-0.10653 0.(Data communication is an integral part of any modern information system. In the earlier)ashow
271 90 gm
1.07162 0. 32 0.10716 0.(days data communication was seen as a way of making computing equipment and)awidthshow
287 90 gm
-0.07675 0.(centralized information systems accessible from a geographically large area. Nowadays)ashow
303 90 gm
0.58288 0. 32 0.05828 0.(the network is seen as the central part of information systems, interconnecting com-)awidthshow
319 90 gm
-0.04818 0.(municating peers, not masters and slaves.)ashow
351 90 gm
0.37017 0. 32 0.03701 0.(The client-server architecture is based on the central role of telecommunications net-)awidthshow
367 90 gm
0.39398 0. 32 0.03939 0.(works. The network interconnects users with various information services \(and these)awidthshow
383 90 gm
0.95748 0. 32 0.09574 0.(services with one-another\). Large, distributed information systems are increasingly)awidthshow
399 90 gm
2.54791 0. 32 0.25479 0.(often collections of smaller systems communicating through the network \(not)awidthshow
415 90 gm
-0.11708 0.(necessarily in real-time\).)ashow
450 90 gm
1 fs
14 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.74998 0.(1.1)ashow
450 126 gm
3.12591 0. 32 0.31259 0.(Evolution towards Open Networks)awidthshow
482 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.38238 0. 32 0.03823 0.(Separate networks are integrating into a universal internet, consisting of a number of)awidthshow
498 90 gm
-0.15309 0.(interconnected networks. The  )ashow
2 fs
bu fc
{}mark T /Times-Italic /|______Times-Italic 0 rf
bn
bu fc
2 F /|______Times-Italic fnt
bn
-0.15303 0.(International Organization of Standardization)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.10830 0.( \()ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.19262 0.(ISO)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.10830 0.(\) )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.24777 0.(Con-)ashow
514 90 gm
0.79299 0. 32 0.07929 0.(nectionless Network Protocol)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.15625 0. 32 0.01562 0.( \()awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.20112 0.(CLNP)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.36544 0. 32 0.03654 0.(, also called )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.55267 0. 32 0.05526 0.(ISO IP)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.39993 0. 32 0.03999 0.(\) will define a way to inter-)awidthshow
530 90 gm
1.55868 0. 32 0.15586 0.(connect virtually all the networks and access any )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
2.14584 0. 32 0.21458 0.(Network Service Access Point)awidthshow
546 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.21484 0.(\()ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.38554 0.(NSAP)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.07666 0. 32 0.10766 0.(\) from any other NSAP worldwide \(see e.g. [BI89, IS8348/A1, IS8473] for)awidthshow
562 90 gm
-0.08433 0.(detailed information on ISO IP\).)ashow
594 90 gm
0.05767 0. 32 0.00576 0.(At the moment, the )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.09094 0. 32 0.00909 0.(Internet Protocol Suite)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.04943 0. 32 0.00494 0.( \(also known as )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.02172 0.(TCP/IP)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.05554 0. 32 0.00555 0.(, see [Cla88] for an)awidthshow
610 90 gm
0.24429 0. 32 0.02442 0.(overview of the goals and reasoning behind the design of these protocols\) of the U.S.)awidthshow
626 90 gm
0.18173 0. 32 0.01817 0.(Department of Defense \(DoD\), defined in the )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.24978 0. 32 0.02497 0.(Request for Comment)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.05462 0. 32 0.00546 0.( \()awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.07078 0.(RFC)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.24673 0. 32 0.02467 0.(\) standards,)awidthshow
642 90 gm
0.24459 0. 32 0.02445 0.(offers the most natural evolution path towards true open systems \(in the OSI sense of)awidthshow
658 90 gm
1.26358 0. 32 0.12635 0.(the word\). The DoD IP network protocol [RFC81a] offers the first usable way of)awidthshow
674 90 gm
0.98556 0. 32 0.09855 0.(interconnecting heterogeneous networks and routing traffic between them. It is the)awidthshow
690 90 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.17523 0. 32 0.11752 0.(Connectionless Network Service)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.22048 0. 32 0.02204 0.( \()awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.27131 0.(CLNS)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.71716 0. 32 0.07171 0.(\) [IS8348/A1] and )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.42791 0. 32 0.14279 0.(Connectionless Network)awidthshow
706 90 gm
0.07937 0.(Protocol)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.08819 0. 32 0.00881 0.( \()awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.11344 0.(CLNP)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.26443 0. 32 0.02644 0.(\) [IS8473] of ISO that are the natural successors of DoD IP, offering)awidthshow
722 90 gm
-0.08149 0.(practically the same functionality but in an internationally standardized form and with a)ashow
738 90 gm
-0.04833 0.(larger, better structured address space.)ashow
F T cp
%%Page: ? 5
op
30 28 xl
1 1 pen
45 294 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(2)show
802 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.03775 0.(The employment of US GOSIP [GOS89] in August 1990, mandating the use of ISO IP)ashow
117 90 gm
0.46112 0. 32 0.04611 0.(by US Agencies, whenever possible, will give significant boost to ISO IP during the)awidthshow
133 90 gm
0.23361 0. 32 0.02336 0.(year 1991. The proliferation of DECnet Phase V, based on ISO IP and TP4 [IS8073],)awidthshow
149 90 gm
0.63598 0. 32 0.06359 0.(coincides with this development. [Hei90] gives a concise overview of the migration)awidthshow
165 90 gm
-0.03024 0.(from DoD IP to ISO IP.)ashow
197 90 gm
0.21972 0. 32 0.02197 0.(In addition to the Connectionless Network Service and Protocol, ISO also defines the)awidthshow
213 90 gm
2.15789 0. 32 0.21578 0.(Connection-mode Network Service \(CONS\) [IS8348, X.213] and its associated)awidthshow
229 90 gm
1.53518 0. 32 0.15351 0.(protocols. Network or transport layer gateways can be used to interface between)awidthshow
245 90 gm
-0.02819 0.(networks offering these two kinds of service.)ashow
277 90 gm
0.63522 0. 32 0.06352 0.(It is, however, probable that the connectionless version of the ISO Network Service)awidthshow
293 90 gm
-0.05526 0.(will be predominant in the near future, e.g. for the following reasons:)ashow
325 90 gm
(-)show
325 126 gm
1.39785 0. 32 0.13978 0.(For the client-server architecture connectionless communications are more)awidthshow
341 126 gm
0.02868 0. 32 0.00286 0.(natural than connection-oriented communications. In many cases, such as with)awidthshow
357 126 gm
1.10351 0. 32 0.11035 0.(directory or database queries, the exchange of one request-response pair of)awidthshow
373 126 gm
1.71966 0. 32 0.17196 0.(messages is sufficient to do the job without the unnecessary overhead of)awidthshow
389 126 gm
-0.08485 0.(opening and closing a \(virtual\) network connection.)ashow
421 90 gm
(-)show
421 126 gm
0.52764 0. 32 0.05276 0.(For example LANs, which are becoming ever more popular as local network)awidthshow
437 126 gm
-0.00262 0.(solutions, are connectionless by nature. Mapping a connectionless service onto)ashow
453 126 gm
-0.09628 0.(a connection-oriented network is much easier than doing the opposite.)ashow
485 90 gm
(-)show
485 126 gm
-0.02401 0.(It has been shown in the world-wide Academic Internet \(currently based on the)ashow
501 126 gm
0.64788 0. 32 0.06478 0.(DoD IP\) that it is possible to build large, technologically heterogeneous net-)awidthshow
517 126 gm
0.65505 0. 32 0.06550 0.(works offering universal connectionless service while using low-cost routers)awidthshow
533 126 gm
0.64529 0. 32 0.06452 0.(and achieving high line utilization. In fact, connectionless service appears to)awidthshow
549 126 gm
1.50360 0. 32 0.15036 0.(make the interconnection of networks of highly different capacities rather)awidthshow
565 126 gm
-0.07475 0.(straight-forward and efficient.)ashow
597 90 gm
(-)show
597 126 gm
-0.00668 0.(Transmission techniques are becoming ever more reliable making it feasible to)ashow
613 126 gm
-0.06962 0.(recover from transmission errors at a higher protocol layer, namely by using the)ashow
629 126 gm
1.52893 0. 32 0.15289 0.(ISO )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
2.25418 0. 32 0.22541 0.(Class 4 Transport Protocol)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.55877 0. 32 0.05587 0.( \()awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
2.34924 0. 32 0.23492 0.(ISO TP4)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.77154 0. 32 0.17715 0.(\) [IS8073, X.224] or the DoD)awidthshow
645 126 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.03881 0. 32 0.10388 0.(Transmission Control Protocol)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.19775 0. 32 0.01977 0.( \()awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.24891 0.(TCP)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.72784 0. 32 0.07278 0.(\) [RFC81b], which effectively hide the)awidthshow
661 126 gm
-0.08662 0.(connectionless nature of the network service from the upper protocol layers.)ashow
693 90 gm
0.02792 0. 32 0.00279 0.(In a world-wide connectionless internet alternate routes, load balancing and automatic)awidthshow
709 90 gm
1.31866 0. 32 0.13186 0.(rerouting are operating on a global scale. Individually routed data packets can be)awidthshow
725 90 gm
0.11306 0. 32 0.01130 0.(expected to arrive via any route and it is impossible to trust all the networks along the)awidthshow
741 90 gm
0.57800 0. 32 0.05780 0.(way. Therefore, it is practically impossible to guarantee the security of the network,)awidthshow
757 90 gm
-0.09211 0.(even though teleoperators will do their best to make their networks reasonably secure.)ashow
F T cp
%%Page: ? 6
op
30 28 xl
1 1 pen
45 294 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(3)show
802 288 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.32485 0. 32 0.03248 0.(For example [Bar90] deals with the security requirements of WANs. This paper only)awidthshow
117 90 gm
1.42501 0. 32 0.14250 0.(discusses the more traditional networks: the Public Switched Telephone Network)awidthshow
133 90 gm
1.12045 0. 32 0.11204 0.(\(PSTN\), its digital successor Integrated Services Digital Network \(ISDN\), and the)awidthshow
149 90 gm
0.64712 0. 32 0.06471 0.(X.25 packet network [X.25]. The paper is interesting because it gives a list of basic)awidthshow
165 90 gm
0.09628 0. 32 0.00962 0.(requirements for the security of a WAN as seen from the teleoperator's perspective. A)awidthshow
181 90 gm
-0.00178 0.(rather superficial survey of the security problems associated with a DoD IP network is)ashow
197 90 gm
-0.03544 0.(presented in [Bel89] \(and criticized in [Ken89]\). In practice, a world-wide internet will)ashow
213 90 gm
-0.03253 0.(always have to be assumed untrustworthy.)ashow
245 90 gm
0.18020 0. 32 0.01802 0.(The DoD TCP/IP offers to a great extent the same kind of service as ISO TP4/CLNP.)awidthshow
261 90 gm
-0.02973 0.(Upper layer ISO protocols can be run on top of either, as demonstrated by the example)ashow
277 90 gm
0.72082 0. 32 0.07208 0.(of ISODE, and the evolution from DoD to ISO protocols will be aided by transport)awidthshow
293 90 gm
0.88256 0. 32 0.08825 0.(layer gateways [KLP83, Ros90, LT90] \(for an example of an asymmetric transport)awidthshow
309 90 gm
2.16629 0. 32 0.21662 0.(layer gateway see figure 7-3\). Some of the first large scale open systems will)awidthshow
325 90 gm
1.10000 0. 32 0.11000 0.(undoubtedly be based on the existing DoD IP infrastructure. During the migration)awidthshow
341 90 gm
0.18508 0. 32 0.01850 0.(towards OSI the upper layer protocols of the DoD Internet Protocol Suite will also be)awidthshow
357 90 gm
0.29281 0. 32 0.02928 0.(run on top of OSI lower layers, where ISO IP solves the problems of insufficient and)awidthshow
373 90 gm
0.24475 0. 32 0.02447 0.(badly structured address space of the DoD IP. As OSI matures, true seven-layer open)awidthshow
389 90 gm
-0.05136 0.(systems \(in the ISO sense of the word\) will emerge.)ashow
421 90 gm
0.24276 0. 32 0.02427 0.(In the future, Corporate Networks, Value Added Networks \(VANs\) and such will not)awidthshow
437 90 gm
0.31692 0. 32 0.03169 0.(be separate physical networks but rather virtual networks, i.e. collections of Network)awidthshow
453 90 gm
1.54678 0. 32 0.15467 0.(Service Access Points \(NSAPs\) forming a logical network. Also, one NSAP can)awidthshow
469 90 gm
-0.07087 0.(simultaneously belong to any number of such logical networks.)ashow
0 0 gm
(nc 511 193 700 400 6 rc)kp
64 gr
543 252 656 365 1 ov
1 2 lw
0 gr
543.5 252.5 655.5 364.5 0 ov
1 1 lw
0 0 pen
433 107 gm
433 107 lin
604 287 gm
0.01074 0 rmoveto
1 setTxMode
18 fz
bu fc
2 F /|______Times-Roman fnt
bn
(WAN)show
1 2 lw
1 1 pen
0 gr
531.5 213.5 589.5 271.5 0 ov
1 1 lw
0 0 pen
609 287 gm
609 287 lin
566 226 gm
1 setTxMode
14 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.32940 0.(MAN)ashow
1 2 lw
1 1 pen
0 gr
525.5 341.5 583.5 399.5 0 ov
1 1 lw
0 0 pen
569 226 gm
569 226 lin
560 354 gm
1 setTxMode
-0.32940 0.(MAN)ashow
1 2 lw
1 1 pen
0 gr
626.5 228.5 684.5 286.5 0 ov
1 1 lw
0 0 pen
563 354 gm
563 354 lin
661 241 gm
1 setTxMode
-0.32940 0.(MAN)ashow
1 2 lw
1 1 pen
0 gr
511.5 198.5 545.5 233.5 0 ov
1 1 lw
0 0 pen
664 241 gm
664 241 lin
64 gr
523 203 535 229 1 rc
531 204 gm
1 setTxMode
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.32806 0.(LAN)ashow
1 2 lw
1 1 pen
0 gr
572.5 193.5 606.5 228.5 0 ov
1 1 lw
0 0 pen
534 204 gm
534 204 lin
64 gr
584 198 596 224 1 rc
592 199 gm
1 setTxMode
-0.32806 0.(LAN)ashow
1 2 lw
1 1 pen
0 gr
642.5 196.5 676.5 231.5 0 ov
1 1 lw
0 0 pen
595 199 gm
595 199 lin
64 gr
654 201 666 227 1 rc
662 202 gm
1 setTxMode
-0.32806 0.(LAN)ashow
1 2 lw
1 1 pen
0 gr
628.5 344.5 662.5 379.5 0 ov
1 1 lw
0 0 pen
665 202 gm
665 202 lin
64 gr
640 349 652 375 1 rc
648 350 gm
1 setTxMode
-0.32806 0.(LAN)ashow
1 2 lw
1 1 pen
0 gr
515.5 291.5 549.5 326.5 0 ov
1 1 lw
0 0 pen
651 350 gm
651 350 lin
64 gr
527 296 539 322 1 rc
535 297 gm
1 setTxMode
-0.32806 0.(LAN)ashow
1 2 lw
1 1 pen
0 gr
665.5 274.5 699.5 309.5 0 ov
1 1 lw
0 0 pen
538 297 gm
538 297 lin
64 gr
677 279 689 305 1 rc
685 280 gm
1 setTxMode
-0.32806 0.(LAN)ashow
1 1 pen
753 90 gm
(nc 30 28 811 566 6 rc)kp
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.26438 0.(Figure 1-1:)ashow
753 162 gm
-0.06256 0.(A multi-level network hierarchy.)ashow
F T cp
%%Page: ? 7
op
30 28 xl
1 1 pen
45 294 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(4)show
802 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.11781 0.(A multi-level hierarchy of networks is emerging \(as depicted in figure 1-1\):)ashow
133 90 gm
0.83831 0. 32 0.08383 0.(Individual computers and work stations are connected to fast Local Area Networks)awidthshow
149 90 gm
-0.00221 0.(\(LANs\) spanning office buildings or parts of them. LANs offer transmission speeds in)ashow
165 90 gm
0.49942 0. 32 0.04994 0.(the range of Mb/s today and the speeds are rising. This is a significant improvement)awidthshow
181 90 gm
-0.01734 0.(over the more traditional transmission speeds in the order of kb/s. LANs also offer full)ashow
197 90 gm
0.65628 0. 32 0.06562 0.(connectivity \(direct communication between any two stations in the same network\).)awidthshow
213 90 gm
0.74737 0. 32 0.07473 0.(Examples of todays LANs are Ethernet \(10 Mb/s\) [IS8802-3], Token Ring \(4 or 16)awidthshow
229 90 gm
0.25360 0. 32 0.02536 0.(Mb/s\) [IS8802-5], and FDDI and FDDI II \(100 Mb/s\) [IS9314-1,2,3,4,5, RHF90].)awidthshow
261 90 gm
1.22222 0. 32 0.12222 0.(These LANs may be connected into fast areal backbone networks interconnecting)awidthshow
277 90 gm
0.58029 0. 32 0.05802 0.(LANs within e.g. one building, building complex or campus area at a speed compa-)awidthshow
293 90 gm
0.49087 0. 32 0.04908 0.(rable to that of the LANs. Current backbones are of the same types as the LANs but)awidthshow
309 90 gm
-0.04200 0.(usually built with fiber optics technology \(see e.g. [Kat90]\).)ashow
341 90 gm
0.93872 0. 32 0.09387 0.(Metropolitan Area Networks \(MANs\) [IEE90] are emerging. They will span entire)awidthshow
357 90 gm
0.25970 0. 32 0.02597 0.(cities with speeds above 100 Mb/s. LANs and Private Branch Exchanges \(PBXs\) can)awidthshow
373 90 gm
1.40838 0. 32 0.14083 0.(in the near future be connected to these MANs. Unlike LANs, MANs will be an)awidthshow
389 90 gm
-0.02168 0.(integral part of the modern public network infrastructure being owned and operated by)ashow
405 90 gm
0.56869 0. 32 0.05686 0.(teleoperators and sharing the addressing and network management schemes of other)awidthshow
421 90 gm
(public networks.)show
453 90 gm
1.06826 0. 32 0.10682 0.(Wide Area Networks \(WANs\) are used for long-haul services. Modern WANs are)awidthshow
469 90 gm
1.02142 0. 32 0.10214 0.(based on fiber optics transmission systems in the Gb/s speed range. 2 Mb/s leased)awidthshow
485 90 gm
-0.11938 0.(circuits are now available to most places, even internationally. Among the most interest-)ashow
501 90 gm
0.09017 0. 32 0.00901 0.(ing new public data services are )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.15884 0. 32 0.01588 0.(Frame Relay)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.10330 0. 32 0.01033 0.(, a next generation public packet service)awidthshow
517 90 gm
-0.06976 0.(standardized by CCITT and ANSI, already commercially supported and soon emerging)ashow
533 90 gm
-0.04421 0.(in many countries, and the )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.04731 0.(Switched Multi-megabit Data Service)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.03211 0.( \()ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.07040 0.(SMDS)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.04283 0.(\), a fast packet)ashow
549 90 gm
0.45379 0. 32 0.04537 0.(service expected to supersede the current WAN services [DKK90, PK90]. The long-)awidthshow
565 90 gm
-0.02345 0.(haul network is \(possibly\) evolving towards Asynchronous Transfer Mode \(ATM\) and)ashow
581 90 gm
0.04333 0. 32 0.00433 0.(Broadband ISDN. For those interested in the evolution of wide-area networks [Hei91])awidthshow
597 90 gm
-0.06930 0.(gives a good overview of the current trends in this area.)ashow
629 90 gm
-0.00579 0.(In this network hierarchy most of the traffic is local \(within the same LAN\). The LAN)ashow
645 90 gm
0.18432 0. 32 0.01843 0.(offers virtually unlimited capacity for a flat fee \(the cost of the investment and opera-)awidthshow
661 90 gm
-0.01657 0.(tion\). As we rise higher in the hierarchy the amount of traffic decreases and the cost of)ashow
677 90 gm
0.92376 0. 32 0.09237 0.(transmission increases but the quality and speed of the service remain high. A few)awidthshow
693 90 gm
-0.10264 0.(orders of magnitude increase in the capacities of internets is expected within a couple of)ashow
709 90 gm
0.17822 0. 32 0.01782 0.(years, as pointed out e.g. in [Par90].)awidthshow
741 90 gm
0.21087 0. 32 0.02108 0.(This development opens completely new views for designers of information services.)awidthshow
757 90 gm
0.19775 0. 32 0.01977 0.(For example, a work station connected to a LAN can communicate with virtually any)awidthshow
F T cp
%%Page: ? 8
op
30 28 xl
1 1 pen
45 294 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(5)show
802 288 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
85 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.03729 0.(other computer \(world-wide\) at a high bandwidth and with a relatively short round-trip)ashow
101 90 gm
1.09024 0. 32 0.10902 0.(delay. It is clear that this kind of connectivity brings with it hitherto unthought-of)awidthshow
117 90 gm
-0.08485 0.(security risks that need to be taken under control.)ashow
149 90 gm
0.08026 0. 32 0.00802 0.(The complexities of network management are described e.g. in [CPW89]. The emerg-)awidthshow
165 90 gm
0.54000 0. 32 0.05400 0.(ing new network architecture presents two major challenges for telecommunications)awidthshow
181 90 gm
-0.06640 0.(operators and vendors of information systems:)ashow
213 90 gm
(-)show
213 126 gm
1.76895 0. 32 0.17689 0.(Network management needs to be raised onto a new level, where virtual)awidthshow
229 126 gm
-0.05776 0.(networks can efficiently be defined and managed on top of the integrating basic)ashow
245 126 gm
0.12707 0.(networks.)ashow
277 90 gm
(-)show
277 126 gm
0.92208 0. 32 0.09220 0.(Tools for enforcing the security policies dictated by owners of these virtual)awidthshow
293 126 gm
-0.03198 0.(networks are needed.)ashow
325 90 gm
0.27328 0. 32 0.02732 0.(Practically all Local Area Networks have a multicast capability where the same \(data)awidthshow
341 90 gm
0.98571 0. 32 0.09857 0.(link level\) message can be simultaneously addressed to a group of recipients. This)awidthshow
357 90 gm
0.19592 0. 32 0.01959 0.(capability is also included in some of the modern WAN networks techniques, such as)awidthshow
373 90 gm
0.76049 0. 32 0.07604 0.(Frame Relay. Also some applications, such as MHS, include a multicast capability.)awidthshow
389 90 gm
1.69952 0. 32 0.16995 0.(Unfortunately the ISO network service is not designed to offer this service. For)awidthshow
405 90 gm
1.21337 0. 32 0.12133 0.(emerging new internet-based services, such as workstation-based multimedia- and)awidthshow
421 90 gm
-0.07154 0.(video conferencing, a multicast network service would be most useful.)ashow
453 90 gm
1.00357 0. 32 0.10035 0.(In fact, there is a strong tendency to develop a multicast capability to protocols of)awidthshow
469 90 gm
0.66741 0. 32 0.06674 0.(various layers of the OSI model. The need for LAN-like multicasting in internets is)awidthshow
485 90 gm
0.33355 0. 32 0.03335 0.(pointed out e.g. in [Dee88] and various data link and network layer multicast routing)awidthshow
501 90 gm
1.03912 0. 32 0.10391 0.(algorithms are suggested. A multicast transport protocol, supporting a sequence of)awidthshow
517 90 gm
0.23956 0. 32 0.02395 0.(exchanges of arbitrarily sized request and response messages between a client a large)awidthshow
533 90 gm
0.13992 0. 32 0.01399 0.(number of servers, is proposed in [CP88].)awidthshow
568 90 gm
1 fs
14 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.74998 0.(1.2)ashow
568 126 gm
2.30010 0. 32 0.23001 0.(On the Security of LANs)awidthshow
600 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.08917 0. 32 0.10891 0.(While LANs have many desirable properties, such as high bandwidth, short trans-)awidthshow
616 90 gm
0.75103 0. 32 0.07510 0.(mission delay, and no traffic-dependent cost, they also pose a considerable security)awidthshow
632 90 gm
-0.05227 0.(threat.)ashow
664 90 gm
0.15975 0. 32 0.01597 0.(In a LAN, all the stations are constantly listening to the medium, picking up all trans-)awidthshow
680 90 gm
-0.03796 0.(mitted messages, and recognizing those addressed to them by the destination addresses)ashow
696 90 gm
-0.00938 0.(of the messages. This means that any station can undetected listen to all the traffic in a)ashow
712 90 gm
-0.00625 0.(LAN. Also, any station can assume a false identity and start transmitting with a wrong)ashow
728 90 gm
-0.07072 0.(source address thereby impersonating as another station.)ashow
F T cp
%%Page: ? 9
op
30 28 xl
1 1 pen
45 294 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(6)show
802 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
2.28591 0. 32 0.22859 0.(One of the most obvious attacks is the recording and replay of authentication)awidthshow
117 90 gm
0.76110 0. 32 0.07611 0.(sequences. With a workstation costing about $1,000 \(in 1990\) and widely available)awidthshow
133 90 gm
0.26153 0. 32 0.02615 0.(public domain software, anybody with access to the LAN \(such as Ethernet or Token)awidthshow
149 90 gm
2.26577 0. 32 0.22657 0.(Ring\) can monitor the traffic, search for sequences such as ")awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.74740 0.(Username:)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
2.27340 0. 32 0.22734 0.(" and)awidthshow
165 90 gm
0.13363 0.(")ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.15568 0.(Password:)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.55038 0. 32 0.05503 0.(" on virtual terminal connections, record the responses to these prompts,)awidthshow
181 90 gm
-0.11349 0.(and later log in a service under a false identity.)ashow
213 90 gm
0.32043 0. 32 0.03204 0.(It is easy to imagine more ingenious attacks through a LAN. To protect against these)awidthshow
229 90 gm
0.08102 0. 32 0.00810 0.(threats the IEEE 802.10 work group is standardizing the use of data link level encryp-)awidthshow
245 90 gm
0.00503 0. 32 0.00050 0.(tion in LANs but this work is still at an early stage. In spite of what has been said here)awidthshow
261 90 gm
0.96084 0. 32 0.09608 0.(about the security of LANs, it must be noted that any large network offering good)awidthshow
277 90 gm
0.28198 0. 32 0.02819 0.(connectivity between organizations and countries has to be considered untrusted and,)awidthshow
293 90 gm
-0.05012 0.(on the other hand, a piece of LAN along the route from A to B can be made reasonably)ashow
309 90 gm
-0.06846 0.(secure by using a pair of trusted encryption devices.)ashow
339 90 gm
0.87371 0. 32 0.08737 0.(The question remains, how to protect against the threats coming from the network.)awidthshow
355 90 gm
0.04364 0. 32 0.00436 0.(Should we abandon the possibilities offered by new networking technologies securing)awidthshow
371 90 gm
0.03585 0. 32 0.00358 0.(information systems by isolating them? Obviously not! The most logical solution is to)awidthshow
387 90 gm
0.85449 0. 32 0.08544 0.(reject the idea of networks being secure and build systems in such a way that their)awidthshow
403 90 gm
1.80999 0. 32 0.18099 0.(security does not rely on the security of the network they are built on. Today's)awidthshow
419 90 gm
0.11978 0. 32 0.01197 0.(cryptographic techniques provide us with the tools for building such systems. What is)awidthshow
435 90 gm
0.77514 0. 32 0.07751 0.(needed is significant architectural work in defining and building secure seven-layer)awidthshow
451 90 gm
-0.09228 0.(open systems from the more basic building blocks available today.)ashow
486 90 gm
1 fs
14 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.74998 0.(1.3)ashow
486 126 gm
2.44018 0. 32 0.24401 0.(Need for Security in Open Systems)awidthshow
518 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
2.45437 0. 32 0.24543 0.(Connectivity and security are inherently contradictory requirements. However,)awidthshow
534 90 gm
0.23803 0. 32 0.02380 0.(openness does not mean lack of security but interconnectivity and the ability to inter-)awidthshow
550 90 gm
-0.06326 0.(operate between systems in different organizations and from different manufacturers. It)ashow
566 90 gm
0.10864 0. 32 0.01086 0.(is possible to build open systems with any required level of security. When building a)awidthshow
582 90 gm
0.25253 0. 32 0.02525 0.(distributed information system, it is essential that we be able to define precisely what)awidthshow
598 90 gm
0.30960 0. 32 0.03096 0.(users and end systems are allowed what kind of access to each service and be able to)awidthshow
614 90 gm
0.12939 0. 32 0.01293 0.(enforce this policy in practice. It is also often necessary that we be able to make com-)awidthshow
630 90 gm
-0.12336 0.(mitments electronically \(and confidentially\) and be able to show them true afterwards.)ashow
662 90 gm
0.67581 0. 32 0.06758 0.(Until recently, international standardization has focused on various aspects of inter-)awidthshow
678 90 gm
-0.07263 0.(connecting information systems and making them interoperate with a sufficient level of)ashow
694 90 gm
0.07278 0. 32 0.00727 0.(functionality. One of the major obstacles hindering the proliferation of EDI, and other)awidthshow
710 90 gm
0.12191 0. 32 0.01219 0.(types of inter-corporate utilization of Electronic Data Processing \(EDP\), is the lack of)awidthshow
726 90 gm
0.36880 0. 32 0.03688 0.(security in today's distributed information systems. The basic set-up is that of parties)awidthshow
742 90 gm
0.14038 0. 32 0.01403 0.(with at least some degree of confidence in one-another wishing to securely communi-)awidthshow
758 90 gm
1.02890 0. 32 0.10289 0.(cate through an untrustworthy network. The need for security in open systems has)awidthshow
F T cp
%%Page: ? 10
op
30 28 xl
1 1 pen
45 294 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(7)show
802 288 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
85 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.21383 0. 32 0.12138 0.(recently been officially acknowledged on many forums, e.g. in [Com90]. Another)awidthshow
101 90 gm
-0.12023 0.(important recent document on the security of EDI is [TED90b].)ashow
136 90 gm
1 fs
14 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.74998 0.(1.4)ashow
136 126 gm
2.69302 0. 32 0.26930 0.(Standardization of Open Systems Security)awidthshow
168 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.04486 0. 32 0.00448 0.(The ISO )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.08682 0. 32 0.00868 0.(Open Systems Interconnection)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
( \()show
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.01774 0.(OSI)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.07217 0. 32 0.00721 0.(\) reference model [IS7498-1, IS7498/C1,)awidthshow
184 90 gm
0.05447 0. 32 0.00544 0.(X.200] has recently become universally accepted as the basis of open systems. All the)awidthshow
200 90 gm
-0.00221 0.(major manufacturers of computer systems are committed to OSI and some of the most)ashow
216 90 gm
0.10589 0. 32 0.01058 0.(important users, such as the DoD, have based their data communications strategies on)awidthshow
232 90 gm
-0.04008 0.(it. Despite its serious shortcomings, which will be discussed later in this study, the OSI)ashow
248 90 gm
0.02319 0. 32 0.00231 0.(reference model is a lot better than no commonly agreed on reference model at all and)awidthshow
264 90 gm
-0.08654 0.(we shall be forced to live with it.)ashow
296 90 gm
-0.01463 0.(From the beginning OSI has concentrated on interoperability leaving management and)ashow
312 90 gm
-0.07112 0.(security issues with little attention. The OSI model was later extended with connection-)ashow
328 90 gm
-0.00672 0.(less-mode communications, security, naming and addressing, and management, which)ashow
344 90 gm
3.11492 0. 32 0.31149 0.(were added to the OSI model as its later parts and addenda [IS7498-2,3,4,)awidthshow
360 90 gm
0.78903 0. 32 0.07890 0.(IS7498/A1,A2]. Unfortunately these extensions are still not nearly as mature as the)awidthshow
376 90 gm
-0.10337 0.(basic OSI reference model.)ashow
408 90 gm
0.65460 0. 32 0.06546 0.(The OSI Security Architecture [IS7498-2] addresses security by listing a number of)awidthshow
424 90 gm
0.03768 0. 32 0.00376 0.(security threats and defining a number of )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.06423 0. 32 0.00642 0.(Security Services)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.03265 0. 32 0.00326 0.( \(or more properly )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.01182 0.(Security)ashow
440 90 gm
0.04971 0.(Functions)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.17318 0. 32 0.01731 0.(, see 3.1\) and mechanisms to protect against these threats. The threat model)awidthshow
456 90 gm
0.19439 0. 32 0.01943 0.(assumed in this work is that of [IS7498-2]. The addendum defines possible places for)awidthshow
472 90 gm
0.08758 0. 32 0.00875 0.(these services and mechanisms in the seven layers of OSI but still leaves a lot of open)awidthshow
488 90 gm
-0.06835 0.(ends. Similar work has been carried out in ECMA [ECM88, ECM89].)ashow
520 90 gm
-0.13056 0.(Among the shortcomings of the OSI Security Architecture are the following:)ashow
552 90 gm
(-)show
552 126 gm
0.88088 0. 32 0.08808 0.(Most services can be placed at any one of a number of layers \(especially at)awidthshow
568 126 gm
0.13900 0. 32 0.01390 0.(layers 3, 4, 6 and 7\). This freedom needs to be restricted in a way that will not)awidthshow
584 126 gm
-0.10330 0.(affect the overall security of the system.)ashow
616 90 gm
(-)show
616 126 gm
0.76980 0. 32 0.07698 0.(Little, if any, clue is given as to how these services and mechanisms should)awidthshow
632 126 gm
1.41311 0. 32 0.14131 0.(interoperate with the rest of the system. E.g. how they are embedded into)awidthshow
648 126 gm
0.37887 0. 32 0.03788 0.(existing services and protocols, how their use is negotiated, and how they are)awidthshow
664 126 gm
-0.14515 0.(activated.)ashow
696 90 gm
(-)show
696 126 gm
1.01379 0. 32 0.10137 0.(Security-wise, the end system needs to be considered as a whole. From the)awidthshow
712 126 gm
-0.03811 0.(user's point of view the security of the service provided by the entire communi-)ashow
728 126 gm
0.02197 0. 32 0.00219 0.(cations system, not that provided by each layer, is essential. In this respect, the)awidthshow
F T cp
%%Page: ? 11
op
30 28 xl
1 1 pen
45 294 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(8)show
802 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
85 126 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.04078 0.(layers are strongly interdependent. Clearly, an integrated view on open systems)ashow
101 126 gm
-0.03503 0.(security is wanted.)ashow
133 90 gm
-0.07000 0.(An overview of the standardization of open systems security is given in [CEN90].)ashow
165 90 gm
1.00128 0. 32 0.10012 0.(The OSI model defines only a framework for the standardization of open systems.)awidthshow
181 90 gm
1.08963 0. 32 0.10896 0.(Numerous other OSI standards standards define services and protocols for various)awidthshow
197 90 gm
-0.05699 0.(layers of OSI. Standardization of actual Open Systems can be seen as consisting of two)ashow
213 90 gm
0.16896 0.(phases.)ashow
245 90 gm
0.34790 0. 32 0.03479 0.(First, the need for standardizing some functional entity, such as message handling, is)awidthshow
261 90 gm
0.02395 0. 32 0.00239 0.(realized. This standardization leads into a number of standards, in the case of message)awidthshow
277 90 gm
1.64840 0. 32 0.16484 0.(handling the X.400-series recommendations of the CCITT. However, these )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.53469 0.(base)ashow
293 90 gm
-0.11387 0.(standards)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.10046 0.( often include parallel, alternative or optional features included in the standard)ashow
309 90 gm
0.42266 0. 32 0.04226 0.(as a compromise between various parties. In various countries and by various manu-)awidthshow
325 90 gm
1.76971 0. 32 0.17697 0.(facturers different functional groups and subsets of these standards are adopted.)awidthshow
341 90 gm
0.94665 0. 32 0.09466 0.(Therefore, compliance with the standards does not alone guarantee interoperability)awidthshow
357 90 gm
1.60949 0. 32 0.16094 0.(between two end systems. This was first seen in practice with the public packet)awidthshow
373 90 gm
0.36468 0. 32 0.03646 0.(networks of the type X.25, where interfaces to the network still vary from country to)awidthshow
389 90 gm
0.88058 0. 32 0.08805 0.(country and teleoperator to teleoperator, even though these networks nowadays are)awidthshow
405 90 gm
-0.12846 0.(globally interconnected.)ashow
437 90 gm
0.13946 0. 32 0.01394 0.(In the second phase, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.27999 0. 32 0.02799 0.(functional standards)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.06774 0. 32 0.00677 0.( \(or )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.03887 0.(profiles)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.15792 0. 32 0.01579 0.(\), referring to the base standards)awidthshow
453 90 gm
0.02166 0. 32 0.00216 0.(and specifying in detail the functional groups, functions, options, PDU sizes etc. used,)awidthshow
469 90 gm
0.29159 0. 32 0.02915 0.(are defined. The purpose of OSI profiles is to define how various OSI base standards)awidthshow
485 90 gm
-0.06240 0.(are to be used in specific, real contexts to implement systems capable of interoperating.)ashow
501 90 gm
0.05935 0. 32 0.00593 0.(When true interoperability between systems by various vendors \(which is the ultimate)awidthshow
517 90 gm
0.51223 0. 32 0.05122 0.(goal of the whole OSI philosophy\) is required, it is usually better to refer to profiles)awidthshow
533 90 gm
0.68237 0. 32 0.06823 0.(and require that the systems comply with them than refer to the base standards. For)awidthshow
549 90 gm
0.89920 0. 32 0.08992 0.(example, if a message handling system is guaranteed to comply with the European)awidthshow
565 90 gm
0.54000 0. 32 0.05400 0.(MHS profiles \(CEPT A/311 and CEN/CENELEC A/3211\) it either will interoperate)awidthshow
581 90 gm
-0.08694 0.(with other similar products or one of the vendors can be pointed to be at fault.)ashow
613 90 gm
0.29754 0. 32 0.02975 0.(In OSI standardization defining communications profiles for various applications has)awidthshow
629 90 gm
0.07095 0. 32 0.00709 0.(recently become perhaps the most important area of activity. A new type of document)awidthshow
645 90 gm
0.65994 0. 32 0.06599 0.(called the )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.27517 0. 32 0.12751 0.(International Standardized Profile)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.86898 0. 32 0.08689 0.( has been created \(see [IS10000-1,2]\).)awidthshow
661 90 gm
-0.00942 0.(However, it is only after )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.00965 0.(Security Profiles)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.00953 0.(, defining in detail the security functions and)ashow
677 90 gm
0.18341 0. 32 0.01834 0.(mechanisms of complete seven-layer protocol stacks and their use, have been defined)awidthshow
693 90 gm
-0.10702 0.(that truly open secure systems can be implemented.)ashow
725 90 gm
-0.04426 0.(I claim that defining Security Profiles will prove to be a major step on the way towards)ashow
741 90 gm
0.07095 0. 32 0.00709 0.(secure open systems. The suggested profile for FTAM \(depicted in figure 7-1\) as well)awidthshow
757 90 gm
-0.10531 0.(as the results presented in chapter 4 are among the first attempts to this direction.)ashow
F T cp
%%Page: ? 12
op
30 28 xl
1 1 pen
45 294 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(9)show
802 288 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
104 90 gm
1 fs
14 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.74998 0.(1.5)ashow
104 126 gm
2.11761 0. 32 0.21176 0.(The Motivation and Goal of This Work)awidthshow
136 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.23849 0. 32 0.02384 0.(It is seen that definitions and actual implementations of secure open systems are vital)awidthshow
152 90 gm
-0.01348 0.(for the future of information networks. Extensive research has been done \(and is being)ashow
168 90 gm
0.08941 0. 32 0.00894 0.(done\) in the area of cryptology resulting in usable cryptographic mechanisms, such as)awidthshow
184 90 gm
0.02746 0. 32 0.00274 0.(symmetric and asymmetric cryptosystems, hash functions, and signature and authenti-)awidthshow
200 90 gm
1.60446 0. 32 0.16044 0.(cation schemes. Also, the OSI reference model [IS7498-1] has been extended to)awidthshow
216 90 gm
0.73806 0. 32 0.07380 0.(include a security framework [IS7498-2]. The increasing activity in ISO in security)awidthshow
232 90 gm
1.44348 0. 32 0.14434 0.(architectures is demonstrated by a number of new standards in this area, such as)awidthshow
248 90 gm
0.08895 0. 32 0.00889 0.([ISO90c] and [IS10181-1].)awidthshow
280 90 gm
0.51162 0. 32 0.05116 0.(However, little work has still been done between these two extremes on the abstrac-)awidthshow
296 90 gm
-0.04698 0.(tional scale. The OSI reference model is on a very high level of abstraction, offering us)ashow
312 90 gm
-0.10153 0.(a conceptual framework but little guidance for building real systems. On the other hand,)ashow
328 90 gm
0.94345 0. 32 0.09434 0.(most of the work done in the field of cryptology concentrates on the mathematical)awidthshow
344 90 gm
-0.08384 0.(properties of individual cryptosystems. At most, authentication protocols and such have)ashow
360 90 gm
-0.02130 0.(been analyzed with no regard to their position in the OSI model and relation to the rest)ashow
376 90 gm
0.80322 0. 32 0.08032 0.(of the open system. One of the first mentions of these two, often disjoint, tracks of)awidthshow
392 90 gm
1.84539 0. 32 0.18453 0.(development is found in [MM83]. The final report of the COST-11 Ter project)awidthshow
408 90 gm
2.05337 0. 32 0.20533 0.([COS90] \(chaired by S. Muftic\), which is soon coming out, is among the first)awidthshow
424 90 gm
-0.08998 0.(publications in the area of architectures for secure open systems.)ashow
456 90 gm
-0.09069 0.(There is an urgent need for work combining these two main lines of research in the area)ashow
472 90 gm
-0.00593 0.(of secure communications. Starting from the general models and frameworks, security)ashow
488 90 gm
1.34658 0. 32 0.13465 0.(functions, services and mechanisms need to be put in their proper places in open)awidthshow
504 90 gm
-0.03736 0.(systems. They need to be embedded into the existing protocols and services, interfaced)ashow
520 90 gm
0.20263 0. 32 0.02026 0.(with management etc. Finally, appropriate cryptosystems need to be adopted to fill in)awidthshow
536 90 gm
0.71762 0. 32 0.07176 0.(the missing parts. As a result of this work, justified, implementable solutions to the)awidthshow
552 90 gm
-0.02958 0.(security problems of open systems now exist.)ashow
584 90 gm
-0.03146 0.(This work combines the current knowledge of open systems, the OSI framework, open)ashow
600 90 gm
0.70327 0. 32 0.07032 0.(systems management, actual communications protocols, the available cryptographic)awidthshow
616 90 gm
-0.07186 0.(functions, and their implementation, coming up with an architecture for building secure)ashow
632 90 gm
0.74798 0. 32 0.07479 0.(open systems. Because this work aims at actual working implementations of secure)awidthshow
648 90 gm
-0.07513 0.(open systems, implementational issues will be kept in mind throughout the study.)ashow
680 90 gm
-0.03713 0.(This study is written for the OSI-oriented reader involved in research and development)ashow
696 90 gm
-0.03361 0.(of secure open systems. The OSI reference model is used as a guideline, even though a)ashow
712 90 gm
0.01876 0. 32 0.00187 0.(critical view is kept on it. Based on the reasoning given in chapter 3, it can be claimed)awidthshow
728 90 gm
0.44815 0. 32 0.04481 0.(that security should be an integral part of the service provided by the OSI world and)awidthshow
744 90 gm
0.85830 0. 32 0.08583 0.(embedded into the layers of OSI, rather than something designed and implemented)awidthshow
F T cp
%%Page: ? 13
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(10)show
802 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
85 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.04812 0. 32 0.10481 0.(from scratch for each application using the services of OSI. This work is not very)awidthshow
101 90 gm
0.06027 0. 32 0.00602 0.(closely tied to the OSI model which is merely used as a frame of reference. In fact the)awidthshow
117 90 gm
0.30044 0. 32 0.03004 0.(results obtained here can be directly applied to virtually any layered communications)awidthshow
133 90 gm
1.46087 0. 32 0.14608 0.(architecture, such as the DoD Internet Protocol Suite or IBM's System Networks)awidthshow
149 90 gm
-0.10777 0.(Architecture \(SNA\).)ashow
181 90 gm
-0.08905 0.(The mathematical properties of protocols as well as mathematical cryptology have been)ashow
197 90 gm
-0.07373 0.(areas of theoretical research for a long time. There are certain well known requirements)ashow
213 90 gm
-0.02960 0.(that can be posed to any telecommunications protocol, such as: completeness, fairness,)ashow
229 90 gm
0.92651 0. 32 0.09265 0.(and freedom of dead-locks. Also cryptology has been an area of formal theoretical)awidthshow
245 90 gm
0.53985 0. 32 0.05398 0.(study ever since Shannon published his now classical paper breaking new ground in)awidthshow
261 90 gm
0.47958 0. 32 0.04795 0.(1949 [Sha49]. Some of these aspects are discussed in some classical papers \(such as)awidthshow
277 90 gm
0.03234 0. 32 0.00323 0.([NS78], [DS81] and [NS89]\). However, so far a list of the properties of "good" secure)awidthshow
293 90 gm
-0.07330 0.(protocols have not been defined.)ashow
325 90 gm
0.55770 0. 32 0.05577 0.(The main goals of this work are to create an architectural framework integrating the)awidthshow
341 90 gm
0.67520 0. 32 0.06752 0.(security functions and mechanisms into the the OSI reference model and to analyze)awidthshow
357 90 gm
0.87921 0. 32 0.08792 0.(various security functions and mechanisms with respect to this framework. Several)awidthshow
373 90 gm
0.56228 0. 32 0.05622 0.(new concepts, such as )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.93078 0. 32 0.09307 0.(security context)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.29861 0. 32 0.02986 0.( and )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.89813 0. 32 0.08981 0.(security profile)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.60134 0. 32 0.06013 0.(, are introduced and used)awidthshow
389 90 gm
1.04461 0. 32 0.10446 0.(successfully in analyzing the security requirements of open systems and designing)awidthshow
405 90 gm
-0.01760 0.(solutions for them.)ashow
437 90 gm
-0.05242 0.(This work gives the guidelines for an entire new research area at the boundary between)ashow
453 90 gm
0.76385 0. 32 0.07638 0.(theoretical protocol research and cryptology, which so far has been virgin soil. The)awidthshow
469 90 gm
-0.04750 0.(importance of this area is demonstrated by the fact, that in this study alone a number of)ashow
485 90 gm
0.35476 0. 32 0.03547 0.(new research topics are pointed out and a number of problems, until now completely)awidthshow
501 90 gm
-0.09609 0.(unrecognized, are formulated and brought within the reach of theoretical study.)ashow
533 90 gm
0.29556 0. 32 0.02955 0.(In chapter 2, the scope of this work and the model of the world this work is based on)awidthshow
549 90 gm
-0.05679 0.(are defined.)ashow
581 90 gm
0.96923 0. 32 0.09692 0.(In chapter 3, a formal security model is defined, which is then used as a guideline)awidthshow
597 90 gm
1.41494 0. 32 0.14149 0.(throughout this work. Also the security requirements of real sample applications,)awidthshow
613 90 gm
-0.00956 0.(representing a wide scope of applications, are studied and security functions needed to)ashow
629 90 gm
0.14678 0. 32 0.01467 0.(fulfill these requirements are found. Some general considerations on the placement of)awidthshow
645 90 gm
-0.07771 0.(these functions in the layers of OSI are presented.)ashow
677 90 gm
-0.06809 0.(In chapter 4, the security functions are placed into the layer of OSI based on the criteria)ashow
693 90 gm
-0.02600 0.(set in chapter 3. Mechanisms for implementing these functions are found, based on the)ashow
709 90 gm
-0.07672 0.(analysis presented in the appendix.)ashow
741 90 gm
0.22750 0. 32 0.02275 0.(In chapter 5, management issues associated with the secure OSI stack sketched in the)awidthshow
757 90 gm
-0.05940 0.(previous chapter are discussed. Methods for the activation and negotiation of the use of)ashow
F T cp
%%Page: ? 14
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(11)show
802 288 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
85 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.00624 0.(these security functions and mechanisms are found. Key management, which is one of)ashow
101 90 gm
-0.06140 0.(the most important issues in any large, secure system, are also dealt with.)ashow
133 90 gm
0.55465 0. 32 0.05546 0.(In chapter 6, implementational issues are discussed. We aim at solutions that can be)awidthshow
149 90 gm
0.10452 0. 32 0.01045 0.(implemented with reasonable modifications to the existing open systems implementa-)awidthshow
165 90 gm
0.07629 0. 32 0.00762 0.(tions. In this chapter we have a look at some existing OSI implementations, the use of)awidthshow
181 90 gm
0.35690 0. 32 0.03569 0.(software and hardware, and existing cryptosystems that can be used in implementing)awidthshow
197 90 gm
-0.08338 0.(the mechanisms sketched in chapters 4 and 5.)ashow
229 90 gm
0.28121 0. 32 0.02812 0.(In chapter 7, the results of this work are applied to a real case. A subset of the secure)awidthshow
245 90 gm
0.29129 0. 32 0.02912 0.(OSI protocol stack is used in building a secure FTAM system, based on existing OSI)awidthshow
261 90 gm
-0.13218 0.(implementations.)ashow
293 90 gm
1.17111 0. 32 0.11711 0.(In chapter 8, a short overview of this work is given, the results are evaluated and)awidthshow
309 90 gm
-0.08239 0.(directions for further research are pointed out.)ashow
341 90 gm
0.82794 0. 32 0.08279 0.(In the appendix, security mechanisms which can be used to implement the security)awidthshow
357 90 gm
0.02197 0. 32 0.00219 0.(functions of chapter 3 are studied. Some areas of interest to this work, which are more)awidthshow
373 90 gm
-0.06021 0.(or less tutorial in nature and are clearly outside the core of this work, are also discussed)ashow
389 90 gm
0.08866 0.(here.)ashow
F T cp
%%Page: ? 15
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(12)show
802 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
110 90 gm
1 fs
18 fz
bu fc
2 F /|______Times-Bold fnt
bn
(2)show
110 126 gm
2.41607 0. 32 0.24160 0.(The Basis and Scope of This Work)awidthshow
146 90 gm
14 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.74998 0.(2.1)ashow
146 126 gm
2.55279 0. 32 0.25527 0.(The Basic Model)awidthshow
178 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.11322 0. 32 0.01132 0.(For the purposes of this work the world is divided into four parts as depicted in figure)awidthshow
194 90 gm
-0.07225 0.(2-1 below:)ashow
226 90 gm
(-)show
226 126 gm
0.50201 0. 32 0.05020 0.(The communicating )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.63400 0. 32 0.06340 0.(application instances)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.33523 0. 32 0.03352 0.(, consisting of the user \(or service\),)awidthshow
242 126 gm
0.74768 0. 32 0.07476 0.(the application process serving it, and the part of the OSI stack dedicated to)awidthshow
258 126 gm
0.11413 0. 32 0.01141 0.(serving this application process, running on )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.15319 0. 32 0.01531 0.(end systems)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.10040 0. 32 0.01004 0.( which are assumed to)awidthshow
274 126 gm
-0.07518 0.(be trustworthy and physically protected.)ashow
306 90 gm
(-)show
306 126 gm
-0.06846 0.(An untrusted )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.07095 0.(network )ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.06884 0.(interconnecting the end systems.)ashow
338 90 gm
(-)show
338 126 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
3.98452 0. 32 0.39845 0.(Trusted functionality)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
2.25479 0. 32 0.22547 0.( residing beyond the network. At least an off-line)awidthshow
354 126 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
2.09808 0. 32 0.20980 0.(Certification Authority)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.11694 0. 32 0.11169 0.( \(which need not be connected to the network\) and,)awidthshow
370 126 gm
-0.04808 0.(optionally, a trusted on-line )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.05220 0.(Security Server)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(.)show
402 90 gm
(-)show
402 126 gm
0.15625 0. 32 0.01562 0.(The )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.27099 0. 32 0.02709 0.(outer world)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.23010 0. 32 0.02301 0.(, including enemies attacking the interconnected end systems,)awidthshow
418 126 gm
-0.07597 0.(both through the network and directly at the end systems.)ashow
0 0 gm
(nc 437 141 713 452 6 rc)kp
64 gr
437 141 713 452 1 rc
585 351 gm
0 gr
552 417 lin
553 181 gm
579 236 lin
619 381 gm
609 350 lin
psb
pse
nc ct 39 0 put
574 355 gm
bp
554 349 T qi
548 327 qc
544 298 qc
557 277 qc
552 263 qc
553 247 qc
562 230 qc
580 224 qc
590 233 qc
596 217 qc
612 218 qc
623 230 qc
637 234 qc
644 263 qc
637 291 qc
642 312 qc
635 335 qc
632 356 qc
606 357 qc
597 368 qc
574 362 qc
573 356 qc
573 356 qc
574 355 62 gr
T qq
0.969  60 45 {dup mul exch dup mul add 1.0 exch sub }setscreen setgray
qf
ef
0 gr
7 ec
(nc 437 141 713 452 6 rc)kp
321 358 276 311 th
614 273 gm
1 setTxMode
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.14756 0.(untrusted )ashow
624 277 gm
0.17138 0 rmoveto
(network)show
tu
64 gr
440 147 556 212 1 rc
2 2 pen
0 gr
441 148 555 211 0 rc
64 gr
502 158 548 201 1 rc
1 1 pen
0 gr
502.5 158.5 547.5 200.5 0 rc
516 159 gm
516 200 lin
526 159 gm
526 200 lin
537 159 gm
537 200 lin
ts
515 177 gm
1 setTxMode
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(7)show
tu
ts
525 177 gm
(6)show
tu
ts
535 177 gm
(5)show
tu
ts
544 177 gm
(4)show
tu
479 179 gm
0 gr
485 179 lin
485.5 156.5 505.5 203.5 0 ov
64 gr
453 165 483 195 1 ov
0 gr
453.5 165.5 482.5 194.5 0 ov
466.5 170.5 476.5 188.5 0 90 0 ar
466.5 171.5 476.5 188.5 90 180 0 ar
nc ct 39 0 put
464 180 gm
pt
471 177 pl
471 182 pl
464 180 pl
ef
eu
(nc 437 141 713 452 6 rc)kp
64 gr
464 184 466 187 1 ov
0 gr
464.5 184.5 465.5 186.5 0 ov
64 gr
464 173 466 177 1 ov
0 gr
464.5 173.5 465.5 176.5 0 ov
ts
451 171 gm
0.00683 0 rmoveto
1 setTxMode
(user)show
tu
ts
496 163 gm
2.00708 0 rmoveto
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
(application)show
tu
ts
580 152 gm
0.68017 0 rmoveto
2 fs
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
(end system A)show
tu
0 gr
pr
518 212 pl
514 225 pl
521 225 pl
518 212 pl
1 ep
pr
518 380 pl
521 367 pl
514 367 pl
518 380 pl
1 ep
2 2 pen
517 366 gm
517 224 lin
ts
502 250 gm
1 setTxMode
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.14770 0.(secure communications)ashow
513 237 gm
-0.15248 0.(between application instances)ashow
tu
64 gr
661 257 711 328 1 rc
0 gr
662 258 710 327 0 rc
ts
673 278 gm
1 setTxMode
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.18974 0.(trusted )ashow
684 270 gm
-0.26620 0.(third party)ashow
694 264 gm
-0.23716 0.(\(Certification )ashow
704 271 gm
-0.03536 0.(Authority\))ashow
tu
64 gr
566 277 596 308 1 ov
1 1 pen
0 gr
566.5 277.5 595.5 307.5 0 ov
nc ct 39 0 put
576 292 gm
pt
585 290 pl
585 295 pl
576 292 pl
ef
eu
(nc 437 141 713 452 6 rc)kp
64 gr
576 296 579 299 1 ov
0 gr
576.5 296.5 578.5 298.5 0 ov
64 gr
576 285 579 289 1 ov
0 gr
576.5 285.5 578.5 288.5 0 ov
psb
pse
nc ct 39 0 put
qf
581 309 gm
pt
581 275 pl
601 292 pl
581 309 pl
ef
eu
(nc 437 141 713 452 6 rc)kp
pr
464 357 pl
470 349 pl
465 347 pl
464 357 pl
1 ep
467 348 gm
471 336 lin
nc ct 39 0 put
pt
463 336 pl
469 320 pl
ef
eu
(nc 437 141 713 452 6 rc)kp
pr
464 242 pl
464 252 pl
470 250 pl
464 242 pl
1 ep
466 250 gm
471 263 lin
nc ct 39 0 put
pt
463 263 pl
469 280 pl
ef
eu
(nc 437 141 713 452 6 rc)kp
ts
448 285 gm
1 setTxMode
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.21896 0.(enemies)ashow
tu
64 gr
452 286 483 316 1 ov
0 gr
452.5 286.5 482.5 315.5 0 ov
nc ct 39 0 put
464 302 gm
pt
472 299 pl
472 304 pl
464 302 pl
ef
eu
(nc 437 141 713 452 6 rc)kp
64 gr
463 304 465 308 1 ov
0 gr
463.5 304.5 464.5 307.5 0 ov
64 gr
463 294 465 297 1 ov
0 gr
463.5 294.5 464.5 296.5 0 ov
psb
pse
nc ct 39 0 put
qf
468 318 gm
pt
468 284 pl
489 302 pl
468 318 pl
ef
eu
(nc 437 141 713 452 6 rc)kp
64 gr
611 380 641 410 1 ov
0 gr
611.5 380.5 640.5 409.5 0 ov
nc ct 39 0 put
621 395 gm
pt
630 392 pl
630 397 pl
621 395 pl
ef
eu
(nc 437 141 713 452 6 rc)kp
64 gr
621 398 624 402 1 ov
0 gr
621.5 398.5 623.5 401.5 0 ov
64 gr
621 388 624 391 1 ov
0 gr
621.5 388.5 623.5 390.5 0 ov
psb
pse
nc ct 39 0 put
qf
625 411 gm
pt
625 377 pl
646 395 pl
625 411 pl
ef
eu
(nc 437 141 713 452 6 rc)kp
ts
580 386 gm
0.68017 0 rmoveto
1 setTxMode
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
(end system B)show
tu
64 gr
440 381 556 446 1 rc
2 2 pen
0 gr
441 382 555 445 0 rc
64 gr
502 392 548 435 1 rc
1 1 pen
0 gr
502.5 392.5 547.5 434.5 0 rc
516 392 gm
516 433 lin
526 392 gm
526 433 lin
537 392 gm
537 433 lin
ts
515 410 gm
1 setTxMode
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(7)show
tu
ts
525 410 gm
(6)show
tu
ts
535 410 gm
(5)show
tu
ts
544 410 gm
(4)show
tu
479 413 gm
0 gr
485 413 lin
485.5 389.5 505.5 435.5 0 ov
ts
496 396 gm
2.00708 0 rmoveto
1 setTxMode
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
(application)show
tu
ts
451 398 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.16207 0.(service)ashow
tu
64 gr
456 398 482 428 20.5 20.5 1 rr
0 gr
456.5 398.5 481.5 427.5 20.5 20.5 0 rr
ts
541 254 gm
1 setTxMode
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.26579 0.(application instances)ashow
tu
1 2 lw
537 351 gm
0 gr
520 388 lin
1 1 lw
0 0 pen
520 388 lin
1 2 lw
1 1 pen
537 244 gm
520 205 lin
1 1 lw
0 0 pen
520 205 lin
1 1 pen
742 90 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
-0.26438 0.(Figure 2-1:)ashow
742 162 gm
2.11746 0. 32 0.21174 0.(Model of the world: application instances at trusted end systems)awidthshow
758 162 gm
-0.10531 0.(communicating securely across an untrusted network.)ashow
F T cp
%%Page: ? 16
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(13)show
802 288 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.06373 0.(This work is based on the following ideas:)ashow
133 90 gm
(-)show
133 126 gm
2.00958 0. 32 0.20095 0.(The client-server model. The network is seen as interconnecting various)awidthshow
149 126 gm
1.30905 0. 32 0.13090 0.(services and their users. This model is commonly accepted as the basis of)awidthshow
165 126 gm
-0.06892 0.(modern distributed information systems.)ashow
197 90 gm
(-)show
197 126 gm
1.65481 0. 32 0.16548 0.(Openness and globalness. It is seen that the value of various information)awidthshow
213 126 gm
-0.05262 0.(services is directly proportional to their geographic coverage and the number of)ashow
229 126 gm
1.71630 0. 32 0.17163 0.(users that can reach them. It is essential that these services can be made)awidthshow
245 126 gm
-0.09526 0.(accessible across organizational and geographic boundaries.)ashow
277 90 gm
(-)show
277 126 gm
1.40533 0. 32 0.14053 0.(The necessity of security in open systems. For these global services to be)awidthshow
293 126 gm
1.09832 0. 32 0.10983 0.(valuable in real life, it is necessary that they can be used securely and that)awidthshow
309 126 gm
-0.17318 0.(commitments can be made electronically.)ashow
341 90 gm
1 fs
bu fc
2 F /|______Times-Bold fnt
bn
1.75003 0.(2.1.1)ashow
341 126 gm
2.76458 0. 32 0.27645 0.(End Systems and Application Instances)awidthshow
373 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.10475 0.(The )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.10021 0.(end systems)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.09495 0.( are computers hosting applications and interconnected via an untrusted)ashow
389 90 gm
0.00671 0. 32 0.00067 0.(network \(see figure 2-1\). In this study, the end systems, including their local terminals)awidthshow
405 90 gm
0.44387 0. 32 0.04438 0.(and applications running on them, are considered trustworthy by their owners. How-)awidthshow
421 90 gm
0.32058 0. 32 0.03205 0.(ever, a user does not trust other users of the same end system nor do the end systems)awidthshow
437 90 gm
0.13046 0. 32 0.01304 0.(trust one another, unless otherwise stated. Furthermore, a user does not trust a foreign)awidthshow
453 90 gm
-0.01206 0.(end system, such as a vending machine, he is using.)ashow
485 90 gm
0.60379 0. 32 0.06037 0.(Physical and local security of end systems have been widely studied and techniques)awidthshow
501 90 gm
0.88088 0. 32 0.08808 0.(have been developed for ensuring them. Lots of work has been done in the area of)awidthshow
517 90 gm
-0.06314 0.(securing the end-systems and it will not be dealt with in this study. A short overview of)ashow
533 90 gm
-0.05050 0.(work already done in this area follows.)ashow
565 90 gm
0.24780 0. 32 0.02478 0.(Multi-level security models, such as the Bell-la Padula model [BP74] introducing the)awidthshow
581 90 gm
-0.00997 0.(concept of )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.00965 0.(security classes)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.01026 0.( extended by Biba [Bib77] with )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.00941 0.(integrity classes)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.01118 0.(, have been)ashow
597 90 gm
0.92102 0. 32 0.09210 0.(developed for formalizing and implementing security policies. A brief summary of)awidthshow
613 90 gm
-0.08329 0.(security policies and models is presented in appendix 4.)ashow
645 90 gm
0.81771 0. 32 0.08177 0.(When this study was already written I received a preprint copy of Rainer Rueppels)awidthshow
661 90 gm
0.42663 0. 32 0.04266 0.(paper )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.54199 0. 32 0.05419 0.(A Formal Approach to Security Architectures)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.39062 0. 32 0.03906 0.(  to be presented in Eurocrypt'91)awidthshow
677 90 gm
-0.04484 0.([Rue90] \(dated Dec. 17, 1990\). This paper appears to constitute a fundamental piece of)ashow
693 90 gm
0.00762 0. 32 0.00076 0.(work in the area of formalizing the design and analysis of secure information systems.)awidthshow
709 90 gm
0.00808 0. 32 0.00080 0.(The formalism developed could probably be adapted to the formal analysis of security)awidthshow
725 90 gm
-0.07878 0.(contexts and secure communications sketched in section 3.4.)ashow
F T cp
%%Page: ? 17
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(14)show
802 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.06835 0.(In the )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.08033 0.(Trusted Computer System Evaluation Criteria)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.05458 0.( \()ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.11241 0.(TCSEC)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.08169 0.(\) of the US Department of)ashow
117 90 gm
1.48529 0. 32 0.14852 0.(Defense \(DoD\) [DoD85], also known as the "Orange Book", computer operating)awidthshow
133 90 gm
1.27990 0. 32 0.12799 0.(systems are divided into seven security classes \(A1 through D\) grouped into four)awidthshow
149 90 gm
1.32308 0. 32 0.13230 0.(divisions. The criteria and procedures for evaluating computer operating systems,)awidthshow
165 90 gm
-0.07752 0.(covering the aspects of Security Policy, Accountability, Assurance and Documentation,)ashow
181 90 gm
-0.03781 0.(are defined. However, telecommunications are not included in this evaluation. As soon)ashow
197 90 gm
0.88470 0. 32 0.08847 0.(as a computer is connected to an untrusted network, it in practice loses its security)awidthshow
213 90 gm
0.17608 0. 32 0.01760 0.(clearance. No security requirements or validation procedures are defined for telecom-)awidthshow
229 90 gm
-0.07379 0.(munications subsystems of computer operating systems in the Orange Book.)ashow
261 90 gm
0.03265 0. 32 0.00326 0.(The "Red Book" [NCS87] extends the evaluation criteria of the Orange Book to cover)awidthshow
277 90 gm
-0.01011 0.(computers connected to trusted networks. However, untrusted networks, which are the)ashow
293 90 gm
-0.02752 0.(basis of this study, are outside the scope of the Red Book.)ashow
325 90 gm
0.02120 0. 32 0.00212 0.(The European counterpart of the Orange Book is the )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.03723 0. 32 0.00372 0.(Information Technology Security)awidthshow
341 90 gm
2.25326 0. 32 0.22532 0.(Evaluation Criteria)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.40374 0. 32 0.04037 0.( \()awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.44332 0.(ITSEC)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.44149 0. 32 0.14414 0.(\) [ITS90] defining the harmonized criteria of France,)awidthshow
357 90 gm
0.16540 0. 32 0.01654 0.(Germany, the Netherlands and the United Kingdom \(and probably in the future of the)awidthshow
373 90 gm
0.24139 0. 32 0.02413 0.(European Communities\). In ITSEC six )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.33187 0. 32 0.03318 0.(assurance levels)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.19699 0. 32 0.01969 0.( \(E1 through E6\) are defined,)awidthshow
389 90 gm
-0.07765 0.(indicating increasing degree of trust in the )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.08959 0.(Correctness)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.07929 0.( and )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.08189 0.(Effectiveness)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.08117 0.( of the security)ashow
405 90 gm
0.14526 0. 32 0.01452 0.(functions of a computer system. In addition, ten predefined )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.25573 0. 32 0.02557 0.(Functionality Classes)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.11489 0. 32 0.01148 0.( \(F1)awidthshow
421 90 gm
0.70953 0. 32 0.07095 0.(through F10\) are specified with F1 \(together with E2\) corresponding to the TCSEC)awidthshow
437 90 gm
-0.04367 0.(class C1 and F5 \(together with E6\) corresponding to A1. E0 corresponds to class D.)ashow
469 90 gm
-0.09272 0.(A great deal of practically oriented literature is available on the topic of secure informa-)ashow
485 90 gm
1.01333 0. 32 0.10133 0.(tion systems. For example, [Woo87] gives a rather comprehensive checklist of the)awidthshow
501 90 gm
0.97991 0. 32 0.09799 0.(security controls of an information system  and [Woo90] gives an overview of the)awidthshow
517 90 gm
-0.07450 0.(design principles of a secure information system.)ashow
549 90 gm
0.36529 0. 32 0.03652 0.(In this study, the term )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.81497 0. 32 0.08149 0.(application instance)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.37902 0. 32 0.03790 0.( is used to mean one instance of an appli-)awidthshow
565 90 gm
-0.05665 0.(cation consisting of the user \(or service\), the application process serving it, and the part)ashow
581 90 gm
-0.02131 0.(of the OSI stack dedicated to serving this application process \(namely the OSI layers 4)ashow
597 90 gm
0.42327 0. 32 0.04232 0.(through 7\). Each application instance runs on an end system and communicates with)awidthshow
613 90 gm
-0.02554 0.(other application instances, running on other end systems, via an untrusted network. In)ashow
629 90 gm
-0.04692 0.(this study, an application instance is trusted by its user, unless otherwise stated.)ashow
661 90 gm
0.61935 0. 32 0.06193 0.(It is worth pointing out that the division between the end system and the network is)awidthshow
677 90 gm
-0.07348 0.(somewhat artificial. In fact the end system is a network of circuit boards interconnected)ashow
693 90 gm
1.18591 0. 32 0.11859 0.(via the backplane. Similarly each ciruit board is a network of interconnected chip)awidthshow
709 90 gm
-0.09826 0.(carriers. One chip carrier may contain several chips ponded together. The ultimate com-)ashow
725 90 gm
-0.06265 0.(municatings elements communicating via an untrusted network are the individual chips)ashow
741 90 gm
-0.09277 0.(which can be made physically secure.)ashow
F T cp
%%Page: ? 18
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(15)show
802 288 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.03736 0.(This revelation gives rise to a unified view on security where network and end systems)ashow
117 90 gm
0.22598 0. 32 0.02259 0.(security are no longer treated separately. By adding these lower layers to the network)awidthshow
133 90 gm
1.26846 0. 32 0.12684 0.(hierarchy depicted in figure 1-1 we can view any information system as an inter-)awidthshow
149 90 gm
-0.06962 0.(connections of chips communicating via an untrusted network. Our ultimate goal there-)ashow
165 90 gm
0.14892 0. 32 0.01489 0.(fore is to find the basic elements of security and implement these on each chip. These)awidthshow
181 90 gm
-0.01907 0.(thoughts were brought up in the discussion with D. Farber [Far91].)ashow
213 90 gm
1 fs
bu fc
2 F /|______Times-Bold fnt
bn
1.75003 0.(2.1.2)ashow
213 126 gm
0.72627 0.(Network)ashow
245 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.10604 0. 32 0.01060 0.(The )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.03784 0.(network)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.13214 0. 32 0.01321 0.( is an internet, consisting of a number of interconnected networks, whose)awidthshow
261 90 gm
-0.03268 0.(security cannot be guaranteed. The network may \(accidentally or voluntarily\) e.g. lose,)ashow
277 90 gm
0.98556 0. 32 0.09855 0.(duplicate, generate or change messages passing through it. When a trusted, locally)awidthshow
293 90 gm
1.12304 0. 32 0.11230 0.(secure system is connected to a network, a whole new group of threats coming in)awidthshow
309 90 gm
-0.08500 0.(through the network needs to be taken into account.)ashow
341 90 gm
-0.09669 0.(It deserves to be noted that teleoperators are doing their best to guarantee the security of)ashow
357 90 gm
-0.05595 0.(public data networks. Their cablings are physically secured and their cross-connections)ashow
373 90 gm
-0.05653 0.(and active components reside in secure premises and are operated by trusted personnel.)ashow
389 90 gm
0.07431 0. 32 0.00743 0.(In addition, many of the network services offer security enhancements, such as closed)awidthshow
405 90 gm
0.45089 0. 32 0.04508 0.(user groups or authentication of the calling party \(the A-subscriber\). It is also likely,)awidthshow
421 90 gm
1.15249 0. 32 0.11524 0.(that teleoperators will increasingly often employ cryptographic techniques in their)awidthshow
437 90 gm
0.50827 0. 32 0.05082 0.(networks in the near future. However, at least for yet a long time, not all public net-)awidthshow
453 90 gm
-0.02209 0.(works can be trusted. In this study the network is always assumed to be untrustworthy.)ashow
485 90 gm
1 fs
bu fc
2 F /|______Times-Bold fnt
bn
1.75003 0.(2.1.3)ashow
485 126 gm
2.65197 0. 32 0.26519 0.(Trusted Parties)awidthshow
517 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.90582 0. 32 0.19058 0.(In order to carry out secure communications we always have to trust someone.)awidthshow
533 90 gm
0.30609 0. 32 0.03060 0.(However, the amount of trusted parties needs to be kept at its minimum. At least one)awidthshow
549 90 gm
0.21575 0. 32 0.02157 0.(trusted )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.36193 0. 32 0.03619 0.(Certification Authority)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.06347 0. 32 0.00634 0.( \()awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.08352 0.(CA)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.17684 0. 32 0.01768 0.(\) is always needed. That is, a third party whom we)awidthshow
565 90 gm
-0.05706 0.(can trust to certify at least the authentication parameters of ourselves and those of other)ashow
581 90 gm
-0.03540 0.(parties and, optionally, to notarize agreements etc. In case of disagreement, this trusted)ashow
597 90 gm
-0.09666 0.(third party can act as an impartial judge \(or witness\).)ashow
629 90 gm
0.95260 0. 32 0.09526 0.(The minimal trusted third party is an off-line Certification Authority certifying the)awidthshow
645 90 gm
0.11108 0. 32 0.01110 0.(public keys of other parties. These certified public keys can then be used for purposes)awidthshow
661 90 gm
-0.04710 0.(of authentication, safe distribution of session keys, ensuring the integrity and confiden-)ashow
677 90 gm
0.42327 0. 32 0.04232 0.(tiality of the transferred data, and non-repudiation. It is worth noting that certificates)awidthshow
693 90 gm
-0.07974 0.(issued by the CA can be distributed through an untrusted channel, such as the Directory)ashow
709 90 gm
-0.07377 0.(Service, without the danger of them being compromised.)ashow
741 90 gm
-0.05482 0.(Even though no trusted on-line server is actually needed \(only a trusted off-line author-)ashow
757 90 gm
0.49697 0. 32 0.04969 0.(ity\), the use of a trusted on-line Security Server for purposes of e.g. Key Generation)awidthshow
F T cp
%%Page: ? 19
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(16)show
802 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
85 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.80718 0. 32 0.08071 0.(and Distribution, Notarization, Security Logging etc. can often simplify things. For)awidthshow
101 90 gm
-0.04499 0.(example, in [BM90] a security scheme for selling the spare time of a computer to other)ashow
117 90 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.03195 0.(authorized)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.02940 0.( users is proposed, based on )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.03556 0.(coupons)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.02987 0.(, DES and a trusted )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.03318 0.(broker)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(.)show
149 90 gm
-0.00588 0.(In this study, we try to minimize the number of trusted parties. We expect each user to)ashow
165 90 gm
-0.00265 0.(trust his own CA. We also assume the transitivity of trust, that is we trust the CAs that)ashow
181 90 gm
0.21316 0. 32 0.02131 0.(a CA trusted by us trusts. This makes it possible for the CAs to form global chains of)awidthshow
197 90 gm
0.13438 0.(trust.)ashow
229 90 gm
1 fs
bu fc
2 F /|______Times-Bold fnt
bn
1.75003 0.(2.1.4)ashow
229 126 gm
2.13119 0. 32 0.21311 0.(The Outside World)awidthshow
261 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.12054 0. 32 0.01205 0.(The outside world includes )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.03344 0.(enemies)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.09124 0. 32 0.00912 0.( that may have access to the network or to the end)awidthshow
277 90 gm
0.25344 0. 32 0.02534 0.(systems. The three masked villains in figure 2-1 represent enemies attacking the end-)awidthshow
293 90 gm
-0.04115 0.(systems directly, through the network \(a crooked user\), and from within the network \(a)ashow
309 90 gm
-0.09390 0.(crooked teleoperator\). Of these three types of attacks, the latter two are within the scope)ashow
325 90 gm
0.20324 0. 32 0.02032 0.(of this study.)awidthshow
357 90 gm
0.54031 0. 32 0.05403 0.(Possible attacks by enemies through or from within the network include, but are not)awidthshow
373 90 gm
-0.11929 0.(limited to, the following:)ashow
405 90 gm
(-)show
405 126 gm
-0.06576 0.(Masquerade, somebody else trying to impersonate as one of the communicating)ashow
421 126 gm
(parties.)show
453 90 gm
(-)show
453 126 gm
-0.06239 0.(Eavesdropping, unauthorized passive monitoring of traffic.)ashow
485 90 gm
(-)show
485 126 gm
0.49133 0. 32 0.04913 0.(Manipulation of messages between the communicating parties \(e.g. changing)awidthshow
501 126 gm
-0.04917 0.(the sums in banking transactions\).)ashow
533 90 gm
-0.01380 0.(Especially nodes acting as gateways between two networks \(of any kind\) can intercept)ashow
549 90 gm
-0.12100 0.(traffic and launch any kind of active attack towards the integrity of communications.)ashow
584 90 gm
1 fs
14 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.74998 0.(2.2)ashow
584 126 gm
4.08538 0. 32 0.40853 0.(Communications Categories)awidthshow
616 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.51071 0. 32 0.05107 0.(Distributed information services can broadly be divided into two main categories by)awidthshow
632 90 gm
-0.15966 0.(their communications requirements:)ashow
664 90 gm
(-)show
664 126 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.02880 0.(Connection-oriented services)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.02851 0.(, where an end-to-end connection is built between)ashow
680 126 gm
-0.03712 0.(the two communicating parties. Examples of this category are )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.04078 0.(Virtual Terminal)ashow
696 126 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.16639 0.(\()ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.29173 0.(VT)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.75164 0. 32 0.07516 0.(\) [IS9040, IS9041] and )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.03591 0. 32 0.10359 0.(File Transfer, Access and Management)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.24291 0. 32 0.02429 0.( \()awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.32633 0.(FTAM)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(\))show
712 126 gm
0.23974 0.([IS8571-1,2,4].)ashow
F T cp
%%Page: ? 20
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(17)show
802 288 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(-)show
101 126 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
3.01406 0. 32 0.30140 0.(Connectionless \(request-reply type\) services)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.75872 0. 32 0.17587 0.(, where a service request is)awidthshow
117 126 gm
-0.03242 0.(generated and sent by the user and a response message is generated and sent by)ashow
133 126 gm
0.23300 0. 32 0.02330 0.(the service provider. For these services it is usually not worth while to build a)awidthshow
149 126 gm
0.21270 0. 32 0.02127 0.(connection at any layer and they are more naturally based on a connectionless)awidthshow
165 126 gm
0.74768 0. 32 0.07476 0.(network and and upper layer services. Examples of this category in the near)awidthshow
181 126 gm
(future will be )show
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
(Directory Access)show
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
( [X.500, IS9594-1] or )show
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.01251 0. 32 0.00125 0.(Remote Database Access)awidthshow
197 126 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.15129 0.(\()ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.29455 0.(RDA)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.80276 0. 32 0.08027 0.(\) [IS9579-1,2]. Connectionless communications at all the layers of the)awidthshow
213 126 gm
-0.09323 0.(OSI model are clearly the most natural basis for this type of services.)ashow
245 90 gm
-0.09045 0.(As a special case of connectionless services, )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.09326 0.( relayed \(store-and-forward type\) services)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(,)show
261 90 gm
1.20880 0. 32 0.12088 0.(where no real-time end-to-end communications take place, have to be considered.)awidthshow
277 90 gm
0.52291 0. 32 0.05229 0.(Examples of this category are the Message Handling System [X.400] or file transfer)awidthshow
293 90 gm
-0.11552 0.(through an intermediate file store.)ashow
325 90 gm
-0.01710 0.(The first category is OSI-wise the purest in the sense that the OSI reference model and)ashow
341 90 gm
0.20233 0. 32 0.02023 0.(most of its associated standards were first designed with this kind of communications)awidthshow
357 90 gm
-0.08740 0.(in mind and have later on been extended towards the use of connectionless services.)ashow
389 90 gm
-0.02107 0.(The second category is of increasing importance because it fits well in with the Client-)ashow
405 90 gm
0.00839 0. 32 0.00083 0.(Server Architecture, which seems to be the current trend in information systems. With)awidthshow
421 90 gm
0.67977 0. 32 0.06797 0.(the advent of the Directory Service and Distributed Database Management, the OSI)awidthshow
437 90 gm
-0.01347 0.(standards have been extended towards this direction, e.g. with the definitions of a con-)ashow
453 90 gm
1.74957 0. 32 0.17495 0.(nectionless transport service [IS8072/A1] and protocol [IS8602], session service)awidthshow
469 90 gm
0.99472 0. 32 0.09947 0.([IS8326/A3] and protocol [IS9549], presentation service [IS8822/A1] and protocol)awidthshow
485 90 gm
0.26443 0. 32 0.02644 0.([IS9576], and ACSE service [IS8649/A2] and protocol [IS10035]. [IS9545/A1] deals)awidthshow
501 90 gm
-0.07795 0.(with connectionless operation of the application layer. It is likely, that in the near future)ashow
517 90 gm
1.05911 0. 32 0.10591 0.(both the use of the Directory and Remote Database Management will be based on)awidthshow
533 90 gm
1.09878 0. 32 0.10987 0.(connectionless communications services. At the moment they both still run on the)awidthshow
549 90 gm
0.85815 0. 32 0.08581 0.(Remote Operations Service \(ROS\) of the application layer and connection-oriented)awidthshow
565 90 gm
-0.03648 0.(transport service.)ashow
597 90 gm
1.11404 0. 32 0.11140 0.(Relayed communications are also increasing in importance, mainly because of the)awidthshow
613 90 gm
0.92941 0. 32 0.09294 0.(Message Handling System \(MHS\) [X.400] which is among the first internationally)awidthshow
629 90 gm
2.29431 0. 32 0.22943 0.(standardized open systems of commercial importance. However, from the OSI)awidthshow
645 90 gm
0.63232 0. 32 0.06323 0.(perspective, this kind of service is not pure peer-to-peer communication. In the OSI)awidthshow
661 90 gm
1.48757 0. 32 0.14875 0.(sense, one hop on the path of a message in the MHS, from User Agent \(UA\) or)awidthshow
677 90 gm
0.05722 0. 32 0.00572 0.(Message Store \(MS\) to Message Transfer Agent \(MTA\), from MTA to MTA, or from)awidthshow
693 90 gm
-0.04838 0.(MTA to UA or MS, forms an instance of end-to-end communications in the OSI sense.)ashow
709 90 gm
0.65063 0. 32 0.06506 0.(Between the hops, the message is raised into the domain of applications, stored and)awidthshow
725 90 gm
-0.06546 0.(later passed on. In MHS the lowest layer of real end-to-end communications is the UA-)ashow
741 90 gm
0.07537 0. 32 0.00753 0.(to-UA protocol [X.400] \(also known as P2, see figure 2-2\).)awidthshow
F T cp
%%Page: ? 21
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(18)show
802 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01446 0.(Among the most important applications of MHS is Electronic Data Interchange \(EDI\).)ashow
117 90 gm
0.66116 0. 32 0.06611 0.(Basically EDI means the computer-to-computer exchange of information relating to)awidthshow
133 90 gm
0.40161 0. 32 0.04016 0.(trade activities [TED89]. The information is in the form of EDI messages, which are)awidthshow
149 90 gm
0.01129 0. 32 0.00112 0.(structured electronic messages for administrative or commercial purposes. EDI strives)awidthshow
165 90 gm
1.52206 0. 32 0.15220 0.(to automate the bulk exchange of routine data, such as orders and invoices, sent)awidthshow
181 90 gm
1.11755 0. 32 0.11175 0.(between organizations. The use of MHS with EDI is discussed e.g. in [Gen90]. A)awidthshow
197 90 gm
-0.06423 0.(concise introduction to EDI, including legal aspects etc., can be found in [Com89]. The)ashow
213 90 gm
0.50689 0. 32 0.05068 0.(TEDIS Program [TED90a] gives an overview of current European EDI activities. In)awidthshow
229 90 gm
-0.03129 0.([TED90b] a specific and detailed scheme for signing EDIFACT messages is proposed,)ashow
245 90 gm
-0.12030 0.(including technical details and references to real cryptosystems to be employed.)ashow
277 90 gm
0.74615 0. 32 0.07461 0.(In connection with MHS, the secure general-purpose OSI protocol stack \(drafted in)awidthshow
293 90 gm
0.45135 0. 32 0.04513 0.(chapter 4\) can be used to enhance security on connections between the agents \(UAs,)awidthshow
309 90 gm
0.79483 0. 32 0.07948 0.(MSes and MTAs\) of a MHS but these measures alone cannot guarantee end-to-end)awidthshow
325 90 gm
-0.11476 0.(security because the intermediate nodes cannot be trusted.)ashow
357 90 gm
0.02182 0. 32 0.00218 0.(This is analogous to the situation with true end-to-end services, such as FTAM, where)awidthshow
373 90 gm
-0.00186 0.(end-to-end security has to be implemented at layer 4 \(the lowest layer with end-to-end)ashow
389 90 gm
1.5625 0. 32 0.15625 0.(significance\) or above and any security measures at layers 1 through 3 can only)awidthshow
405 90 gm
-0.05850 0.(enhance the security of the total service but not alone guarantee it. In MHS true end-to-)ashow
421 90 gm
0.25146 0. 32 0.02514 0.(end security can only be achieved at the level of P2 \(see figure 2-2\) or higher \(within)awidthshow
437 90 gm
-0.08111 0.(the application process\).)ashow
0 0 pen
413 195 gm
(nc 456 148 659 445 6 rc)kp
62 gr
413 195 lin
0.969  60 45 {dup mul exch dup mul add 1.0 exch sub }setscreen setgray
503 152 654 439 1 ov
2 2 pen
0 gr
503 153 654 439 0 ov
64 gr
541 166 575 210 1 ov
1 2 lw
1 1 pen
0 gr
541.5 166.5 574.5 209.5 0 ov
1 1 lw
0 0 pen
413 195 lin
561 179 gm
1 setTxMode
bu fc
2 F /|______Times-Roman fnt
bn
-0.32623 0.(UA)ashow
64 gr
541 381 575 425 1 ov
1 2 lw
1 1 pen
0 gr
541.5 381.5 574.5 424.5 0 ov
1 1 lw
0 0 pen
564 179 gm
564 179 lin
561 394 gm
1 setTxMode
-0.32623 0.(UA)ashow
64 gr
471 166 505 210 1 ov
1 2 lw
1 1 pen
0 gr
471.5 166.5 504.5 209.5 0 ov
1 1 lw
0 0 pen
564 394 gm
564 394 lin
491 177 gm
0.17529 0 rmoveto
1 setTxMode
(User)show
64 gr
471 381 505 425 1 ov
1 2 lw
1 1 pen
0 gr
471.5 381.5 504.5 424.5 0 ov
1 1 lw
0 0 pen
494 177 gm
494 177 lin
491 392 gm
0.17529 0 rmoveto
1 setTxMode
(User)show
0 gr
475 199 499 223 340 380 1 ar
475 368 499 392 160 200 1 ar
1 1 pen
487 369 gm
487 222 lin
470 266 gm
0.02197 0 rmoveto
1 setTxMode
(User-to-user )show
482 255 gm
-0.15330 0.(Communications)ashow
519 271 gm
1.73437 0 rmoveto
1 fs
14 fz
bu fc
2 F /|______Times-Bold fnt
bn
(Message)show
534 245 gm
3.36206 0 rmoveto
(Handling System)show
0 gr
545 199 569 223 340 380 1 ar
545 368 569 392 160 200 1 ar
557 369 gm
557 222 lin
553 290 gm
0.16455 0 rmoveto
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(P2)show
0 gr
529 175 553 199 250 290 1 ar
492 175 516 199 70 110 1 ar
515 187 gm
530 187 lin
530 392 554 416 250 290 1 ar
493 392 517 416 70 110 1 ar
516 404 gm
531 404 lin
0 0 pen
60 gr
531 404 lin
0.937  60 45 {dup mul exch dup mul add 1.0 exch sub }setscreen setgray
562 224 649 368 1 ov
1 2 lw
1 1 pen
0 gr
562.5 224.5 648.5 367.5 0 ov
1 1 lw
0 0 pen
531 404 lin
64 gr
574 239 609 283 1 ov
1 2 lw
1 1 pen
0 gr
574.5 239.5 608.5 282.5 0 ov
1 1 lw
0 0 pen
531 404 lin
594 248 gm
1 setTxMode
-0.83007 0.(MTA)ashow
64 gr
574 310 609 354 1 ov
1 2 lw
1 1 pen
0 gr
574.5 310.5 608.5 353.5 0 ov
1 1 lw
0 0 pen
597 248 gm
597 248 lin
594 319 gm
1 setTxMode
-0.83007 0.(MTA)ashow
0 gr
578 271 602 295 340 380 1 ar
578 299 602 323 160 200 1 ar
1 1 pen
590 300 gm
590 294 lin
619 234 gm
1 setTxMode
-0.08819 0.(Message Transfer System)ashow
0 gr
572 229 596 253 182 222 1 ar
557 192 581 216 2 42 1 ar
573 214 gm
579 230 lin
571 339 595 363 318 358 1 ar
556 376 580 400 138 178 1 ar
572 377 gm
578 361 lin
582 290 gm
0.16455 0 rmoveto
1 setTxMode
(P1)show
688 90 gm
(nc 30 28 811 566 6 rc)kp
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.26438 0.(Figure 2-2:)ashow
688 162 gm
0.08697 0. 32 0.00869 0.(Message Handling System.)awidthshow
720 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.05035 0.(In many respects the service provided by an MHS is comparable to that provided by an)ashow
736 90 gm
0.43716 0. 32 0.04371 0.(ISO Internet. From the user's point of view both of these services transfer datagrams)awidthshow
752 90 gm
-0.00964 0.(across a network of interconnected networks the main differences between them being)ashow
F T cp
%%Page: ? 22
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(19)show
802 288 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
85 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.70312 0. 32 0.07031 0.(that MHS operates at the application layer whereas Internet operates at the network)awidthshow
101 90 gm
-0.06886 0.(layer and that the Internet is real-time whereas MHS is not. In an internet the delays are)ashow
117 90 gm
-0.02172 0.(typically in the order of milliseconds whereas MHS causes significantly longer delays,)ashow
133 90 gm
-0.07638 0.(typically in the order of minutes or even hours.)ashow
165 90 gm
2.50091 0. 32 0.25009 0.(Therefore, with MHS \(and other relayed services\) we have to include all the)awidthshow
181 90 gm
-0.06874 0.(information needed for Integrity, Confidentiality, and Authentication \(or Non-Repudia-)ashow
197 90 gm
0.15487 0. 32 0.01548 0.(tion of Origin\) within the message. Only Non-repudiation of Delivery should be done)awidthshow
213 90 gm
0.30349 0. 32 0.03034 0.(with a separate acknowledgement message. With connectionless end-to-end services,)awidthshow
229 90 gm
0.26336 0. 32 0.02633 0.(such as the directory, we can exchange messages in real-time and use, for example, a)awidthshow
245 90 gm
-0.04716 0.(two-way handshake mechanism.)ashow
277 90 gm
-0.01678 0.(In this work the analysis of MHS \(and other relayed services\) is restricted to the layers)ashow
293 90 gm
-0.02561 0.(of OSI and the application part of MHS is only briefly dealt with. The general-purpose)ashow
309 90 gm
-0.09506 0.(secure OSI stack drafted in chapter 4 can be used with MHS and it will make it possible)ashow
325 90 gm
-0.11221 0.(for the communicating MHS agents to mutually authenticate and then communicate in a)ashow
341 90 gm
0.56610 0. 32 0.05661 0.(secure manner. However, since the intermediate agents cannot in general be trusted,)awidthshow
357 90 gm
-0.07194 0.(true security in MHS requires Data Origin Authentication, Integrity and Confidentiality)ashow
373 90 gm
0.89202 0. 32 0.08920 0.(to be implemented within the message being transferred. These arrangements are a)awidthshow
389 90 gm
-0.06350 0.(research area in their own right and beyond the scope of this work.)ashow
421 90 gm
0.10269 0. 32 0.01026 0.(Irrespective of the communications category, a basic requirement in secure communi-)awidthshow
437 90 gm
0.11795 0. 32 0.01179 0.(cations is always the support for a common )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.21026 0. 32 0.02102 0.(Security Context)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.12908 0. 32 0.01290 0.( \(defined in 3.1\) between)awidthshow
453 90 gm
-0.00256 0.(the communicating parties. This includes things such as a mutual understanding of the)ashow
469 90 gm
-0.06729 0.(encryption functions, mechanisms and keys used between the communicating parties at)ashow
485 90 gm
1.14929 0. 32 0.11492 0.(a given point in time at all the of layers OSI. Prior agreements as well as various)awidthshow
501 90 gm
1.01776 0. 32 0.10177 0.(management and negotiation mechanisms can be used in establishing this Security)awidthshow
517 90 gm
-0.10406 0.(Context. In real-time communications we can establish the security context by means of)ashow
533 90 gm
-0.11564 0.(negotiation between the communicating parties \(and possibly others\) whereas in relayed)ashow
549 90 gm
0.98709 0. 32 0.09870 0.(services the security context can only be established by means of prior agreement,)awidthshow
565 90 gm
-0.09407 0.(management, and information included in the one-way message.)ashow
600 90 gm
1 fs
14 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.74998 0.(2.3)ashow
600 126 gm
2.18566 0. 32 0.21856 0.(The Scope of This Study)awidthshow
632 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.00732 0. 32 0.00073 0.(This study deals with secure communications between trusted end-systems through an)awidthshow
648 90 gm
-0.05247 0.(untrusted network \(the arrow between the end-systems in figure 2-1\).)ashow
680 90 gm
-0.00573 0.(In order to protect against the threats posed by the untrusted network, secure protocols)ashow
696 90 gm
0.03570 0. 32 0.00357 0.(between these end systems have to be devised. It is also possible, and sometimes even)awidthshow
712 90 gm
1.06292 0. 32 0.10629 0.(necessary, to involve a trusted third party called the security server in these trans-)awidthshow
728 90 gm
(actions.)show
F T cp
%%Page: ? 23
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(20)show
802 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.56854 0. 32 0.05685 0.(This work concentrates on the threats coming in through the network. Local threats,)awidthshow
117 90 gm
0.77728 0. 32 0.07772 0.(such as )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.59637 0. 32 0.15963 0.(insider threats)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.28656 0. 32 0.02865 0.(, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.66900 0. 32 0.16690 0.(Trojan horses)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.90194 0. 32 0.09019 0.( etc. are beyond the scope of this study. The)awidthshow
133 90 gm
1.85592 0. 32 0.18559 0.(communicating end systems are assumed to be secure and physically protected.)awidthshow
149 90 gm
-0.06825 0.(Referring to the restrictions above, such services as )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.07482 0.(Data Flow Confidentiality)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.04431 0.(, )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.09353 0.(Routing)ashow
165 90 gm
0.12078 0.(Control)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.39611 0. 32 0.03961 0.( and protection against )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.50979 0. 32 0.05097 0.(Denial of Service)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.37139 0. 32 0.03713 0.( are also beyond the scope here \(see)awidthshow
181 90 gm
-0.03575 0.([IS7498-2] for definitions of these threats\).)ashow
213 90 gm
0.21987 0. 32 0.02198 0.(In this study we do not concentrate on cryptography, e.g. the mathematical properties)awidthshow
229 90 gm
1.34078 0. 32 0.13407 0.(of real cryptographic mechanisms are not analyzed. The requirements for various)awidthshow
245 90 gm
0.24566 0. 32 0.02456 0.(mechanisms \(such as )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.06452 0.(symmetric)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.10986 0. 32 0.01098 0.( and )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.43518 0. 32 0.04351 0.(asymmetric cryptosystems)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.05889 0. 32 0.00588 0.(, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.06437 0.(cryptosums)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.10986 0. 32 0.01098 0.( and )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.08900 0.(hash)ashow
261 90 gm
0.04893 0.(functions)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.10131 0. 32 0.01013 0.(, and )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.27282 0. 32 0.02728 0.(digital signature schemes)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.19042 0. 32 0.01904 0.(\) to be used in implementing various security)awidthshow
277 90 gm
0.23101 0. 32 0.02310 0.(functions are stated and mechanisms complying with these requirements are assumed)awidthshow
293 90 gm
1.28280 0. 32 0.12828 0.(and used as basic building blocks of secure open systems. For each such abstract)awidthshow
309 90 gm
0.10742 0. 32 0.01074 0.(mechanism an existing mechanism \(such as DES or RSA\) which is currently believed)awidthshow
325 90 gm
0.09475 0. 32 0.00947 0.(to fulfill these requirements is found \(see Appendix 1\). However, this work is not tied)awidthshow
341 90 gm
-0.10716 0.(to any existing mechanisms and they can be replaced as needed.)ashow
373 90 gm
0.20462 0. 32 0.02046 0.(It is expected that in the future various symmetric and asymmetric cryptosystems and)awidthshow
389 90 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.05412 0.(zero-knowledge schemes)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.04992 0.( will be designed and broken in a continuous struggle between)ashow
405 90 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.07539 0.(cryptographers)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.13305 0. 32 0.01330 0.( and )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.07022 0.(cryptanalysts)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.27297 0. 32 0.02729 0.( \(code makers and code breakers\). This study being)awidthshow
421 90 gm
0.73425 0. 32 0.07342 0.(independent of any specific cryptosystems, new cryptosystems can be adopted with)awidthshow
437 90 gm
-0.10095 0.(only minimal modifications to the security profiles drawn up here.)ashow
469 90 gm
0.25665 0. 32 0.02566 0.(This work deals with the architectural aspects of open systems security. Based on the)awidthshow
485 90 gm
1.10427 0. 32 0.11042 0.(OSI reference model and its associated security framework, answers are sought to)awidthshow
501 90 gm
0.03677 0. 32 0.00367 0.(questions such as what type and level of security is needed \(and feasible\) with various)awidthshow
517 90 gm
1.20513 0. 32 0.12051 0.(real information services, what combination of security functions will provide the)awidthshow
533 90 gm
-0.05464 0.(overall level of security needed with each service, and what layers of the OSI reference)ashow
549 90 gm
-0.07989 0.(model should these functions be placed in.)ashow
581 90 gm
-0.04136 0.(Mechanisms used to realize these functions as well as implementational issues, such as)ashow
597 90 gm
0.10787 0. 32 0.01078 0.(the use of hardware and software in implementing these mechanisms and the implica-)awidthshow
613 90 gm
0.52383 0. 32 0.05238 0.(tions of the chosen software and hardware architecture on the overall security of the)awidthshow
629 90 gm
0.18630 0. 32 0.01863 0.(system, are studied. To facilitate this work, a semiformal security model is developed)awidthshow
645 90 gm
-0.03648 0.(and used to analyze the security functions derived from actual security requirements of)ashow
661 90 gm
-0.01766 0.(real open systems.)ashow
F T cp
%%Page: ? 24
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(21)show
802 288 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
104 90 gm
1 fs
14 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.74998 0.(2.4)ashow
104 126 gm
2.21603 0. 32 0.22160 0.(Approach to the Goals)awidthshow
136 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.25222 0. 32 0.02522 0.(In this work, the security requirements of the three categories of information services)awidthshow
152 90 gm
1.64230 0. 32 0.16423 0.(listed in 2.2 are analyzed. FTAM and Virtual Terminal are used as examples of)awidthshow
168 90 gm
0.60089 0. 32 0.06008 0.(connection-oriented services, the Directory Service and Remote Database Access as)awidthshow
184 90 gm
-0.06217 0.(examples of connectionless real-time services, and the Message Handling System as an)ashow
200 90 gm
-0.06181 0.(example of relayed services. Their required types and levels of security are defined, the)ashow
216 90 gm
0.47103 0. 32 0.04710 0.(combinations of security functions to achieve the required overall security levels are)awidthshow
232 90 gm
-0.00170 0.(found, these functions are placed into the layers of OSI, and mechanisms are specified)ashow
248 90 gm
-0.09561 0.(to implement them \(including cryptosystems and extensions to current protocols\).)ashow
280 90 gm
0.44006 0. 32 0.04400 0.(Based on this analysis, a general purpose OSI protocol stack with built-in security is)awidthshow
296 90 gm
0.60379 0. 32 0.06037 0.(drawn up. This stack can be used with most connection-oriented and connectionless)awidthshow
312 90 gm
-0.03828 0.(end-to-end services and it can also be used to provide "hop-by-hop security" in relayed)ashow
328 90 gm
0.79345 0. 32 0.07934 0.(services such as MHS. The required management services and mechanisms for this)awidthshow
344 90 gm
-0.08389 0.(protocol stack are sketched.)ashow
376 90 gm
-0.04983 0.(For FTAM a complete security profile is drawn up and the ideas presented in this work)ashow
392 90 gm
1.03607 0. 32 0.10360 0.(are tested in practise with a limited working prototype implementation of a secure)awidthshow
408 90 gm
0.59173 0. 32 0.05917 0.(FTAM service. The solutions are evaluated against the initial security requirements,)awidthshow
424 90 gm
-0.08314 0.(possible enhancements are sketched and directions for further work are pointed out.)ashow
F T cp
%%Page: ? 25
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(22)show
802 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
110 90 gm
1 fs
18 fz
bu fc
2 F /|______Times-Bold fnt
bn
(3)show
110 126 gm
2.34603 0. 32 0.23460 0.(On Security Requirements and Functions)awidthshow
143 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.04922 0.(Various information services have different security requirements which can be met by)ashow
159 90 gm
0.38513 0. 32 0.03851 0.(the five security services listed in the OSI Security Architecture [IS7498-2], namely:)awidthshow
175 90 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.10479 0.(Authentication)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.10391 0. 32 0.01039 0.(, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.09533 0.(Integrity)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.10391 0. 32 0.01039 0.(, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.09967 0.(Confidentiality)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.10391 0. 32 0.01039 0.(, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.11444 0.(Non-Repudiation)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.19378 0. 32 0.01937 0.( and )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.63110 0. 32 0.06311 0.(Access Control.)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.34591 0. 32 0.03459 0.( The)awidthshow
191 90 gm
0.00930 0. 32 0.00093 0.(OSI Security Architecture lists these five services and a number of subclasses of each,)awidthshow
207 90 gm
0.24887 0. 32 0.02488 0.(such as )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.10147 0.(Connection)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.12222 0. 32 0.01222 0.( or )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.63461 0. 32 0.06346 0.(Connectionless Integrity)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.05004 0. 32 0.00500 0.( )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.10391 0.(With)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.12222 0. 32 0.01222 0.( or )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.09954 0.(Without)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.05004 0. 32 0.00500 0.( )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.10231 0.(Recovery)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.29998 0. 32 0.02999 0.(, with little)awidthshow
223 90 gm
0.41152 0. 32 0.04115 0.(insight to their significance or the relations between them. Here we shall analyze the)awidthshow
239 90 gm
0.40313 0. 32 0.04031 0.(interdependencies between these services and make some general observations. Also)awidthshow
255 90 gm
-0.11120 0.(some sample services are analyzed with regard to their specific security requirements.)ashow
287 90 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.05261 0.(File Transfer, Access and Management)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.03506 0.( \()ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.07850 0.(FTAM)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.03959 0.(\), the )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.05195 0.(Directory)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.04399 0.(, and )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.06036 0.(Message Handling)ashow
303 90 gm
-0.02246 0.(System)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
( \()show
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.03323 0.(MHS)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.01972 0.(\) were chosen as the sample services for the following reasons:)ashow
335 90 gm
(-)show
335 126 gm
0.27740 0. 32 0.02774 0.(All of these services are already rather mature \(implementations do exist\) and)awidthshow
351 126 gm
-0.10655 0.(seem to be useful in real life in the near future.)ashow
383 90 gm
(-)show
383 126 gm
0.18798 0. 32 0.01879 0.(These three services represent the three categories of services described in 2.2)awidthshow
399 126 gm
-0.12332 0.(and a closer analysis of them should reveal something applicable to virtually any)ashow
415 126 gm
-0.11952 0.(application.)ashow
447 90 gm
-0.02650 0.(Even though the term )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.02531 0.(Security Service)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.02470 0.( is used in the OSI Security Architecture, it does)ashow
463 90 gm
0.24261 0. 32 0.02426 0.(not mean a service in the normal OSI sense of the word. In the OSI Reference Model)awidthshow
479 90 gm
-0.04541 0.(the term )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.04699 0.(\(N\)-service)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.04528 0.( is defined as: "A capability of the \(N\)-layer and the layers beneath)ashow
495 90 gm
0.37719 0. 32 0.03771 0.(it, which is provided to \(N+1\)-entities at the boundary between the \(N\)-layer and the)awidthshow
511 90 gm
0.77651 0. 32 0.07765 0.(\(N+1\)-layer" at an )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.20483 0.(\(N\)-service-access-point)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.74615 0. 32 0.07461 0.( [X.200] by means of \(conceptual\) )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.27767 0.(\(N\)-)ashow
527 90 gm
0.01472 0.(service-primitives)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.07476 0. 32 0.00747 0.( [X.210].)awidthshow
559 90 gm
0.34057 0. 32 0.03405 0.(However, in the Security Architecture addendum of OSI [IS7498-2] )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.49697 0. 32 0.04969 0.(Security Service)awidthshow
575 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.05783 0.(means a more abstract kind of functionality provided by the entire OSI system. An OSI)ashow
591 90 gm
-0.08441 0.(Security Service, in the sense it is being used in the OSI Security Architecture, need not)ashow
607 90 gm
0.07263 0. 32 0.00726 0.(show at all in the service interface of any layer. The use of a Security Service, such as)awidthshow
623 90 gm
-0.08471 0.(Confidentiality, may be dictated by a )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.08654 0.(Security Policy)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.08717 0.( and enforced by )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.10713 0.(Systems Manage-)ashow
639 90 gm
-0.05598 0.(ment )ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.05325 0.(without the user knowing anything about this.)ashow
671 90 gm
0.87158 0. 32 0.08715 0.(Therefore, it would be more appropriate to talk about )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.56539 0. 32 0.15653 0.(Security Functions)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.82656 0. 32 0.08265 0.( when we)awidthshow
687 90 gm
-0.07463 0.(mean security as a part of the overall quality of service provided by the OSI system and)ashow
703 90 gm
0.53695 0. 32 0.05369 0.(reserve the word )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.90835 0. 32 0.09083 0.(Security Service)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.57342 0. 32 0.05734 0.( to mean services offered at the boundary between)awidthshow
719 90 gm
0.22537 0. 32 0.02253 0.(two OSI layer by means of service primitives. This practise is followed hereinafter in)awidthshow
735 90 gm
0.33203 0. 32 0.03320 0.(this study.)awidthshow
F T cp
%%Page: ? 26
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(23)show
802 288 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.08990 0.(Definitions of some terms used in this study:)ashow
133 90 gm
(-)show
133 126 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.08421 0.(\(N\) Security Service:)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.08187 0.( a security-related capability of the \(N\)-layer and the layers)ashow
149 126 gm
-0.09182 0.(beneath it, provided to \(N+1\)-entities at the boundary between the \(N\)-layer and)ashow
165 126 gm
-0.07225 0.(the \(N+1\)-layer by means of service primitives.)ashow
197 90 gm
(-)show
197 126 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.30508 0. 32 0.13050 0.(\(N\) Security Function:)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.03057 0. 32 0.10305 0.( a security-related function, enhancing the quality of)awidthshow
213 126 gm
0.43518 0. 32 0.04351 0.(service provided by the \(N\)-layer, controlled by the control part of \(N\)-entity)awidthshow
229 126 gm
-0.09750 0.(and activated at the request of the user of the \(N\)-service or by systems manage-)ashow
245 126 gm
(ment.)show
277 90 gm
(-)show
277 126 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.31677 0. 32 0.03167 0.(\(N\) Security Mechanism:)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.18692 0. 32 0.01869 0.( a mechanism at the \(N\)-layer realizing \(a part of\) an)awidthshow
293 126 gm
-0.02935 0.(\(N\) security function.)ashow
328 90 gm
1 fs
14 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.74998 0.(3.1)ashow
328 126 gm
2.86773 0. 32 0.28677 0.(A Security Model)awidthshow
360 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.10681 0. 32 0.01068 0.(A layer entity A)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(N)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.09887 0. 32 0.00988 0.( \(entity in system A at layer N\) is depicted in figure 3-1, below. The)awidthshow
376 90 gm
-0.11817 0.(entity is divided into the following parts:)ashow
408 90 gm
(-)show
408 126 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.13111 0.(Control Part)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.12062 0.( realizing the protocol logic and controlling the use of functions and)ashow
424 126 gm
-0.03407 0.(variables.)ashow
456 90 gm
(-)show
456 126 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.41511 0.(Mechanisms)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.25427 0. 32 0.12542 0.( controlled by the control part, operating on the variables and)awidthshow
472 126 gm
-0.08569 0.(realizing functions.)ashow
504 90 gm
(-)show
504 126 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.15504 0.(Variables)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.14241 0.( most of which are local to each entity instance.)ashow
536 90 gm
0.19531 0. 32 0.01953 0.(The Control Part is usually modelled as a state machine. In the C-VOPS environment)awidthshow
552 90 gm
1.30386 0. 32 0.13038 0.(an Extended Finite State Automaton \(EFSA\) is used to model and implement the)awidthshow
568 90 gm
(Control Part [Kar87].)show
600 90 gm
0.28991 0. 32 0.02899 0.(Mechanisms include three major groups, each realizing one interface of the \(N\) layer)awidthshow
616 90 gm
-0.27705 0.(entity:)ashow
648 90 gm
(-)show
648 126 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.91802 0. 32 0.19180 0.(Upper Interface Mechanisms)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.07910 0. 32 0.10791 0.(, realizing the interface to layer N+1 \(the \(N\))awidthshow
664 126 gm
-0.08824 0.(Service Interface\).)ashow
696 90 gm
(-)show
696 126 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.27380 0. 32 0.12738 0.(Lower Interface Mechanisms)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.72906 0. 32 0.07290 0.(, realizing the interface to layer N-1 \(the \(N-1\))awidthshow
712 126 gm
-0.08824 0.(Service Interface\).)ashow
744 90 gm
(-)show
744 126 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.15216 0.(Protocol Mechanisms)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.125 0.(, realizing the protocol interface to the peer entity.)ashow
F T cp
%%Page: ? 27
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(24)show
802 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
0 0 pen
272 206 gm
(nc 88 91 334 503 6 rc)kp
62 gr
272 206 lin
0.969  60 45 {dup mul exch dup mul add 1.0 exch sub }setscreen setgray
121 188 299 419 1 rc
2 2 pen
0 gr
121 188 299 419 0 rc
0 0 pen
60 gr
272 206 lin
0.937  60 45 {dup mul exch dup mul add 1.0 exch sub }setscreen setgray
166 257 242 362 1 rc
2 2 pen
0 gr
167 258 241 361 0 rc
1 1 pen
166 258 gm
166 418 lin
256 258 gm
256 418 lin
259 434 246 412 th
189 288 gm
1.50634 0 rmoveto
1 setTxMode
1 fs
12 fz
bu fc
2 F /|______Times-Bold fnt
bn
(Control)show
200 297 gm
0.17529 0 rmoveto
(Part)show
tu
ts
148 284 gm
0 fs
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.13449 0.(Interface Mechanisms)ashow
tu
ts
283 285 gm
-0.13449 0.(Interface Mechanisms)ashow
tu
ts
201 376 gm
0.05908 0 rmoveto
(Protocol)show
212 367 gm
-0.05998 0.(Mechanisms)ashow
tu
ts
116 259 gm
-0.16851 0.(\(N\) Service Interface)ashow
tu
ts
312 251 gm
-0.16806 0.(\(N-1\) Service Interface)ashow
tu
ts
199 428 gm
0.05908 0 rmoveto
(Protocol)show
211 427 gm
-0.31437 0.(Interface)ashow
tu
ts
188 150 gm
-0.25537 0.(Manage-)ashow
199 157 gm
0.00244 0 rmoveto
(ment)show
211 150 gm
-0.31437 0.(Interface)ashow
tu
0 gr
207 454 230 476 160 200 1 ar
207 411 230 434 340 380 1 ar
218 433 gm
218 455 lin
ts
215 475 gm
0.78808 0 rmoveto
1 setTxMode
1 fs
bu fc
2 F /|______Times-Bold fnt
bn
(Peer)show
227 472 gm
2.16870 0 rmoveto
(Entity)show
tu
ts
215 105 gm
3.28442 0 rmoveto
(Systems)show
227 95 gm
2.45556 0 rmoveto
(Management)show
tu
ts
100 320 gm
3.69018 0 rmoveto
(Layer \(N+1\))show
tu
ts
328 321 gm
3.37548 0 rmoveto
(Layer \(N-1\))show
tu
0 gr
207 138 230 160 340 380 1 ar
207 173 230 195 160 200 1 ar
218 174 gm
218 159 lin
64 gr
227 370 251 413 1 rc
1 2 lw
0 gr
227.5 370.5 250.5 412.5 0 rc
1 1 lw
0 0 pen
218 159 lin
ts
236 383 gm
0.03198 0 rmoveto
1 setTxMode
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(Sec.)show
248 379 gm
-0.06651 0.(Mech.)ashow
tu
64 gr
128 378 155 413 1 rc
1 2 lw
1 1 pen
0 gr
128.5 378.5 154.5 412.5 0 rc
1 1 lw
0 0 pen
239 383 gm
239 383 lin
64 gr
131 383 154 409 1 rc
ts
139 388 gm
0.03198 0 rmoveto
1 setTxMode
(Sec.)show
151 383 gm
-0.06651 0.(Mech.)ashow
tu
64 gr
266 378 293 413 1 rc
1 2 lw
1 1 pen
0 gr
266.5 378.5 292.5 412.5 0 rc
1 1 lw
0 0 pen
142 388 gm
142 388 lin
64 gr
268 383 291 409 1 rc
ts
277 388 gm
0.03198 0 rmoveto
1 setTxMode
(Sec.)show
288 383 gm
-0.06651 0.(Mech.)ashow
tu
0 gr
93 335 116 358 68 108 1 ar
127 336 150 359 248 288 1 ar
1 1 pen
128 346 gm
114 346 lin
306 335 328 358 250 290 1 ar
273 335 296 358 70 110 1 ar
295 346 gm
306 346 lin
64 gr
206 280 233 338 1 rc
1 2 lw
0 gr
206.5 280.5 232.5 337.5 0 rc
1 1 lw
0 0 pen
306 346 lin
64 gr
209 291 231 325 1 rc
ts
217 291 gm
1 setTxMode
-0.04576 0.(Security)ashow
229 293 gm
0.22290 0 rmoveto
(Control)show
tu
1 2 lw
1 1 pen
168 361 gm
0 gr
256 361 lin
1 1 lw
0 0 pen
256 361 lin
ts
252 282 gm
2.50927 0 rmoveto
1 setTxMode
1 fs
12 fz
bu fc
2 F /|______Times-Bold fnt
bn
(Mechanisms)show
tu
ts
116 354 gm
0 fs
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.21411 0.(\(N\)-interface-data-units)ashow
tu
ts
312 354 gm
-0.21011 0.(\(N-1\)-interface-data-units)ashow
tu
ts
236 421 gm
-0.15434 0.(\(N\)-protocol-)ashow
248 428 gm
-0.15876 0.(data-units)ashow
tu
2 2 pen
121 257 gm
0 gr
298 257 lin
ts
211 199 gm
1.83935 0 rmoveto
1 setTxMode
1 fs
12 fz
bu fc
2 F /|______Times-Bold fnt
bn
(Variables)show
tu
64 gr
250 193 294 252 1 rc
1 2 lw
1 1 pen
0 gr
250.5 193.5 293.5 251.5 0 rc
1 1 lw
0 0 pen
214 199 gm
214 199 lin
ts
269 206 gm
1 setTxMode
0 fs
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.04576 0.(Security)ashow
281 203 gm
-0.16352 0.(Variables)ashow
tu
1 1 pen
363 90 gm
(nc 30 28 811 566 6 rc)kp
2 fs
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
-0.26438 0.(Figure 3-1:)ashow
363 162 gm
-0.13973 0.(OSI layer N entity security architecture.)ashow
394 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.48828 0. 32 0.04882 0.(Formally, layer entity A)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.16413 0.(N)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.31723 0. 32 0.03172 0.( can be modelled as a triplet: )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.13638 0.(\(C)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.13888 0.(A)ashow
0 1 rm
9 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.13647 0.(N)ashow
0 -3 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.11743 0.(,V)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.13888 0.(A)ashow
0 1 rm
9 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.13647 0.(N)ashow
0 -3 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.14770 0.(,M)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.13888 0.(A)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.09078 0.(\))ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.36315 0. 32 0.03631 0.(, where C)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.16413 0.(A)ashow
0 1 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.14772 0.(N)ashow
0 -3 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.20843 0. 32 0.02084 0.( is)awidthshow
410 90 gm
-0.03565 0.(the control logic, V)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.05519 0.(A)ashow
0 1 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
(N)show
0 -3 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.03483 0.( is the set of variables, and M)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.05519 0.(A)ashow
0 1 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
(N)show
0 -3 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.03694 0.( is the set of mechanisms of A)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.05519 0.(N)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(.)show
427 90 gm
0.15609 0. 32 0.01560 0.(The set of variables of layer entity A)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.06906 0.(N)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.10803 0. 32 0.01080 0.( is the union of the set of )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.31311 0. 32 0.03131 0.(Protocol Variables)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.10360 0. 32 0.01036 0.( of)awidthshow
443 90 gm
-0.16235 0.(entity A)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.24047 0.(N)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.14636 0.( and the set of )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.16464 0.(Security Variables)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.15263 0.( of entity A)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.24047 0.(N)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(:)show
474 90 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.41249 0.(V)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.34375 0.(A)ashow
0 1 rm
9 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.33781 0.(N)ashow
0 -3 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.50247 0. 32 0.05024 0.( = V)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.34375 0.(A)ashow
0 1 rm
9 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.33781 0.(N)ashow
0 -1 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.24221 0.(,P)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.15350 0. 32 0.01535 0.( )awidthshow
bu fc
{}mark T /Helvetica-Oblique /|______Helvetica-Oblique 0 rf
bn
bu fc
2 F /|______Helvetica-Oblique fnt
bn
0.48750 0.(U)ashow
bu fc
2 F /|______Times-Italic fnt
bn
0.48446 0. 32 0.04844 0.( V)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.34375 0.(A)ashow
0 1 rm
9 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.33781 0.(N)ashow
0 -1 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.42205 0.(,S)ashow
507 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.10069 0.(The set of security variables of application instance A is the union of the sets of security)ashow
523 90 gm
-0.11557 0.(variables of all of its layers 4 through 7 and the security variables of the application:)ashow
554 90 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.45410 0.(V)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.28102 0.(A,S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.46691 0. 32 0.04669 0.( = \()awidthshow
bu fc
2 F /|______Helvetica-Oblique fnt
bn
0.53668 0.(U)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.27290 0.(i=4,7)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.45410 0.(V)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.37841 0.(A)ashow
0 1 rm
9 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.15490 0.(i)ashow
0 -1 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.23231 0.(,S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.26916 0. 32 0.02691 0.( \) )awidthshow
bu fc
2 F /|______Helvetica-Oblique fnt
bn
0.53668 0.(U)ashow
bu fc
2 F /|______Times-Italic fnt
bn
0.53329 0. 32 0.05332 0.( V)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.37841 0.(A)ashow
0 1 rm
9 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.34057 0.(A)ashow
0 -1 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.46463 0.(,S)ashow
587 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.17501 0. 32 0.01750 0.(Similarly, the set of mechanisms of layer entity A)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.06874 0.(N)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.10757 0. 32 0.01075 0.( is the union of the set of )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.05711 0.(Protocol)ashow
603 90 gm
-0.02159 0.(Mechanisms)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.01467 0.(, the set of )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.01913 0.(Interface Mechanisms)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.01467 0.(, the set of )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.01939 0.(Security Mechanisms)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.01844 0.(, and the)ashow
619 90 gm
-0.11621 0.(set of other mechanisms of A)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.16667 0.(N)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(:)show
650 90 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.38029 0.(M)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.23245 0.(A)ashow
0 1 rm
9 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.22843 0.(N)ashow
0 -3 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.38192 0. 32 0.03819 0.( = M)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.23245 0.(A)ashow
0 1 rm
9 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.22843 0.(N)ashow
0 -1 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.16380 0.(,P)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.10375 0. 32 0.01037 0.( )awidthshow
bu fc
2 F /|______Helvetica-Oblique fnt
bn
0.32968 0.(U)ashow
bu fc
2 F /|______Times-Italic fnt
bn
0.41198 0. 32 0.04119 0.( M)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.23245 0.(A)ashow
0 1 rm
9 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.22843 0.(N)ashow
0 -1 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.11088 0.(,I)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.10375 0. 32 0.01037 0.( )awidthshow
bu fc
2 F /|______Helvetica-Oblique fnt
bn
0.32968 0.(U)ashow
bu fc
2 F /|______Times-Italic fnt
bn
0.41198 0. 32 0.04119 0.( M)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.23245 0.(A)ashow
0 1 rm
9 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.22843 0.(N)ashow
0 -1 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.14271 0.(,S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.10375 0. 32 0.01037 0.( )awidthshow
bu fc
2 F /|______Helvetica-Oblique fnt
bn
0.32968 0.(U)ashow
bu fc
2 F /|______Times-Italic fnt
bn
0.41198 0. 32 0.04119 0.( M)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.23245 0.(A)ashow
0 1 rm
9 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.22843 0.(N)ashow
0 -1 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.18493 0.(,O)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
(.)show
683 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.03312 0.(Security variables include key values and information controlling the selection and use)ashow
699 90 gm
-0.02938 0.(of various security mechanisms. The values of security variables can be set by systems)ashow
715 90 gm
-0.06994 0.(management \(as dictated by the security policy\) or as a result of negotiation at an upper)ashow
731 90 gm
0.62942 0. 32 0.06294 0.(layer of OSI, or the control part of the layer entity \(as a result of negotiation or key)awidthshow
747 90 gm
-0.06686 0.(exchange within layer N\).)ashow
F T cp
%%Page: ? 28
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(25)show
802 288 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
2 fs
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.09902 0. 32 0.00990 0.(Layer N Security Context)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.07995 0. 32 0.00799 0.( between the layer entity instances A)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.01831 0.(N,i)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.05294 0. 32 0.00529 0.( and B)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.01831 0.(N,j)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.06332 0. 32 0.00633 0.( can now be)awidthshow
117 90 gm
-0.13796 0.(formally defined as:)ashow
148 90 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.60803 0.(SC)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.53044 0.(A)ashow
0 1 rm
9 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.31126 0.(N,i)ashow
0 -1 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.37376 0.(,B)ashow
0 1 rm
9 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.31126 0.(N,j)ashow
0 -3 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.88302 0. 32 0.08830 0.( = \(V)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.53044 0.(A)ashow
0 1 rm
9 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.31126 0.(N,i)ashow
0 -1 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.32565 0.(,S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.89035 0. 32 0.08903 0.(, V)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.53044 0.(B)ashow
0 1 rm
9 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.31126 0.(N,j)ashow
0 -1 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.32565 0.(,S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
(\))show
181 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.31753 0. 32 0.03175 0.(To be usable in real communications, a security context has to include a lot of things)awidthshow
197 90 gm
0.05233 0. 32 0.00523 0.(left implicit in this definition. For example, we need to have a common understanding)awidthshow
213 90 gm
-0.08735 0.(of the cryptographic mechanisms employed, their modes of operation, the initial default)ashow
229 90 gm
0.25817 0. 32 0.02581 0.(security context etc. Many of these aspects belong to the domain of security manage-)awidthshow
245 90 gm
0.04989 0. 32 0.00498 0.(ment. In this study we shall assume that the security related variables contain not only)awidthshow
261 90 gm
-0.04750 0.(such information as key values etc. but also control information used to select and acti-)ashow
277 90 gm
0.24719 0. 32 0.02471 0.(vate the appropriate cryptographic mechanisms. Further elaboration of the concept of)awidthshow
293 90 gm
-0.07604 0.(security context is left outside the scope of this study.)ashow
325 90 gm
1.40960 0. 32 0.14096 0.(Because in this study we are interested in secure communications between entire)awidthshow
341 90 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.77368 0. 32 0.17736 0.(application instances)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.90270 0. 32 0.09027 0.( as defined in section 2.1.2 \(see figure 2-1\), not in individual)awidthshow
357 90 gm
-0.11671 0.(layers of the OSI model, we also need to define the security context between application)ashow
373 90 gm
-0.08287 0.(instances. We therefore define the security context between application instances A and)ashow
389 90 gm
-0.12333 0.(B \(at all the layers 4 through 7 and the application\) as:)ashow
421 90 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.51925 0.(SC)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.36378 0.(A,B)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.75408 0. 32 0.07540 0.( = \(V)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.33639 0.(A,S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.76034 0. 32 0.07603 0.(, V)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.33639 0.(B,S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
(\))show
453 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.22033 0. 32 0.02203 0.(The respective systems managements, in cooperation with the Control Parts of all the)awidthshow
469 90 gm
0.38497 0. 32 0.03849 0.(OSI layers 4 through 7, are responsible for negotiating the Security Context between)awidthshow
485 90 gm
1.29272 0. 32 0.12927 0.(two application instances, using the Security Mechanisms to perform the selected)awidthshow
501 90 gm
0.14190 0. 32 0.01419 0.(Security Functions within this Security Context, and releasing the Security Context at)awidthshow
517 90 gm
-0.04537 0.(the end of communications. The life span of a security context can now be divided into)ashow
533 90 gm
-0.02127 0.(three consecutive phases: )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.02261 0.(Set-up)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(, )show
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.02751 0.(Use)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.02064 0.( and )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.02297 0.(Termination.)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.02210 0.( More formally, we shall write:)ashow
549 90 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.03018 0.(Set-up\(SC)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.02738 0.(A,B)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
(\))show
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.05203 0. 32 0.00520 0.( and )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.03132 0.(Terminate\(SC)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.02738 0.(A,B)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
(\))show
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.10452 0. 32 0.01045 0.( for these two operations.)awidthshow
581 90 gm
1.34063 0. 32 0.13406 0.(A Security Context can be set up by means of prior agreement, management and)awidthshow
597 90 gm
0.16601 0. 32 0.01660 0.(negotiation. It is possible to negotiate several Security Contexts, label them \(e.g. with)awidthshow
613 90 gm
0.30883 0. 32 0.03088 0.(small integers\) and manage them in much the same way as Presentation Contexts are)awidthshow
629 90 gm
-0.11880 0.(managed at the Presentation Layer.)ashow
661 90 gm
0.56900 0. 32 0.05690 0.(Security functions can be )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.18080 0.(Autonomous)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.47790 0. 32 0.04779 0.(, that is they only show to the security profile)awidthshow
677 90 gm
0.03601 0. 32 0.00360 0.(and need not be activated by the user \(they are either always active or are activated by)awidthshow
693 90 gm
1.38381 0. 32 0.13838 0.(the systems management guided by the )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
2.04803 0. 32 0.20480 0.(Security Policy)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.62042 0. 32 0.06204 0.(\), or )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.34860 0.(Activatable)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.66107 0. 32 0.16610 0.( \(security)awidthshow
709 90 gm
0.28549 0. 32 0.02854 0.(services\), meaning that their use is negotiated and controlled by the service user with)awidthshow
725 90 gm
-0.11711 0.(service primitives and their parameters.)ashow
F T cp
%%Page: ? 29
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(26)show
802 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(A )show
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.01284 0.(layer entity)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.01214 0.( is a static type definition of )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.01315 0.(layer entity instances)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.01422 0.( which together consti-)ashow
117 90 gm
0.39062 0. 32 0.03906 0.(tute a class. The layer entity A)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.17735 0.(N)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.41320 0. 32 0.04132 0.( is like a program which can be invoked many times)awidthshow
133 90 gm
-0.02696 0.(over whereas the layer entity instance A)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.02333 0.(N,i)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.02688 0.( is a dynamic invocation of such a type, like)ashow
149 90 gm
-0.05531 0.(a process executing the program. In OSI both types and instances of layer entities carry)ashow
165 90 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.16333 0. 32 0.11633 0.(distinguishable names)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.54367 0. 32 0.05436 0.(. Usually it is clear from the context when we are referring to)awidthshow
181 90 gm
0.15457 0. 32 0.01545 0.(types and when instances of layer entities. From here on, we shall talk about an )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.04962 0.(entity)ashow
197 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.13636 0.(meaning either an entity )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.13714 0.(class)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.12380 0.( or an entity )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.14285 0.(instance)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.13708 0.(. When it is not clear from the context)ashow
213 90 gm
-0.10061 0.(which we mean, the distinction is made explicitly.)ashow
245 90 gm
1.01196 0. 32 0.10119 0.(When establishing an )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.25189 0.(\(N\)-connection)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.44189 0. 32 0.04418 0.(, the )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.24667 0.(\(N\)-user)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.63568 0. 32 0.06356 0.( issues and )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.26058 0.(\(N\)-connect-request)ashow
261 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.31600 0. 32 0.03160 0.(\(\(N\)-CR\) primitive to an )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.08322 0.(\(N\)-service-access-point)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.24749 0. 32 0.02474 0.( \(\(N\)SAP\) of the )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.08428 0.(\(N\)-service-inter-)ashow
277 90 gm
(face)show
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.00550 0.(. This service request typically invokes a new instance of the \(N\)-entity, dedicated)ashow
293 90 gm
1.06063 0. 32 0.10606 0.(to serving this one instance of communications, which immediately issues an )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.35208 0.(\(N\)-)ashow
309 90 gm
(connection-request)show
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(  \(\(N\)CR\) )show
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
(Protocol Data Unit)show
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.00503 0. 32 0.00050 0.( \(PDU\) to its peer entity. At the other)awidthshow
325 90 gm
-0.06167 0.(end system, the \(N\)CR PDU invokes a new instance of the \(N\)-entity, also dedicated to)ashow
341 90 gm
0.38833 0. 32 0.03883 0.(serving this one instance of communications. All PDUs on this connection now flow)awidthshow
357 90 gm
0.85464 0. 32 0.08546 0.(between these two peer entity instances \(called )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.47720 0. 32 0.14772 0.(correspondent entities)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.84640 0. 32 0.08464 0.(\) and service)awidthshow
373 90 gm
0.61782 0. 32 0.06178 0.(primitives of this connection at the )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.18016 0.(connection-end-points)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.80093 0. 32 0.08009 0.( \(CEPs\), distinguished by)awidthshow
389 90 gm
-0.08699 0.(their )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.10136 0.(connection-end-point-identifiers)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.09934 0.( \(CEPIs\), are directed to and issued by these entity)ashow
405 90 gm
(instances.)show
437 90 gm
0.94390 0. 32 0.09439 0.(Communications can only occur between layer entity )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.21887 0.(instances)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.82000 0. 32 0.08200 0.( and, therefore, e.g.)awidthshow
453 90 gm
0.42373 0. 32 0.04237 0.(connections, associations and security contexts cannot exist between entity types but)awidthshow
469 90 gm
0.12680 0. 32 0.01268 0.(always between pairs of layer entity instances. In a real open system, each instance of)awidthshow
485 90 gm
0.20156 0. 32 0.02015 0.(the same layer entity type executes independently of all other instances. This implies,)awidthshow
501 90 gm
-0.09527 0.(for example, that they have their own sets of variable instances \(local variables\).)ashow
533 90 gm
-0.05633 0.(While there is nothing in the OSI reference model explicitly denying us from establish-)ashow
549 90 gm
0.68557 0. 32 0.06855 0.(ing connections between specific instances of entities \(if we know their names\), we)awidthshow
565 90 gm
1.15447 0. 32 0.11544 0.(usually only are interested in entity types when opening a connection. In fact, the)awidthshow
581 90 gm
0.19134 0. 32 0.01913 0.(current OSI protocols do not allow us to address individual entity instances. After the)awidthshow
597 90 gm
-0.02439 0.(connection is established, we never need to explicitly refer to entity instances, but they)ashow
613 90 gm
0.06072 0. 32 0.00607 0.(are associated with the connection-end-points of this connection at the respective \(N\)-)awidthshow
629 90 gm
-0.04437 0.(service-access-points.)ashow
661 90 gm
0.67916 0. 32 0.06791 0.(With connectionless services the situation is essentially the same \320 we only need to)awidthshow
677 90 gm
1.21459 0. 32 0.12145 0.(know the address of the other party and issue a service request to the appropriate)awidthshow
693 90 gm
0.22425 0.(\(N\)SAP.)ashow
725 90 gm
-0.10968 0.(Here again we suffer from the connection-oriented tradition of the OSI reference model.)ashow
741 90 gm
0.36346 0. 32 0.03634 0.(It would be more appropriate to adopt the concept of )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.10797 0.(association)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.41122 0. 32 0.04112 0.(, originally born for)awidthshow
757 90 gm
-0.08843 0.(use in the application layer \()ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.09509 0.(application association)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.09658 0.(\), which does not make a distinction)ashow
F T cp
%%Page: ? 30
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(27)show
802 288 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
85 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.03112 0. 32 0.00311 0.(between connection-oriented and connectionless communications. An )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.00617 0.(\(N\)-association)ashow
101 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.01309 0.(is established between two entity instances at layer N in order to facilitate their mutual)ashow
117 90 gm
1.32781 0. 32 0.13278 0.(communication. \(N\)-association can be supported by an \(N-1\)-connection or con-)awidthshow
133 90 gm
1.56265 0. 32 0.15626 0.(nectionless \(N-1\)-service. It is evident, that the OSI reference model is evolving)awidthshow
149 90 gm
0.36682 0. 32 0.03668 0.(towards equally supporting connection-oriented and connectionless communications.)awidthshow
165 90 gm
0.60134 0. 32 0.06013 0.(One example of this development is the connectionless )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.88256 0. 32 0.08825 0.(Association Control Service)awidthshow
181 90 gm
-0.07112 0.(Element)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.04428 0.( \()ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.09075 0.(ACSE)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.06188 0.(\) of the application layer defined in [IS8649/A2] and [IS10035].)ashow
216 90 gm
1 fs
14 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.74998 0.(3.2)ashow
216 126 gm
3.92715 0. 32 0.39271 0.(Security Requirements)awidthshow
248 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.74295 0. 32 0.07429 0.(Here the requirements are seen mainly from the user's point of view. When using a)awidthshow
264 90 gm
-0.07722 0.(connection-oriented information service across the network, the user may need to know)ashow
280 90 gm
-0.09353 0.(one or more of the following:)ashow
310 90 gm
(-)show
310 126 gm
0.10742 0. 32 0.01074 0.(That the identity of the other party is that claimed and that it remains the same)awidthshow
326 126 gm
(throughout the session.)show
356 90 gm
(-)show
356 126 gm
-0.06617 0.(That nobody else can listen to \(and understand\) the session.)ashow
386 90 gm
(-)show
386 126 gm
1.01516 0. 32 0.10151 0.(That nobody can undetected delete from, change, or add to the information)awidthshow
402 126 gm
(transferred.)show
432 90 gm
(-)show
432 126 gm
1.28540 0. 32 0.12854 0.(That commitments made during the session can, beyond reasonable doubt,)awidthshow
448 126 gm
-0.09291 0.(afterwards be proved to an impartial judge.)ashow
480 90 gm
-0.09494 0.(Similarly, the service provider may need to know the same plus the following:)ashow
510 90 gm
(-)show
510 126 gm
-0.12135 0.(That nobody except the legitimate users can access the service.)ashow
540 90 gm
(-)show
540 126 gm
0.02441 0. 32 0.00244 0.(That the service provider can, if necessary, prove to an impartial judge that the)awidthshow
556 126 gm
-0.06672 0.(user actually has used the services he is charged for.)ashow
588 90 gm
0.48370 0. 32 0.04837 0.(In OSI terminology [IS7498-2], the five security functions needed to provide for the)awidthshow
604 90 gm
0.14526 0. 32 0.01452 0.(five first requirements stated above are called )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.21514 0. 32 0.02151 0.(Peer Entity Authentication)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(, )show
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.04756 0.(Connection)ashow
620 90 gm
0.12413 0.(Confidentiality)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.12939 0. 32 0.01293 0.(, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.85906 0. 32 0.08590 0.(Connection Integrity)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.12939 0. 32 0.01293 0.(, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.13792 0.(Non-repudiation)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.26184 0. 32 0.02618 0.(, and )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.78643 0. 32 0.07864 0.(Access Control)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.58380 0. 32 0.05838 0.(, respec-)awidthshow
636 90 gm
0.30166 0. 32 0.03016 0.(tively. In the case of connection-oriented communications, a Security Context can be)awidthshow
652 90 gm
-0.08663 0.(set-up when establishing the connection and remain in effect throughout the session.)ashow
684 90 gm
1.22070 0. 32 0.12207 0.(With services not based on an end-to-end connection between the communicating)awidthshow
700 90 gm
2.00881 0. 32 0.20088 0.(parties, the situation is somewhat different. With these services, connectionless)awidthshow
716 90 gm
1.35742 0. 32 0.13574 0.(versions of the above functions are needed, such as )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
2.23617 0. 32 0.22361 0.(Data Origin Authentication)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(,)show
732 90 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.86456 0. 32 0.08645 0.(Connectionless Confidentiality)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.23605 0. 32 0.02360 0.(, and )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.80673 0. 32 0.08067 0.(Connectionless Integrity)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.35385 0. 32 0.03538 0.(. Also, since there is no)awidthshow
F T cp
%%Page: ? 31
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(28)show
802 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
85 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.09759 0.(connection, there cannot be a Security Context associated with a connection but rather a)ashow
101 90 gm
-0.08877 0.(Security Context has to be associated with each message or request-reply pair.)ashow
133 90 gm
1 fs
bu fc
2 F /|______Times-Bold fnt
bn
1.75003 0.(3.2.1)ashow
133 126 gm
2.59811 0. 32 0.25981 0.(Security Requirements of FTAM)awidthshow
165 90 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.07437 0. 32 0.10743 0.(File Transfer, Access and Management)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.25177 0. 32 0.02517 0.( \()awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.33840 0.(FTAM)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.86212 0. 32 0.08621 0.(\) [IS8571-1] is a typical end-to-end)awidthshow
181 90 gm
1.07666 0. 32 0.10766 0.(service, where layers 4 through 7 communicate in real time, on-line from one end)awidthshow
197 90 gm
-0.09625 0.(system to the other. FTAM is currently the most mature connection-oriented service but)ashow
213 90 gm
1.09237 0. 32 0.10923 0.(results obtained here should be rather easily applicable to such services as Virtual)awidthshow
229 90 gm
-0.00221 0.(Terminal \(VT\) [IS9040], Job Transfer and Manipulation \(JTM\) [IS8831, IS8832], and)ashow
245 90 gm
0.44265 0. 32 0.04426 0.(Reliable Transfer \(RTS\) [IS9066-1,2, X.218, X.228].)awidthshow
277 90 gm
-0.02093 0.(In FTAM the concept of a file store is generalized and the real file systems residing on)ashow
293 90 gm
-0.06416 0.(various host systems are mapped into a global Virtual File Store [IS8571-2] where files)ashow
309 90 gm
-0.10900 0.(can be accessed independently of their physical locations.)ashow
341 90 gm
0.63507 0. 32 0.06350 0.(In real file systems we need to give individual users and user groups various access)awidthshow
357 90 gm
-0.02032 0.(rights to each file. Usually, we can specify for each file what users and user groups are)ashow
373 90 gm
0.37841 0. 32 0.03784 0.(allowed to read, write, execute or delete it. The local operating system is responsible)awidthshow
389 90 gm
0.64239 0. 32 0.06423 0.(for enforcing these restrictions on the user of files. Local access control is based on)awidthshow
405 90 gm
0.10208 0. 32 0.01020 0.(user IDs and the user authentication scheme used by the operating system. The access)awidthshow
421 90 gm
-0.00610 0.(control mechanism can be implemented by associating an access control list with each)ashow
437 90 gm
-0.12847 0.(file or by assigning appropriate capabilities to each legitimate user.)ashow
0 0 pen
659 105 gm
(nc 456 148 713 444 6 rc)kp
60 gr
659 105 lin
0.937  60 45 {dup mul exch dup mul add 1.0 exch sub }setscreen setgray
513 205 656 382 25 25 1 rr
2 2 pen
0 gr
514 206 655 381 24 24 0 rr
64 gr
522 222 562 282 1 rc
1 1 pen
0 gr
522.5 222.5 561.5 281.5 0 rc
538 231 gm
0.03808 0 rmoveto
1 setTxMode
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(virtual file)show
550 232 gm
0.36328 0 rmoveto
(system #1)show
64 gr
522 306 562 366 1 rc
0 gr
522.5 306.5 561.5 365.5 0 rc
538 315 gm
0.03808 0 rmoveto
1 setTxMode
(virtual file)show
550 316 gm
0.36328 0 rmoveto
(system #2)show
64 gr
589 222 629 282 1 rc
0 gr
589.5 222.5 628.5 281.5 0 rc
605 231 gm
0.03808 0 rmoveto
1 setTxMode
(virtual file)show
617 232 gm
0.36328 0 rmoveto
(system #3)show
64 gr
589 306 629 366 1 rc
0 gr
589.5 306.5 628.5 365.5 0 rc
605 315 gm
0.03808 0 rmoveto
1 setTxMode
(virtual file)show
617 316 gm
0.36328 0 rmoveto
(system #4)show
579 245 gm
0.51538 0 rmoveto
14 fz
bu fc
2 F /|______Times-Roman fnt
bn
(Virtual File Store)show
645 252 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.14134 0.(OSI Environment)ashow
64 gr
456 149 498 199 1 rc
0 gr
456.5 149.5 497.5 198.5 0 rc
467 159 gm
1 setTxMode
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.10070 0.(real file)ashow
479 160 gm
0.11328 0 rmoveto
(system)show
491 169 gm
(#1)show
64 gr
456 392 498 443 1 rc
0 gr
456.5 392.5 497.5 442.5 0 rc
467 403 gm
1 setTxMode
-0.10070 0.(real file)ashow
479 404 gm
0.11328 0 rmoveto
(system)show
491 413 gm
(#2)show
64 gr
671 392 712 443 1 rc
0 gr
671.5 392.5 711.5 442.5 0 rc
682 403 gm
1 setTxMode
-0.10070 0.(real file)ashow
694 404 gm
0.11328 0 rmoveto
(system)show
706 413 gm
(#4)show
64 gr
671 149 712 199 1 rc
0 gr
671.5 149.5 711.5 198.5 0 rc
682 159 gm
1 setTxMode
-0.10070 0.(real file)ashow
694 160 gm
0.11328 0 rmoveto
(system)show
706 169 gm
(#3)show
0 gr
509 239 533 263 199 239 1 ar
466 187 490 211 19 59 1 ar
485 207 gm
513 242 lin
509 329 533 353 301 341 1 ar
466 381 490 405 121 161 1 ar
485 384 gm
513 349 lin
616 240 640 264 111 151 1 ar
676 188 700 212 291 331 1 ar
679 207 gm
636 244 lin
616 329 640 353 29 69 1 ar
676 381 700 405 209 249 1 ar
679 385 gm
636 348 lin
742 90 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
2 fs
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
-0.26438 0.(Figure 3-2:)ashow
742 162 gm
-0.07304 0.(The FTAM Virtual File Store.)ashow
F T cp
%%Page: ? 32
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(29)show
802 288 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.95489 0. 32 0.09548 0.(With the FTAM Virtual)awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.69213 0. 32 0.06921 0.( File Store)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.65826 0. 32 0.06582 0.(, we have the same threats as those with real file)awidthshow
117 90 gm
-0.03237 0.(systems, and some more. Because the virtual file store is distributed globally it reaches)ashow
133 90 gm
-0.08695 0.(across organizational, administrative, social and cultural boundaries. Not all the parts of)ashow
149 90 gm
-0.09107 0.(the system are controlled by the same organization or even by the same laws and ethics.)ashow
165 90 gm
-0.08709 0.(This brings with it new worries that did not exist with a local real file store.)ashow
197 90 gm
-0.04681 0.(With the virtual file store we need the same kind of security as in real file systems with)ashow
213 90 gm
0.55053 0. 32 0.05505 0.(sufficient granularity for being able to enforce these restrictions on individual users,)awidthshow
229 90 gm
0.14144 0. 32 0.01414 0.(groups of users, and types of use. However, in a global open environment the number)awidthshow
245 90 gm
0.62438 0. 32 0.06243 0.(of users who could attack the system is much greater and even in legitimate use the)awidthshow
261 90 gm
-0.07983 0.(often confidential data has to be transferred across an untrusted network.)ashow
293 90 gm
-0.06362 0.(While in a local environment we can normally rely on the user IDs as a basis for access)ashow
309 90 gm
0.11520 0. 32 0.01152 0.(control, in a distributed environment we need strong )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.16769 0. 32 0.01676 0.(Peer Entity Authentication)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.06790 0. 32 0.00679 0.( \(for a)awidthshow
325 90 gm
0.38497 0. 32 0.03849 0.(definition of Strong Authentication see 4.3\). Furthermore, we need to make sure that)awidthshow
341 90 gm
-0.03314 0.(the peer entity authenticated at the beginning of a session remains the same throughout)ashow
357 90 gm
0.32318 0. 32 0.03231 0.(the session.)awidthshow
389 90 gm
-0.08018 0.(This means tieing )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.08142 0.(Connection Integrity)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.07444 0.( with )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.08247 0.(Authentication)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.08168 0.( in such a way that a change)ashow
405 90 gm
-0.09924 0.(of the peer entity at any time will be detected. The integrity function needs to make sure)ashow
421 90 gm
0.80841 0. 32 0.08084 0.(that the whole data stream is intact, that is no part of it has been changed, omitted,)awidthshow
437 90 gm
-0.01441 0.(duplicated or misplaced. With FTAM \(and VT\) the purpose of the integrity function is)ashow
453 90 gm
0.87127 0. 32 0.08712 0.(not only to protect the integrity of the data being transferred but also to extend the)awidthshow
469 90 gm
-0.11431 0.(authentication of the peer entity from a one-time operation to cover the whole session.)ashow
501 90 gm
0.80780 0. 32 0.08078 0.(If the data being accessed is confidential, then a Confidentiality function should be)awidthshow
517 90 gm
1.49261 0. 32 0.14926 0.(invoked. With services such as FTAM and VT non-repudiation is usually not an)awidthshow
533 90 gm
0.24902 0. 32 0.02490 0.(important issue, undisputability being a property of the data itself and independent of)awidthshow
549 90 gm
-0.07255 0.(the way the data is transferred.)ashow
581 90 gm
1.14852 0. 32 0.11485 0.(Based on the above discussion, it can be claimed that the most important security)awidthshow
597 90 gm
0.02136 0. 32 0.00213 0.(functions needed with FTAM \(and VT\) are \(in this order\): )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.03311 0. 32 0.00331 0.(Peer Entity Authentication)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(,)show
613 90 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.08232 0.(Connection Integrity)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.07250 0.(, and )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.08282 0.(Connection Confidentiality)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(.)show
645 90 gm
1 fs
bu fc
2 F /|______Times-Bold fnt
bn
1.75003 0.(3.2.2)ashow
645 126 gm
2.61138 0. 32 0.26113 0.(Security Requirements of the Directory)awidthshow
677 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.10345 0. 32 0.01034 0.(The same Authentication, Access Control, Confidentiality and Integrity functions that)awidthshow
693 90 gm
0.91491 0. 32 0.09149 0.(are needed with FTAM and VT are also needed when using the Directory Service.)awidthshow
709 90 gm
0.21560 0. 32 0.02156 0.(While the Directory plays an important role in most OSI applications as the means of)awidthshow
725 90 gm
0.91217 0. 32 0.09121 0.(finding various services and distributing authentication information [X.500, X.509,)awidthshow
741 90 gm
-0.05693 0.(IS9594-1,8], it is also itself an OSI application that needs to be secured.)ashow
F T cp
%%Page: ? 33
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(30)show
802 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.69839 0. 32 0.06983 0.(Secure use of the Directory is important because not necessarily all the information)awidthshow
117 90 gm
-0.00967 0.(stored in the Directory is public and some of it needs to be protected against modifica-)ashow
133 90 gm
-0.10676 0.(tion. The main distinction between the Directory and FTAM is that the use of the Direc-)ashow
149 90 gm
0.17883 0. 32 0.01788 0.(tory is most naturally based on connectionless communication service, even though it)awidthshow
165 90 gm
0.12359 0. 32 0.01235 0.(currently still is running on the )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.21148 0. 32 0.02114 0.(Remote Operations Service Element)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.04470 0. 32 0.00447 0.( \()awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.05627 0.(ROSE)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.20050 0. 32 0.02005 0.(\) [IS9072-)awidthshow
181 90 gm
0.54550 0. 32 0.05455 0.(1,2, X.219, X.229] and connection-oriented protocols from the transport layer up. A)awidthshow
197 90 gm
-0.02775 0.(closer analysis of the Directory should reveal something applicable to, at least, )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.04304 0.(Remote)ashow
213 90 gm
-0.01585 0.(Database Access)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
( \()show
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.02265 0.(RDA)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.01359 0.(\) [IS9579-1,2], )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.01516 0.(Job Transfer and Manipulation)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
( \()show
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.02136 0.(JTM)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.01574 0.(\) [IS8831,)ashow
229 90 gm
-0.02996 0.(IS8832], and )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.03541 0.(Network Management)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.03063 0.( \(for an overview and some more detailed informa-)ashow
245 90 gm
0.27572 0. 32 0.02757 0.(tion on systems management, see e.g. [IS10040, CPW89, IS9595, IS9596]\).)awidthshow
277 90 gm
1.16790 0. 32 0.11679 0.(One of the main obstacles for a wide acceptance of a global distributed Directory)awidthshow
293 90 gm
-0.06936 0.(Service is that most companies do not want to reveal the details of their internal organi-)ashow
309 90 gm
1.21261 0. 32 0.12126 0.(zation, personnel etc. to their competitors. This would be the same as making the)awidthshow
325 90 gm
0.57861 0. 32 0.05786 0.(company's internal telephone catalogue public and, furthermore, distributing it in an)awidthshow
341 90 gm
-0.11604 0.(electronic form ready for duplication and automatic processing.)ashow
373 90 gm
-0.02867 0.(What is needed in a typical large company is a secure directory server, being under the)ashow
389 90 gm
0.61889 0. 32 0.06188 0.(control of the company but forming a part of the global directory system, that gives)awidthshow
405 90 gm
0.43685 0. 32 0.04368 0.(each user secure access to precisely the information that he is entitled to access. The)awidthshow
421 90 gm
-0.01966 0.(secure use of the directory service appears to be a necessary prerequisite for the prolif-)ashow
437 90 gm
-0.08079 0.(eration of the whole service.)ashow
469 90 gm
0.12664 0. 32 0.01266 0.(Data Origin Authentication needs to be applied to each message in order to assure the)awidthshow
485 90 gm
1.18560 0. 32 0.11856 0.(directory server that the request came from the user claimed and the user that the)awidthshow
501 90 gm
0.07202 0. 32 0.00720 0.(response actually came from the directory server claimed. This gives the server a firm)awidthshow
517 90 gm
0.16387 0. 32 0.01638 0.(basis for applying access control and the user an idea of the degree of confidence that)awidthshow
533 90 gm
-0.11239 0.(he can have in the correctness of the information received.)ashow
565 90 gm
-0.09826 0.(As with virtually any application, data origin authentication would be worthless without)ashow
581 90 gm
0.34835 0. 32 0.03483 0.(an associated data integrity function. Integrity together with Authentication gives the)awidthshow
597 90 gm
-0.07778 0.(user and server an assurance of that the request or reply received has not been tampered)ashow
613 90 gm
-0.01423 0.(with \(e.g. by an enemy within the network\).)ashow
645 90 gm
-0.03665 0.(The Confidentiality Function is needed when critical data stored within the directory is)ashow
661 90 gm
0.25360 0. 32 0.02536 0.(accessed. Usually this is not as important an issue as Authentication and Integrity are)awidthshow
677 90 gm
-0.06886 0.(because it is much more difficult and less efficient for an enemy to wait for the piece of)ashow
693 90 gm
0.43411 0. 32 0.04341 0.(confidential information that he wants to get to pass by than it would be to ask for it)awidthshow
709 90 gm
-0.00166 0.(directly from the directory. In any case, a data confidentiality function is needed when)ashow
725 90 gm
-0.11668 0.(accessing the most critical pieces of information stored in the directory.)ashow
F T cp
%%Page: ? 34
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(31)show
802 288 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.02157 0.(Based on the above discussion, it can be claimed that when accessing the Directory, or)ashow
117 90 gm
-0.08515 0.(a remote database, the most important security functions are the following: )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.10531 0.(Data Origin)ashow
133 90 gm
-0.08647 0.(Authentication)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.05140 0.(, )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.08398 0.(Connectionless Integrity)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.07518 0.(, and )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.08471 0.(Connectionless Confidentiality)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.08961 0.(. These are)ashow
149 90 gm
-0.08612 0.(simply the connectionless versions of the functions needed with FTAM, JTM and VT.)ashow
181 90 gm
1 fs
bu fc
2 F /|______Times-Bold fnt
bn
1.75003 0.(3.2.3)ashow
181 126 gm
2.83096 0. 32 0.28309 0.(Security Requirements of the Message Handling System)awidthshow
213 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.02890 0. 32 0.10289 0.(The by far most significant relayed information service today is the CCITT X.400)awidthshow
229 90 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.44479 0. 32 0.04447 0.(Message Handling System)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.08804 0. 32 0.00880 0.( \()awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.12416 0.(MHS)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.19409 0. 32 0.01940 0.(\) or, in ISO terms, the )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.37521 0. 32 0.03752 0.(Message Oriented Text Inter-)awidthshow
245 90 gm
-0.03749 0.(change System)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
( \()show
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.04850 0.(MOTIS)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.03349 0.(\). One of the most important applications of MHS is )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.03813 0.(Electronic)ashow
261 90 gm
0.77148 0. 32 0.07714 0.(Data Interchange)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.13763 0. 32 0.01376 0.( \()awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.15725 0.(EDI)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.45730 0. 32 0.04573 0.(\) aiming to replace a large part of inter-corporate documents,)awidthshow
277 90 gm
-0.08731 0.(currently transferred on paper, with electronic trade documents.)ashow
309 90 gm
-0.11802 0.(Among the security threats associated with MHS are the following:)ashow
341 90 gm
(-)show
341 126 gm
-0.12776 0.(A recipient making a false claim of the origin of a message.)ashow
373 90 gm
(-)show
373 126 gm
-0.05999 0.(The sender falsely denying the submission of a message.)ashow
405 90 gm
(-)show
405 126 gm
-0.08883 0.(Somebody falsely acknowledging the receipt of a message.)ashow
437 90 gm
(-)show
437 126 gm
-0.12104 0.(The recipient falsely denying the receipt of a message.)ashow
469 90 gm
(-)show
469 126 gm
0.24597 0. 32 0.02459 0.(Somebody impersonating as another user of the MTS \(a UA impersonating as)awidthshow
485 126 gm
-0.12472 0.(another UA to an MTA\).)ashow
517 90 gm
(-)show
517 126 gm
-0.14234 0.(An MTA impersonating as another MTA \(to the user or to another MTA\).)ashow
549 90 gm
-0.10060 0.(Security of the MHS can be divided into two parts:)ashow
581 90 gm
(-)show
581 126 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.00326 0. 32 0.10032 0.(Hop-by-hop security)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.71060 0. 32 0.07106 0.(, focusing on communications between two consecutive)awidthshow
597 126 gm
-0.01809 0.(agents of the MHS.)ashow
629 90 gm
(-)show
629 126 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.04232 0.(End-to-end security)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.04179 0.(, which mainly belongs to the domain of applications and is)ashow
645 126 gm
-0.04783 0.(therefore beyond the scopes of both OSI and this study.)ashow
677 90 gm
-0.00993 0.(While an individual user is mainly interested in the end-to-end security of his message)ashow
693 90 gm
0.79330 0. 32 0.07933 0.(\(the first four threats listed above\), a company using or providing the MHS service)awidthshow
709 90 gm
0.42633 0. 32 0.04263 0.(should be interested in both aspects of MHS security \(including the last two security)awidthshow
725 90 gm
-0.07716 0.(threats listed above\).)ashow
F T cp
%%Page: ? 35
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(32)show
802 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.06022 0.(Hop-by-hop security of MHS is important for several reasons:)ashow
133 90 gm
(-)show
133 126 gm
-0.07084 0.(In order to guarantee that messages are ultimately delivered to their right recipi-)ashow
149 126 gm
0.24902 0. 32 0.02490 0.(ents it is important that an MHS agent shall not forward messages to anybody)awidthshow
165 126 gm
-0.09533 0.(but the right peer agent.)ashow
197 90 gm
(-)show
197 126 gm
0.17440 0. 32 0.01744 0.(Even if a message is encrypted it should not be exposed to an untrusted agent.)awidthshow
213 126 gm
-0.09419 0.(An enemy with access to the message stream could, for example, easily perform)ashow
229 126 gm
0.31112 0. 32 0.03111 0.(extensive traffic analysis based on the addresses on the cleartext envelopes or)awidthshow
245 126 gm
2.17361 0. 32 0.21736 0.(make a serious attempt to break the encrypted messages assumed to be)awidthshow
261 126 gm
-0.10688 0.(important based on the envelope information.)ashow
293 90 gm
(-)show
293 126 gm
-0.00723 0.(For a long time yet, most messages will be unencrypted. While these messages)ashow
309 126 gm
-0.07562 0.(may not be overly critical they should by no means be entrusted to just anybody)ashow
325 126 gm
1.28936 0. 32 0.12893 0.(or subjected to easy alteration by the network. While the interacting MHS)awidthshow
341 126 gm
-0.05169 0.(agents are not all trustworthy they still pose a very small security risk compares)ashow
357 126 gm
-0.10299 0.(with that posed by all the other parties connected to the same network.)ashow
389 90 gm
0.16128 0. 32 0.01612 0.(Currently, there is a lot of ongoing activity in the area of the security of MHS and the)awidthshow
405 90 gm
1.92581 0. 32 0.19258 0.(latest blue book recommendations \([X.400] and others\) include several security)awidthshow
421 90 gm
1.34979 0. 32 0.13497 0.(features. The work is still far from mature. For a concise critical study on X.400)awidthshow
437 90 gm
0.00961 0. 32 0.00096 0.(security see e.g. [Mit90].)awidthshow
469 90 gm
0.46264 0. 32 0.04626 0.(The security requirements of the connection between two agents of an MHS are to a)awidthshow
485 90 gm
0.20278 0. 32 0.02027 0.(great extent the same as those of FTAM and VT. First the two communicating agents)awidthshow
501 90 gm
-0.04182 0.(need to perform strong mutual authentication. Just like with FTAM, this authentication)ashow
517 90 gm
-0.08076 0.(can be extended by employing an integrity function closely coupled with authentication)ashow
533 90 gm
1.62948 0. 32 0.16294 0.(this function also protects the transferred message stream from modifications. A)awidthshow
549 90 gm
-0.00201 0.(confidentiality function can also be employed to protect against revealing the message)ashow
565 90 gm
0.26885 0. 32 0.02688 0.(flow or contents of individual, unencrypted messages. Also with MHS access control)awidthshow
581 90 gm
0.81466 0. 32 0.08146 0.(is left to the application and hop-by-hop non-repudiation is usually of little interest)awidthshow
597 90 gm
-0.09516 0.(\(except at the boundaries between operators of interconnected MHS services\).)ashow
629 90 gm
0.12985 0. 32 0.01298 0.(End-to-end security in MHS is concerned with individual messages transferred by the)awidthshow
645 90 gm
-0.06076 0.(MHS. Each of these messages has associated with it a security context of its own.)ashow
677 90 gm
0.27557 0. 32 0.02755 0.(Especially in EDI, but also in the exchange of free format documents, instead of data)awidthshow
693 90 gm
1.39846 0. 32 0.13984 0.(origin authentication the stronger function of non-repudiation of origin is usually)awidthshow
709 90 gm
-0.07989 0.(required. In order to make electronic commitments it is not enough to know the identity)ashow
725 90 gm
-0.01728 0.(of the other party but we also need to be able to show this to an impartial judge in case)ashow
741 90 gm
0.17272 0. 32 0.01727 0.(of dispute.)awidthshow
F T cp
%%Page: ? 36
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(33)show
802 288 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.43005 0. 32 0.14300 0.(As always, non-repudiation is impossible without integrity. Therefore integrity is)awidthshow
117 90 gm
0.64453 0. 32 0.06445 0.(implied by non-repudiation. Integrity is also often required when non-repudiation is)awidthshow
133 90 gm
0.22203 0.(not.)ashow
165 90 gm
0.43060 0. 32 0.04306 0.(End-to-end confidentiality is always required with truly confidential messages, since)awidthshow
181 90 gm
-0.08737 0.(not all of the MHS agents handling the message along its way can be trusted.)ashow
213 90 gm
1 fs
bu fc
2 F /|______Times-Bold fnt
bn
1.75003 0.(3.2.4)ashow
213 126 gm
2.49969 0. 32 0.24996 0.(Summary of the Security Requirements)awidthshow
245 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.68466 0. 32 0.06846 0.(Basically, the security functions needed by the two main categories of OSI services)awidthshow
261 90 gm
-0.08006 0.(\()ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.10197 0.(connection-oriented)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.09353 0.( and )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.10116 0.(connectionless)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.09933 0.( services\) appear to be approximately the same,)ashow
277 90 gm
0.65811 0. 32 0.06581 0.(the main distinction being that in the former case the security context applies to the)awidthshow
293 90 gm
-0.04685 0.(entire connection whereas in the latter case each message \(or each request-reply pair of)ashow
309 90 gm
2.51266 0. 32 0.25126 0.(messages\) has a security context of its own and that connection-oriented and)awidthshow
325 90 gm
0.60760 0. 32 0.06076 0.(connectionless versions of the security functions \(respectively\) are needed. Also the)awidthshow
341 90 gm
-0.01252 0.(security requirements of the third category \()ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.01295 0.(relayed services)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.01348 0.(\) on each hop are approxi-)ashow
357 90 gm
-0.11608 0.(mately the same as the security requirements of connection-oriented services.)ashow
389 90 gm
-0.00234 0.(This observation seems to support the view that security, indeed, should be an integral)ashow
405 90 gm
0.08071 0. 32 0.00807 0.(part of the communications service provided by the OSI system. It also shows that we)awidthshow
421 90 gm
0.15289 0. 32 0.01528 0.(should look for ways of unifying the connection-oriented and connectionless versions)awidthshow
437 90 gm
0.04287 0. 32 0.00428 0.(of security functions. True end-to-end security in relayed services falls mainly outside)awidthshow
453 90 gm
-0.01339 0.(the scope of this study.)ashow
488 90 gm
1 fs
14 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.74998 0.(3.3)ashow
488 126 gm
3.94027 0. 32 0.39402 0.(Security Functions)awidthshow
520 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.70938 0. 32 0.07093 0.(Even though it is difficult to prioritize the OSI security functions, as their priorities)awidthshow
536 90 gm
0.78323 0. 32 0.07832 0.(depend on the specific user, type of use and application, some general conclusions,)awidthshow
552 90 gm
-0.06964 0.(based on the above discussion, can be made:)ashow
584 90 gm
(-)show
584 126 gm
-0.06585 0.(With the connectivity offered by today's integrating networks, reliable )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.07553 0.(authenti-)ashow
600 126 gm
0.09169 0.(cation)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.32943 0. 32 0.03294 0.( appears to be the most urgent need. With current technologies, such as)awidthshow
616 126 gm
0.36056 0. 32 0.03605 0.(the use of passwords on sessions and reserved fields in E-mail messages, it is)awidthshow
632 126 gm
-0.06748 0.(very easy to e.g. log in a service or send E-mail under a false identity.)ashow
664 90 gm
(-)show
664 126 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.00692 0.(Data integrity)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.00675 0.( is of paramount interest in virtually any information service. All)ashow
680 126 gm
1.71463 0. 32 0.17146 0.(essential data has to be secured against both accidental and premeditated)awidthshow
696 126 gm
0.48339 0. 32 0.04833 0.(tampering. Even data that is not valuable for an outsider can be manipulated,)awidthshow
712 126 gm
-0.07136 0.(systematically or at random, by e.g. a competitor or a casual hacker.)ashow
F T cp
%%Page: ? 37
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(34)show
802 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(-)show
101 126 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.03723 0. 32 0.00372 0.(Data confidentiality)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.01892 0. 32 0.00189 0.( is usually less critical an issue than data integrity. Most of)awidthshow
117 126 gm
0.05645 0. 32 0.00564 0.(the data transferred across a network is not very interesting for an outsider and)awidthshow
133 126 gm
1.17355 0. 32 0.11735 0.(usually the sheer bulk of it makes it difficult to find the relevant pieces of)awidthshow
149 126 gm
0.77163 0. 32 0.07716 0.(information. However, a part of the information transferred through the net-)awidthshow
165 126 gm
0.49285 0. 32 0.04928 0.(work is critical and needs to be encrypted. Among the most critical pieces of)awidthshow
181 126 gm
0.68283 0. 32 0.06828 0.(information are encryption keys distributed through the network. Sometimes)awidthshow
197 126 gm
0.46508 0. 32 0.04650 0.(entire documents, such as offers and sales reports, need to be protected. Also)awidthshow
213 126 gm
-0.10118 0.(bank transactions are usually confidential.)ashow
245 90 gm
(-)show
245 126 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.52841 0. 32 0.05284 0.(Non-repudiation )awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.29525 0. 32 0.02952 0.(is a very difficult area because of the legal aspects involved.)awidthshow
261 126 gm
-0.03285 0.(Electronic commitments are also to a great extent application-dependent. How-)ashow
277 126 gm
1.38824 0. 32 0.13882 0.(ever, a )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
3.58993 0. 32 0.35899 0.(Generic Non-repudiation Function)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.93115 0. 32 0.19311 0.(, offering the service of non-)awidthshow
293 126 gm
1.04461 0. 32 0.10446 0.(repudiation of an Application Protocol Data Unit without any regard to the)awidthshow
309 126 gm
-0.10607 0.(semantics of the information transferred, can be included in the service provided)ashow
325 126 gm
0.06591 0. 32 0.00659 0.(by the OSI, as proposed in section 3.5.)awidthshow
357 90 gm
(-)show
357 126 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.04959 0. 32 0.00495 0.(Access control)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.03189 0. 32 0.00318 0.( is a "function" belonging mainly to the domains of applications)awidthshow
373 126 gm
1.28112 0. 32 0.12811 0.(and management. Based on reliable authentication, it is relatively straight-)awidthshow
389 126 gm
-0.06932 0.(forward to check the privileges of the user and allow him the appropriate access)ashow
405 126 gm
-0.08830 0.(to the service. Access control only is a service from the information service pro-)ashow
421 126 gm
0.06912 0. 32 0.00691 0.(vider's point of view \320 as seen by the user it is rather a restriction. Access con-)awidthshow
437 126 gm
-0.04727 0.(trol can also be applied at various layers of OSI, as pointed out in section 4.5.2.)ashow
0 0 gm
(nc 464 166 583 427 6 rc)kp
64 gr
542 225 576 373 1 rc
1 2 lw
0 gr
542.5 225.5 575.5 372.5 0 rc
1 1 lw
0 0 pen
408 458 gm
408 458 lin
557 256 gm
1 setTxMode
bu fc
2 F /|______Times-Roman fnt
bn
-0.20579 0.(authenticated and)ashow
569 260 gm
-0.19735 0.(integral channel)ashow
0 gr
552 217 564 229 160 200 1 ar
1 1 pen
558 193 gm
558 218 lin
552 398 564 410 160 200 1 ar
558 374 gm
558 399 lin
569 398 581 410 173 213 1 ar
568 374 gm
573 399 lin
536 398 548 410 147 187 1 ar
549 374 gm
543 399 lin
64 gr
471 225 505 373 1 rc
1 2 lw
0 gr
471.5 225.5 504.5 372.5 0 rc
1 1 lw
0 0 pen
543 399 lin
491 249 gm
1 setTxMode
-0.19050 0.(confidential channel)ashow
0 gr
482 215 494 227 160 200 1 ar
1 1 pen
488 192 gm
488 216 lin
473 215 485 227 175 215 1 ar
471 192 gm
477 216 lin
491 215 503 227 147 187 1 ar
504 192 gm
498 216 lin
481 400 493 412 160 200 1 ar
487 376 gm
487 401 lin
473 169 gm
1 setTxMode
(A)show
491 169 gm
(B)show
510 169 gm
(C)show
491 414 gm
(D)show
561 169 gm
(A)show
543 415 gm
(B)show
561 415 gm
(C)show
580 415 gm
(D)show
621 90 gm
(nc 30 28 811 566 6 rc)kp
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.26438 0.(Figure 3-3:)ashow
621 162 gm
-0.17376 0.(Confidential and Integral channels [Rue91].)ashow
653 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.12411 0. 32 0.11241 0.(Figure 3-3 Illustrates the functions of confidentiality, authenticity and integrity. A)awidthshow
669 90 gm
0.45623 0. 32 0.04562 0.(confidential channel is one that anybody \(in this case A, B and C\) can write into but)awidthshow
685 90 gm
-0.10382 0.(only the legitimate recipient \(D\) can read from. An authenticated and integral channel is)ashow
701 90 gm
-0.04463 0.(one that only the legitimate sender \(A\) can write into but anybody \(B, C or D\) can read)ashow
717 90 gm
1.01669 0. 32 0.10166 0.(from. These channels can be either physically protected \(e.g. optical transmissions)awidthshow
733 90 gm
-0.03276 0.(systems with just one receiver or transmitter\) or cryptographic channels. They can also)ashow
749 90 gm
-0.09947 0.(be formalized.)ashow
F T cp
%%Page: ? 38
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(35)show
802 288 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.94207 0. 32 0.09420 0.([Sim84] provides the basis of systematic study of authenticity. The topic is further)awidthshow
117 90 gm
0.65124 0. 32 0.06512 0.(elaborated on e.g. in [Sim88]. OSI security standards now include a fairly complete)awidthshow
133 90 gm
1.15356 0. 32 0.11535 0.(Authentication Framework [IS10181-2]. The corresponding other frameworks \(the)awidthshow
149 90 gm
-0.03469 0.(Integrity Framework [ISO90d] and the Non-repudiation Framework [ISO90e]\) are still)ashow
165 90 gm
-0.06663 0.(rather early drafts.)ashow
197 90 gm
-0.07301 0.(For example Integrity alone is useless, it must always be combined with Authentication)ashow
213 90 gm
0.37521 0. 32 0.03752 0.(to be of any real value. If we cannot be sure of the identity of the other party, it is of)awidthshow
229 90 gm
2.05352 0. 32 0.20535 0.(little value to us to know that the data has not been tampered with. Similarly,)awidthshow
245 90 gm
0.59829 0. 32 0.05982 0.(Authentication is of little value without Integrity. If we do not know that the data is)awidthshow
261 90 gm
-0.04847 0.(intact it is not worth much for us to know who sent it.)ashow
293 90 gm
0.04745 0. 32 0.00474 0.(It is easy to annul the effect of either of these two functions unless they are combined.)awidthshow
309 90 gm
-0.04560 0.(Consider an active attack against the security of communication between two parties A)ashow
325 90 gm
0.17517 0. 32 0.01751 0.(and B launched by enemy X, connected between A and B and capable of intercepting)awidthshow
341 90 gm
0.74142 0. 32 0.07414 0.(all traffic between these two parties. X can be e.g. an untrusted router between two)awidthshow
357 90 gm
0.12707 0.(networks.)ashow
389 90 gm
0.02182 0. 32 0.00218 0.(Suppose the enemy X intercepts an authenticated message from A to B. If no integrity)awidthshow
405 90 gm
0.05401 0. 32 0.00540 0.(function is provided X can now change the information contents of the message while)awidthshow
421 90 gm
-0.07186 0.(leaving the authentication information intact. B now checks the authentication informa-)ashow
437 90 gm
-0.10922 0.(tion and assumes that the message came from A when it actually did come from X.)ashow
469 90 gm
1.38641 0. 32 0.13864 0.(Also, in case of connection-oriented communication, X can let the authentication)awidthshow
485 90 gm
0.83633 0. 32 0.08363 0.(exchange between A and B pass through unmodified. When the real information is)awidthshow
501 90 gm
1.63406 0. 32 0.16340 0.(exchanged, X can intercept these messages and modify them as it pleases, if no)awidthshow
517 90 gm
-0.07652 0.(integrity function is provided.)ashow
549 90 gm
0.31448 0. 32 0.03144 0.(Similarly, if only integrity but no authentication is provided X can intercept the mes-)awidthshow
565 90 gm
0.10955 0. 32 0.01095 0.(sages and send them on as his own. B now believes that it got the information from X)awidthshow
581 90 gm
0.03570 0. 32 0.00357 0.(when it actually came from A. If this information happens to be, for example, a patent)awidthshow
597 90 gm
-0.09078 0.(application the consequences can be serious.)ashow
629 90 gm
0.26657 0. 32 0.02665 0.(In order to protect against these attacks authentication and integrity should always be)awidthshow
645 90 gm
-0.09231 0.(provided together. During the authentication exchange a common security context is set)ashow
661 90 gm
0.30639 0. 32 0.03063 0.(up between the mutually authenticated parties in such a way as to keep it secret from)awidthshow
677 90 gm
1.95480 0. 32 0.19548 0.(everybody else. This means exchanging confidential information \(pair-wise key)awidthshow
693 90 gm
0.10025 0. 32 0.01002 0.(values\), included in the security context, as a part of the authentication exchange. The)awidthshow
709 90 gm
0.02365 0. 32 0.00236 0.(authentication exchange is performed in one security context, that is one including the)awidthshow
725 90 gm
0.00839 0. 32 0.00083 0.(certified public key pairs of the authenticating parties. In this security context, another)awidthshow
741 90 gm
0.52886 0. 32 0.05288 0.(security context, lasting for the duration of the connection, is set up and can then be)awidthshow
757 90 gm
1.16409 0. 32 0.11640 0.(used in subsequent communications. Because only the two mutually authenticated)awidthshow
F T cp
%%Page: ? 39
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(36)show
802 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
85 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01045 0.(parties know this security context, communications in it provide not only integrity and)ashow
101 90 gm
-0.14752 0.(confidentiality but also continued mutual authentication.)ashow
133 90 gm
1.13998 0. 32 0.11399 0.(A secure session \(e.g. between an FTAM user and his server or between a virtual)awidthshow
149 90 gm
-0.09513 0.(terminal and a host computer\) should proceed as follows:)ashow
181 90 gm
(-)show
181 126 gm
-0.01542 0.(When opening the session mutual strong authentication takes place. It is essen-)ashow
197 126 gm
0.56030 0. 32 0.05603 0.(tial that a fresh )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.22499 0.(pairwise)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.77148 0. 32 0.07714 0.( \(that is one shared by only the two communicating)awidthshow
213 126 gm
-0.06547 0.(parties\) session key be securely exchanged during this procedure.)ashow
245 90 gm
(-)show
245 126 gm
0.72021 0. 32 0.07202 0.(This session key can be used in subsequent communications for purposes of)awidthshow
261 126 gm
-0.11753 0.(continued authentication as well as data integrity and confidentiality in a manner)ashow
277 126 gm
-0.13169 0.(explained in more detail in the appendix.)ashow
309 90 gm
(-)show
309 126 gm
2.09548 0. 32 0.20954 0.(Finally, the session is gracefully closed in such a way that no data can)awidthshow
325 126 gm
-0.09350 0.(undetected be omitted from the end of the session.)ashow
357 90 gm
(-)show
357 126 gm
0.32836 0. 32 0.03283 0.(Optionally, a digital signature scheme can be employed if parts of the session)awidthshow
373 126 gm
-0.14770 0.(include commitments that may need to be verified \(by an impartial judge\) later.)ashow
405 90 gm
0.51071 0. 32 0.05107 0.(There are a number of security contexts that can be involved in this process. Firstly,)awidthshow
421 90 gm
0.58181 0. 32 0.05818 0.(there is the security context between the user and his CA, where the user knows the)awidthshow
437 90 gm
0.10162 0. 32 0.01016 0.(public key of his CA and can check the certificates of the public keys of other parties.)awidthshow
453 90 gm
0.50918 0. 32 0.05091 0.(Secondly, there is the security context between the two parties knowing each other's)awidthshow
469 90 gm
-0.06327 0.(public keys, certified by the CAs, and therefore being able to mutually authenticate and)ashow
485 90 gm
0.80047 0. 32 0.08004 0.(exchange information confidentially and retaining its integrity. Thirdly, there is the)awidthshow
501 90 gm
-0.10942 0.(security context established during the authentication exchange, to be used on the newly)ashow
517 90 gm
0.48843 0. 32 0.04884 0.(established connection. Lastly, another security context, the union of the second and)awidthshow
533 90 gm
0.02243 0. 32 0.00224 0.(third context, can be used for making confidential commitments on this connection by)awidthshow
549 90 gm
0.48934 0. 32 0.04893 0.(using the second context for signing and the third context for ensuring the confiden-)awidthshow
565 90 gm
0.66452 0. 32 0.06645 0.(tiality of the messages exchanged. The security contexts employed are illustrated in)awidthshow
581 90 gm
1 2 lw
(figure 3-4 below.)show
0 0 gm
(nc 600 125 712 468 6 rc)kp
0 gr
635 160 647 172 59 99 1 ar
611.5 166.5 670.5 401.5 90 172 0 ar
1 1 lw
0 0 pen
624 210 gm
624 210 lin
64 gr
611 166 671 400 0 90 1 ar
1 2 lw
1 1 pen
0 gr
611.5 166.5 670.5 399.5 0 90 0 ar
1 1 lw
0 0 pen
624 210 lin
64 gr
600 126 649 175 1 ov
1 2 lw
1 1 pen
0 gr
600.5 126.5 648.5 174.5 0 ov
1 1 lw
0 0 pen
624 210 lin
64 gr
602 128 647 173 1 ov
1 2 lw
1 1 pen
0 gr
602.5 128.5 646.5 172.5 0 ov
1 1 lw
0 0 pen
624 210 lin
627 136 gm
1.16259 0 rmoveto
1 setTxMode
bu fc
2 F /|______Times-Roman fnt
bn
(S.C. 1)show
64 gr
602 216 647 260 1 ov
1 2 lw
1 1 pen
0 gr
602.5 216.5 646.5 259.5 0 ov
1 1 lw
0 0 pen
630 136 gm
630 136 lin
627 223 gm
1.16259 0 rmoveto
1 setTxMode
(S.C. 2)show
64 gr
602 304 647 349 1 ov
1 2 lw
1 1 pen
0 gr
602.5 304.5 646.5 348.5 0 ov
1 1 lw
0 0 pen
630 223 gm
630 223 lin
627 311 gm
1.16259 0 rmoveto
1 setTxMode
(S.C. 3)show
64 gr
602 392 647 437 1 ov
1 2 lw
1 1 pen
0 gr
602.5 392.5 646.5 436.5 0 ov
1 1 lw
0 0 pen
630 311 gm
630 311 lin
627 399 gm
1.16259 0 rmoveto
1 setTxMode
(S.C. 4)show
0 gr
618 209 630 221 160 200 1 ar
1 1 pen
624 174 gm
624 210 lin
618 297 630 309 160 200 1 ar
624 260 gm
624 298 lin
618 385 630 397 160 200 1 ar
624 348 gm
624 386 lin
693 418 gm
0.12475 0 rmoveto
1 setTxMode
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
(S,A)show
690 432 gm
0.39038 0 rmoveto
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(, K)show
690 365 gm
-0.12915 0.(A: {K)ashow
690 460 gm
(})show
690 403 gm
0.39038 0 rmoveto
(, K)show
693 446 gm
0.37194 0 rmoveto
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
(P,B)show
693 390 gm
-0.50030 0.(AB)ashow
708 417 gm
0.37194 0 rmoveto
(S,B)show
705 432 gm
0.39038 0 rmoveto
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(, K)show
705 366 gm
-0.24182 0.(B: {K)ashow
705 460 gm
(})show
705 403 gm
0.39038 0 rmoveto
(, K)show
708 446 gm
0.12475 0 rmoveto
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
(P,A)show
708 390 gm
-0.50030 0.(AB)ashow
690 305 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.12915 0.(A: {K)ashow
693 330 gm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.50030 0.(AB)ashow
690 343 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(})show
705 306 gm
-0.24182 0.(B: {K)ashow
708 330 gm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.50030 0.(AB)ashow
705 343 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(})show
693 228 gm
0.12475 0 rmoveto
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
(S,A)show
690 242 gm
0.39038 0 rmoveto
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(, K)show
690 202 gm
-0.12915 0.(A: {K)ashow
690 270 gm
(})show
693 256 gm
0.37194 0 rmoveto
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
(P,B)show
708 227 gm
0.37194 0 rmoveto
(S,B)show
704 241 gm
0.39038 0 rmoveto
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(, K)show
705 202 gm
-0.24182 0.(B: {K)ashow
705 270 gm
(})show
708 255 gm
0.12475 0 rmoveto
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
(P,A)show
690 125 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.12915 0.(A: {K)ashow
693 151 gm
0.12329 0 rmoveto
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
(P,CA)show
690 171 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(})show
704 125 gm
-0.24182 0.(B: {K)ashow
708 150 gm
0.12329 0 rmoveto
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
(P,CA)show
704 171 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(})show
741 90 gm
(nc 30 28 811 566 6 rc)kp
2 fs
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
-0.26438 0.(Figure 3-4:)ashow
741 162 gm
0.00869 0. 32 0.00086 0.(Switching between security contexts.)awidthshow
F T cp
%%Page: ? 40
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(37)show
802 288 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.25 0. 32 0.125 0.(The purpose of the approach proposed above is to keep things simple. The initial)awidthshow
117 90 gm
-0.05932 0.(security context is always required in order to be able to perform strong mutual authen-)ashow
133 90 gm
0.03677 0. 32 0.00367 0.(tication and securely agree on the security context to be used on the newly established)awidthshow
149 90 gm
-0.07875 0.(connection. For purposes of continued authentication, as well as integrity and confiden-)ashow
165 90 gm
1.36657 0. 32 0.13665 0.(tiality, the third security context, based on the agreed session key and symmetric)awidthshow
181 90 gm
1.19110 0. 32 0.11911 0.(cryptography, is much more efficient than the second security context used in the)awidthshow
197 90 gm
1.90582 0. 32 0.19058 0.(authentication exchange. If commitments must be made during the session it is)awidthshow
213 90 gm
1.12564 0. 32 0.11256 0.(necessary to employ a digital signature scheme in an appropriate security context.)awidthshow
229 90 gm
-0.04074 0.(Rather than establishing a new security context for this purpose, we can use the second)ashow
245 90 gm
-0.07572 0.(security context instead. This can be done either by employing a security context which)ashow
261 90 gm
1.02783 0. 32 0.10278 0.(is the union of the second and third context \(as described above\) or by alternating)awidthshow
277 90 gm
-0.07980 0.(between these two contexts \(as illustrated in figure 3-4\).)ashow
309 90 gm
-0.08728 0.(In connectionless communication each Data Unit has to carry with it all the information)ashow
325 90 gm
0.55618 0. 32 0.05561 0.(needed for Data Origin Authentication and Data Integrity. With connection-oriented)awidthshow
341 90 gm
-0.07707 0.(communication the same effect is achieved by securely exchanging a secret session key)ashow
357 90 gm
0.06881 0. 32 0.00688 0.(in connection with Peer Entity Authentication. This key can then be used to guarantee)awidthshow
373 90 gm
0.25772 0. 32 0.02577 0.(continued authentication and the integrity of each data unit, as well as the whole data)awidthshow
389 90 gm
0.17898 0. 32 0.01789 0.(stream, during subsequent communication. This ties the Confidentiality function with)awidthshow
405 90 gm
-0.14114 0.(Authentication and Integrity.)ashow
437 90 gm
1.03851 0. 32 0.10385 0.(While Integrity and Confidentiality are orthogonal functions they are usually most)awidthshow
453 90 gm
-0.11341 0.(naturally implemented by using the same mechanism for both.)ashow
485 90 gm
-0.11822 0.(Authentication and Non-Repudiation are not at all orthogonal but the former is a weaker)ashow
501 90 gm
0.37658 0. 32 0.03765 0.(version of the latter. With Authentication we )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.12696 0.(know)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.31661 0. 32 0.03166 0.( who the other party is, with Non-)awidthshow
517 90 gm
-0.10632 0.(repudiation we can also )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.11955 0.(prove)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.10208 0.( this to an impartial judge.)ashow
549 90 gm
1.61743 0. 32 0.16174 0.(Access Control is closely coupled with Authentication. We cannot apply Access)awidthshow
565 90 gm
-0.06092 0.(Control without knowing who the other party is. Access Control is not a function in the)ashow
581 90 gm
0.02120 0. 32 0.00212 0.(same sense as the other four are. The originating user can ask for the invocation of the)awidthshow
597 90 gm
0.11901 0. 32 0.01190 0.(other functions when opening the communication whereas Access Control is imposed)awidthshow
613 90 gm
0.28976 0. 32 0.02897 0.(on the user by the communication service provider or the responding party. From the)awidthshow
629 90 gm
-0.05841 0.(user's point-of-view Access Control is a restriction rather than a service.)ashow
661 90 gm
0.14526 0. 32 0.01452 0.(Based on the above discussion, it can be stated that the security functions listed in the)awidthshow
677 90 gm
0.26626 0. 32 0.02662 0.(OSI Security Architecture are an ad-hoc enumeration of security-related issues rather)awidthshow
693 90 gm
0.16113 0. 32 0.01611 0.(than a well thought-out list of orthogonal elements of security. The three real security)awidthshow
709 90 gm
-0.00608 0.(functions appear to be )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.00646 0.(Authentication)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(, )show
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.00588 0.(Integrity)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
( and )show
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.00614 0.(Confidentiality)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.00692 0.( while Non-repudi-)ashow
725 90 gm
0.08605 0. 32 0.00860 0.(ation can be viewed as a stronger version of Authentication and Access Control really)awidthshow
741 90 gm
1.27670 0. 32 0.12767 0.(should be left to systems management and various applications, based on reliable)awidthshow
757 90 gm
-0.08271 0.(authentication of the service user \(and his end-system\).)ashow
F T cp
%%Page: ? 41
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(38)show
802 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.10209 0.(The orthogonality of the three basic security functions implies that it is generally a good)ashow
117 90 gm
0.10604 0. 32 0.01060 0.(practice to use independent key values for different purposes. For example, the public)awidthshow
133 90 gm
-0.07441 0.(key pair used for authentication should be separate from the key pair used for confiden-)ashow
149 90 gm
0.95260 0. 32 0.09526 0.(tiality, even though these two functions often are based on the same cryptographic)awidthshow
165 90 gm
-0.07192 0.(mechanism.)ashow
197 90 gm
0.19119 0. 32 0.01911 0.(As a summary it can be stated that the three most important security functions of OSI)awidthshow
213 90 gm
0.96481 0. 32 0.09648 0.(are Authentication, Integrity and Confidentiality, in this order, and that these three)awidthshow
229 90 gm
0.53863 0. 32 0.05386 0.(should be provided by the OSI protocol stack, either on the request of the user or as)awidthshow
245 90 gm
-0.02214 0.(dictated by the Security Policy and management, in both their connection-oriented and)ashow
261 90 gm
-0.03137 0.(connectionless forms.)ashow
293 90 gm
1.15966 0. 32 0.11596 0.(It is worth noting that while confidentiality can \(in theory\) be guaranteed \(that is,)awidthshow
309 90 gm
2.06497 0. 32 0.20649 0.(disclosure of confidential information can be prevented by using cryptographic)awidthshow
325 90 gm
0.70755 0. 32 0.07075 0.(techniques\) it is impossible to )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.20384 0.(prevent)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.82336 0. 32 0.08233 0.( fraudulent modification of information in an)awidthshow
341 90 gm
1.43997 0. 32 0.14399 0.(untrusted network. The integrity function can only )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.33920 0.(detect)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.53884 0. 32 0.15388 0.( such modification and,)awidthshow
357 90 gm
0.17715 0. 32 0.01771 0.(optionally, make a serious effort to recover from it. Similarly, authentication function)awidthshow
373 90 gm
-0.07539 0.(can only )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.07022 0.(verify)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.07279 0.( the identity of the other party and detect any changes, not guarantee that)ashow
389 90 gm
-0.06748 0.(the other party remains the same. When an unrecoverable security violation is detected,)ashow
405 90 gm
0.35369 0. 32 0.03536 0.(the communication system can only disconnect and report the incident. The situation)awidthshow
421 90 gm
1.18301 0. 32 0.11830 0.(then reduces to ordinary denial of service, which again cannot be prevented in an)awidthshow
437 90 gm
0.11810 0. 32 0.01181 0.(untrustworthy network.)awidthshow
472 90 gm
1 fs
14 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.74998 0.(3.4)ashow
472 126 gm
2.22351 0. 32 0.22235 0.(On the Formal Analysis of Secure Open Systems)awidthshow
504 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.46188 0. 32 0.04618 0.(The preceding analysis of security functions and mechanisms, together with the new)awidthshow
520 90 gm
0.23117 0. 32 0.02311 0.(concept of )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.39108 0. 32 0.03910 0.(security context)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.23635 0. 32 0.02363 0.(, gives us new insight to the relations between the security)awidthshow
536 90 gm
1.53533 0. 32 0.15353 0.(functions and mechanisms of open systems and enables us to split open systems)awidthshow
552 90 gm
-0.09196 0.(security into chunks of manageable size.)ashow
584 90 gm
0.22155 0. 32 0.02215 0.(With our security model, these informally stated ideas can be formalized and brought)awidthshow
600 90 gm
-0.03047 0.(within the reach of theoretical study. Just like the well known properties of any "good")ashow
616 90 gm
-0.05305 0.(communications protocol \(completeness, dead-lock freeness, etc.\) a number of require-)ashow
632 90 gm
0.00900 0. 32 0.00090 0.(ments for secure protocols, based on real security needs of the user, can be formulated)awidthshow
648 90 gm
-0.11376 0.(and protocols fulfilling these requirements can be designed and implemented.)ashow
680 90 gm
0.30227 0. 32 0.03022 0.(As defined in section 3.1, a security context between two communicating application)awidthshow
696 90 gm
1.37145 0. 32 0.13714 0.(instances is the union of the security variables of all the OSI layers of these two)awidthshow
712 90 gm
0.20446 0. 32 0.02044 0.(application instances. In this way, security can be split by the layers of OSI. We have)awidthshow
728 90 gm
0.22750 0. 32 0.02275 0.(also seen that security can be divided in the dimension of time and seen as a series of)awidthshow
744 90 gm
0.53070 0. 32 0.05307 0.(consecutive security contexts. Furthermore, it is possible to split security into ortho-)awidthshow
F T cp
%%Page: ? 42
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(39)show
802 288 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
85 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.10658 0.(gonal functions \(authentication, integrity and confidentiality\) which can be treated sepa-)ashow
101 90 gm
0.65780 0. 32 0.06578 0.(rately. Here again we have to beware of the subtle interdependencies between these)awidthshow
117 90 gm
0.03837 0.(functions.)ashow
149 90 gm
0.20004 0. 32 0.02000 0.(While the complete formalization of these ideas is beyond the scope of this study, we)awidthshow
165 90 gm
0.81024 0. 32 0.08102 0.(shall elaborate on them a bit further and present a semi-formal description of some)awidthshow
181 90 gm
-0.09022 0.(aspects in order to clarify them and point out a direction for further study.)ashow
213 90 gm
0.15563 0. 32 0.01556 0.(In the OSI security architecture no clear relationship between the connection-oriented)awidthshow
229 90 gm
0.14877 0. 32 0.01487 0.(and connectionless security functions and mechanisms was shown. Now we have dis-)awidthshow
245 90 gm
0.82489 0. 32 0.08248 0.(covered that the connection-oriented functions and mechanisms really are based on)awidthshow
261 90 gm
0.52093 0. 32 0.05209 0.(connectionless functions and mechanisms, which are the more fundamental building)awidthshow
277 90 gm
-0.00967 0.(blocks of secure open systems.)ashow
309 90 gm
0.80474 0. 32 0.08047 0.(In the example at the end of section 3.3 we could see that in order to set up secure)awidthshow
325 90 gm
-0.12619 0.(connection-oriented communications connectionless functions first need to be applied to)ashow
341 90 gm
1.82510 0. 32 0.18251 0.(the messages exchanged during connection establishment. Only by applying the)awidthshow
357 90 gm
1.31164 0. 32 0.13116 0.(connectionless security functions and mechanisms to the first couple of messages)awidthshow
373 90 gm
1.07727 0. 32 0.10772 0.(exchanged can we gain confidence in the identity of the other party and exchange)awidthshow
389 90 gm
-0.10903 0.(connection-specific secret information with him in a secure and integral manner. This in)ashow
405 90 gm
0.63110 0. 32 0.06311 0.(turn enables us to switch into a new security context specific to this connection and)awidthshow
421 90 gm
-0.09819 0.(known only by the two communicating application instances.)ashow
453 90 gm
1.79824 0. 32 0.17982 0.(This simple revelation opens up interesting new views. By developing a formal)awidthshow
469 90 gm
0.02685 0. 32 0.00268 0.(technique for describing and analyzing the security contexts and the transfers between)awidthshow
485 90 gm
-0.06576 0.(them we could formally deduce and prove things about the security of open systems. In)ashow
501 90 gm
-0.10061 0.(the area of formal protocol research there are a number of well established requirements)ashow
517 90 gm
1.92108 0. 32 0.19210 0.(for a "good" telecommunications protocol and a number of formal methods for)awidthshow
533 90 gm
-0.06968 0.(describing and analyzing various protocols.)ashow
565 90 gm
-0.12571 0.(Among the commonly accepted basic properties of a good protocol are the following:)ashow
597 90 gm
(-)show
597 126 gm
-0.10382 0.(A protocol has to be completely and unambiguously defined.)ashow
629 90 gm
(-)show
629 126 gm
-0.08766 0.(A protocol must be free of dead-locks and live-locks.)ashow
661 90 gm
(-)show
661 126 gm
-0.12663 0.(A protocol has to have an initial state.)ashow
693 90 gm
(-)show
693 126 gm
0.91705 0. 32 0.09170 0.(After error situations the protocol must return to a certain state \(usually the)awidthshow
709 126 gm
-0.13922 0.(initial state\) within a finite period of time.)ashow
F T cp
%%Page: ? 43
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(40)show
802 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.03216 0.(Surprisingly, no such list of properties has so far been published for security protocols.)ashow
117 90 gm
-0.03132 0.(As a first approximation we could state some rather obvious requirements for a "good")ashow
133 90 gm
-0.13537 0.(security protocol:)ashow
161 90 gm
(-)show
161 126 gm
-0.11735 0.(It has to have an initial security context.)ashow
189 90 gm
(-)show
189 126 gm
-0.12655 0.(After error situations the protocol must return to a certain security context within)ashow
201 126 gm
-0.15194 0.(a finite time.)ashow
229 90 gm
(-)show
229 126 gm
-0.02101 0.(All the security contexts employed have to be "secure" in the sense that we can)ashow
241 126 gm
-0.08026 0.(rely on the security functions provided in these contexts.)ashow
269 90 gm
(-)show
269 126 gm
-0.09925 0.(The changes between the security contexts have to be secure.)ashow
301 90 gm
-0.09506 0.(After developing formalisms suited for defining and analyzing the security contexts and)ashow
317 90 gm
-0.03526 0.(changes between them we could prove something about the security of an open system)ashow
333 90 gm
-0.09875 0.(in the following way:)ashow
365 90 gm
(-)show
365 126 gm
-0.12408 0.(Define the security contexts employed.)ashow
397 90 gm
(-)show
397 126 gm
-0.07101 0.(Split up the contexts by the layers of OSI if necessary.)ashow
429 90 gm
(-)show
429 126 gm
-0.08787 0.(Prove each context secure \(layer by layer if necessary\).)ashow
461 90 gm
(-)show
461 126 gm
-0.07908 0.(Prove the changes between the contexts secure.)ashow
493 90 gm
1.52999 0. 32 0.15299 0.(The development of a formalism for the analysis described above is obviously a)awidthshow
509 90 gm
0.13839 0. 32 0.01383 0.(rewarding task and should not prove too difficult for a mathematically oriented scien-)awidthshow
525 90 gm
0.95718 0. 32 0.09571 0.(tist. It is, however, beyond the scope of this work and proposed here as an area of)awidthshow
541 90 gm
0.48843 0. 32 0.04884 0.(further research. Rainer Rueppels paper [Rue90] appears to provide a good basis for)awidthshow
557 90 gm
-0.05821 0.(developing a formalism for this purpose.)ashow
592 90 gm
1 fs
14 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.74998 0.(3.5)ashow
592 126 gm
2.46749 0. 32 0.24674 0.(On the Placement of Security Functions)awidthshow
624 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.14102 0.(Originally the OSI reference model was based on the assumption that all communication)ashow
640 90 gm
1.21185 0. 32 0.12118 0.(is connection oriented and end-to-end from the transport layer up. Connectionless)awidthshow
656 90 gm
0.66055 0. 32 0.06605 0.(transport service was later included because it is more natural with the client-server)awidthshow
672 90 gm
1.71630 0. 32 0.17163 0.(model. Also relayed services, mainly electronic mail, are becoming increasingly)awidthshow
688 90 gm
0.69030 0. 32 0.06903 0.(important. As discussed earlier, the basic OSI model is not very well suited for this)awidthshow
704 90 gm
0.16128 0. 32 0.01612 0.(kind of use and leaves lots of the functionality of such services outside the OSI world)awidthshow
720 90 gm
-0.13810 0.(and entirely to the application.)ashow
F T cp
%%Page: ? 44
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(41)show
802 288 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.26266 0. 32 0.12626 0.(In a connection-oriented end-to-end service a transport connection is dedicated to)awidthshow
117 90 gm
1.61834 0. 32 0.16183 0.(serving one end-to-end instance of communication. For this reason, any security)awidthshow
133 90 gm
-0.11007 0.(functions can be placed at the transport layer with end-to-end significance and sufficient)ashow
149 90 gm
-0.05827 0.(granularity.)ashow
181 90 gm
0.23468 0. 32 0.02346 0.(With a relayed service, such as MHS, the situation is in many ways analogous. In the)awidthshow
197 90 gm
0.27328 0. 32 0.02732 0.(OSI sense each hop is an instance of end-to-end communication. However, messages)awidthshow
213 90 gm
-0.08522 0.(of several users are transferred across the same connections and the messages are raised)ashow
229 90 gm
-0.12947 0.(to the level of the application process and stored at each intermediate node.)ashow
261 90 gm
0.13839 0. 32 0.01383 0.(From the user's \(or information system builder's\) point of view, each hop corresponds)awidthshow
277 90 gm
0.17013 0. 32 0.01701 0.(to one sub-network in the previous case. Similarly, the routing function performed by)awidthshow
293 90 gm
0.92651 0. 32 0.09265 0.(the MHS \(within the application\), based on the information on the envelope of the)awidthshow
309 90 gm
0.25360 0. 32 0.02536 0.(message, is comparable to internet routing. Finally, part of the envelope \(P2 in figure)awidthshow
325 90 gm
0.80108 0. 32 0.08010 0.(2-2\) and the message content is transferred truly end-to-end and corresponds to the)awidthshow
341 90 gm
-0.02644 0.(TPDU \(or NSDU\) in the previous case.)ashow
373 90 gm
0.06393 0. 32 0.00639 0.(Therefore, it is natural that functions which can be placed at the transport layer in true)awidthshow
389 90 gm
0.54580 0. 32 0.05458 0.(end-to-end communication shall be placed within the application in services such as)awidthshow
405 90 gm
0.33306 0.(MHS.)ashow
437 90 gm
1.50863 0. 32 0.15086 0.(In connection-oriented end-to-end communications, security measures at layers 1)awidthshow
453 90 gm
0.58059 0. 32 0.05805 0.(through 3 can be used to further enhance the security of the service but not alone to)awidthshow
469 90 gm
0.21759 0. 32 0.02175 0.(guarantee it. Some functions, such as traffic flow confidentiality, can only be reliably)awidthshow
485 90 gm
0.54794 0. 32 0.05479 0.(implemented at these layers. In MHS, security measures at layers 1 through 6 \(or 7\))awidthshow
501 90 gm
0.10650 0. 32 0.01065 0.(can be used to enhance security but true end-to-end security and sufficient granularity)awidthshow
517 90 gm
-0.13488 0.(can only be achieved in the application.)ashow
549 90 gm
0.48782 0. 32 0.04878 0.(If data is encrypted at layer N the headers of the PDUs of all the layers below N are)awidthshow
565 90 gm
-0.07281 0.(sent in cleartext and are susceptible to traffic analysis as well as manipulation. Network)ashow
581 90 gm
-0.00975 0.(Addresses need to be in cleartext, at least in the routing nodes within the network. The)ashow
597 90 gm
0.50949 0. 32 0.05094 0.(routers always can perform traffic analysis and therefore should be reasonably trust-)awidthshow
613 90 gm
0.45883 0. 32 0.04588 0.(worthy. However, Data Link or Physical Layer Encryption between two consecutive)awidthshow
629 90 gm
0.74707 0. 32 0.07470 0.(nodes or Traffic Padding at the Network or Data Link Layer can be used to protect)awidthshow
645 90 gm
-0.08573 0.(against traffic analysis on the links between the routers.)ashow
677 90 gm
1.02706 0. 32 0.10270 0.(There are a number of possible places for the above-mentioned security functions,)awidthshow
693 90 gm
0.82031 0. 32 0.08203 0.(especially Authentication, Integrity, and Confidentiality, in the information system.)awidthshow
709 90 gm
0.45532 0. 32 0.04553 0.(Here, a brief overview of the advantages and disadvantages of various placements is)awidthshow
725 90 gm
-0.03297 0.(given. The structure of the application layer is explained e.g. in [X.200] or [IS9545].)ashow
F T cp
%%Page: ? 45
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(42)show
802 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
1 fs
12 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.75003 0.(3.5.1)ashow
101 126 gm
4.05731 0. 32 0.40573 0.(Application Process)awidthshow
133 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.03558 0.(Placing these functions in the )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.03901 0.(Application Process)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.03538 0.( is a rather straight-forward solution.)ashow
149 90 gm
0.16677 0. 32 0.01667 0.(This approach, however, suffers from a number of shortcomings and should therefore)awidthshow
165 90 gm
-0.00595 0.(be avoided. Among the reasons why this is not acceptable as a general solution are the)ashow
181 90 gm
-0.11027 0.(following:)ashow
213 90 gm
(-)show
213 126 gm
0.72067 0. 32 0.07206 0.(This means having to define and implement the same security functions and)awidthshow
229 126 gm
0.72570 0. 32 0.07257 0.(mechanisms separately for each application leading into excessive work and)awidthshow
245 126 gm
-0.10655 0.(needless duplication of functionality.)ashow
277 90 gm
(-)show
277 126 gm
-0.11189 0.(This approach contradicts the principle that security should be an integral part of)ashow
293 126 gm
-0.09745 0.(the communication service provided by OSI, functions and mechanism included)ashow
309 126 gm
-0.09367 0.(in the application process being mainly beyond the scope of OSI.)ashow
341 90 gm
1 fs
bu fc
2 F /|______Times-Bold fnt
bn
1.75003 0.(3.5.2)ashow
341 126 gm
2.60925 0. 32 0.26092 0.(Application and Presentation Layers)awidthshow
373 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.32943 0. 32 0.03294 0.(Security functions and mechanisms can be placed in the )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.50643 0. 32 0.05064 0.(Specific Application Service)awidthshow
389 90 gm
0.04446 0.(Elements)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.04714 0. 32 0.00471 0.( \()awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.05067 0.(SASEs)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.15899 0. 32 0.01589 0.(\) within the Application Layer of OSI. From the application process')awidthshow
405 90 gm
0.52185 0. 32 0.05218 0.(point of view, these security functions are then a part of the communication service.)awidthshow
421 90 gm
0.59494 0. 32 0.05949 0.(However, should another SASE need the same functions and mechanisms, they will)awidthshow
437 90 gm
-0.10691 0.(have to be rewritten for that SASE \(and application\).)ashow
469 90 gm
0.92727 0. 32 0.09272 0.(Security functions and mechanisms can also be placed in the common )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.27117 0.(Application)ashow
485 90 gm
1.45065 0. 32 0.14506 0.(Service Elements)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.26718 0. 32 0.02671 0.( \()awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.29023 0.(ASEs)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.54702 0. 32 0.05470 0.(\), such as the )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.24786 0. 32 0.12478 0.(Association Control Service Element)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.26718 0. 32 0.02671 0.( \()awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.32847 0.(ACSE)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(,)show
501 90 gm
0.62179 0. 32 0.06217 0.(defined in [IS8649, /A1, /A2, /A3, X.217] and [IS8650, /A1, /A4, X.227]\). The ser-)awidthshow
517 90 gm
0.34133 0. 32 0.03413 0.(vice is now available to many SASEs and the same implementation can serve a wide)awidthshow
533 90 gm
0.40206 0. 32 0.04020 0.(range of applications \(but not necessarily all of them\). For example, ACSE currently)awidthshow
549 90 gm
-0.10961 0.(provides the means to exchange authentication information coming from the SASE, still)ashow
565 90 gm
-0.11732 0.(leaving much of the functionality to the SASE.)ashow
597 90 gm
-0.07897 0.(A natural solution to avoid duplicating the security functionality for each SASE and yet)ashow
613 90 gm
-0.03993 0.(avoid the limitations of ACSE is to add another Common Application Service Element)ashow
629 90 gm
-0.02017 0.(positioned between ACSE and the SASEs, namely the Secure Communication Service)ashow
645 90 gm
-0.00778 0.(Element \(SCSE as proposed in [NS89]\).)ashow
677 90 gm
0.49835 0. 32 0.04983 0.(Figure 3-5 illustrates the security architecture of an application, such as FTAM. The)awidthshow
693 90 gm
0.86318 0. 32 0.08631 0.(SASE relies on the security services offered by the SCSE. SCSE interacts with the)awidthshow
709 90 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.90521 0. 32 0.19052 0.(Security Management Information Base)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.38253 0. 32 0.03825 0.( \()awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.44818 0.(SMIB)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.30126 0. 32 0.13012 0.(\) and the X.500 Directory Service)awidthshow
725 90 gm
0.79620 0. 32 0.07962 0.(\(X.509, for distributing certified public keys\). SCSE in turn uses the authentication)awidthshow
741 90 gm
-0.10913 0.(exchange mechanism of the ACSE.)ashow
F T cp
%%Page: ? 46
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(43)show
802 288 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.42770 0. 32 0.04277 0.(The functions that naturally belong to the SCSE are )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.12213 0.(Authentication)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.35079 0. 32 0.03507 0.( \(with the help of)awidthshow
117 90 gm
0.34011 0. 32 0.03401 0.(ACSE\), )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.06527 0.(Integrity)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.13275 0. 32 0.01327 0.( and )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.06825 0.(Confidentiality)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.27359 0. 32 0.02735 0.( \(especially Selective Field versions of the latter)awidthshow
133 90 gm
1.07513 0. 32 0.10751 0.(two\).To complement the services that SCSE produces using its own functions and)awidthshow
149 90 gm
-0.01379 0.(mechanisms, it also uses the presentation context management service of the Presenta-)ashow
165 90 gm
-0.10221 0.(tion Layer and the bulk integrity and confidentiality service provided by the )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.13505 0.(End-to-End)ashow
181 90 gm
-0.08489 0.(Security Protocol)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.05986 0.( \()ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.11979 0.(EESP)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.08537 0.(\) [ISO90a] at the Transport Layer.)ashow
213 90 gm
-0.01002 0.(In [ZE90] it is proposed that the simple one-way authentication mechanism of the cur-)ashow
229 90 gm
-0.08680 0.(rent FTAM protocol be extended to provide strong authentication. A working prototype)ashow
245 90 gm
-0.06318 0.(of this scheme has been implemented at Swedish Telecom. While this approach has the)ashow
261 90 gm
0.27481 0. 32 0.02748 0.(advantage of complying with the standards as far as possible it cannot be expected to)awidthshow
277 90 gm
1 2 lw
-0.10041 0.(gain ground because of its application specific and ad-hoc nature.)ashow
329 395 gm
(nc 297 101 614 492 6 rc)kp
0 gr
392 395 lin
1 1 lw
0 0 pen
392 395 lin
1 1 pen
365 449 gm
408 449 lin
315 472 gm
414 472 lin
428 411 gm
572 411 lin
psb
pse
nc ct 39 0 put
64 gr
qf
311 332 gm
pt
311 490 pl
334 490 pl
334 332 pl
311 332 pl
ef
0 gr
eu
(nc 297 101 614 492 6 rc)kp
327 363 gm
0.01074 0 rmoveto
1 setTxMode
bu fc
2 F /|______Times-Roman fnt
bn
(SASE \(e.g. FTAM\))show
psb
pse
nc ct 39 0 put
64 gr
qf
455 332 gm
pt
455 490 pl
478 490 pl
478 332 pl
455 332 pl
ef
0 gr
eu
(nc 297 101 614 492 6 rc)kp
470 366 gm
1 setTxMode
-0.13452 0.(Presentation Layer)ashow
psb
pse
nc ct 39 0 put
64 gr
qf
383 332 gm
pt
383 435 pl
406 435 pl
406 332 pl
383 332 pl
ef
0 gr
eu
(nc 297 101 614 492 6 rc)kp
399 350 gm
1 setTxMode
-0.06652 0.(ACSE/Add. 1)ashow
psb
pse
nc ct 39 0 put
64 gr
qf
406 332 gm
pt
406 490 pl
428 490 pl
428 332 pl
406 332 pl
ef
0 gr
eu
(nc 297 101 614 492 6 rc)kp
421 396 gm
1 setTxMode
-0.22259 0.(ACSE)ashow
psb
pse
nc ct 39 0 put
64 gr
qf
347 332 gm
pt
347 463 pl
370 463 pl
370 332 pl
347 332 pl
ef
0 gr
eu
(nc 297 101 614 492 6 rc)kp
363 382 gm
1.49560 0 rmoveto
1 setTxMode
1 fs
bu fc
2 F /|______Times-Bold fnt
bn
(SCSE)show
psb
pse
nc ct 39 0 put
64 gr
qf
369 112 gm
pt
369 172 pl
430 172 pl
430 112 pl
369 112 pl
ef
0 gr
eu
(nc 297 101 614 492 6 rc)kp
390 126 gm
0.66845 0 rmoveto
1 setTxMode
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(X.500)show
402 118 gm
-0.24620 0.(Directory)ashow
414 123 gm
0.67529 0 rmoveto
(\(X.509\))show
64 gr
537 102 561 180 0 90 1 ar
0 gr
537.5 102.5 560.5 179.5 0 90 0 ar
64 gr
537 103 561 181 90 180 1 ar
0 gr
537.5 103.5 560.5 180.5 90 180 0 ar
477 179 gm
549 179 lin
477 103 gm
549 103 lin
64 gr
463 103 491 180 1 ov
0 gr
463.5 103.5 490.5 179.5 0 ov
524 127 gm
1 setTxMode
-0.11160 0.(SMIB)ashow
64 gr
311 217 613 294 1 rc
0 gr
311.5 217.5 612.5 293.5 0 rc
453 234 gm
1 setTxMode
-0.14059 0.(Security)ashow
465 233 gm
-0.27314 0.(Manage-)ashow
477 244 gm
-0.33134 0.(ment)ashow
0 gr
392 169 404 181 340 380 1 ar
392 211 404 223 160 200 1 ar
398 212 gm
398 180 lin
513 211 525 223 160 200 1 ar
513 175 525 187 340 380 1 ar
519 186 gm
519 212 lin
354 288 366 300 340 380 1 ar
354 326 366 338 160 200 1 ar
360 327 gm
360 299 lin
64 gr
563 331 613 491 1 rc
0 gr
563.5 331.5 612.5 490.5 0 rc
588 490 gm
588 331 lin
579 401 gm
1 setTxMode
(TP4)show
603 396 gm
0.99560 0 rmoveto
1 fs
bu fc
2 F /|______Times-Bold fnt
bn
(EESP)show
0 gr
595 287 607 299 340 380 1 ar
595 325 607 337 160 200 1 ar
601 326 gm
601 298 lin
561 362 gm
1 setTxMode
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.10792 0.(Transport  Layer)ashow
psb
pse
nc ct 39 0 put
64 gr
qf
509 332 gm
pt
509 490 pl
532 490 pl
532 332 pl
509 332 pl
ef
0 gr
eu
(nc 297 101 614 492 6 rc)kp
524 378 gm
1 setTxMode
-0.05340 0.(Session Layer)ashow
0 gr
462 288 474 300 340 380 1 ar
462 326 474 338 160 200 1 ar
468 327 gm
468 299 lin
308 366 gm
1 setTxMode
-0.22671 0.(Application Layer)ashow
645 90 gm
(nc 30 28 811 566 6 rc)kp
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.26438 0.(Figure 3-5:)ashow
645 162 gm
-0.15039 0.(The proposed security architecture for an application such as FTAM.)ashow
677 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.06820 0. 32 0.00682 0.(In [NS89] the )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.02261 0.(non-repudiation)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.08483 0. 32 0.00848 0.( function is completely ignored \(not even explicitly left)awidthshow
693 90 gm
1.15036 0. 32 0.11503 0.(outside the scope of the paper\), probably because of its strong dependency on the)awidthshow
709 90 gm
0.28411 0. 32 0.02841 0.(application. However, the SCSE is also a natural place for a )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.61187 0. 32 0.06118 0.(generic non-repudiation)awidthshow
725 90 gm
0.09826 0.(function)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.35476 0. 32 0.03547 0.(. This function can provide non-repudiation of the sending of an )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.11192 0.(Application)ashow
741 90 gm
-0.00648 0.(Protocol Data Unit)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
( \()show
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
(APDU)show
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.00598 0.(\) without any regard to its semantics. This service can then)ashow
757 90 gm
-0.05465 0.(be utilized by a variety of SASEs for various purposes. In this respect it is analogous to)ashow
F T cp
%%Page: ? 47
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(44)show
802 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
85 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.30294 0. 32 0.13029 0.(the )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
3.61450 0. 32 0.36145 0.(synchronization function)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.94046 0. 32 0.19404 0.( provided by the Session Layer with no semantics)awidthshow
101 90 gm
-0.07794 0.(associated with the synchronization points.)ashow
133 90 gm
0.96664 0. 32 0.09666 0.(It is assumed in [NS89] that Selective Field Confidentiality should be provided by)awidthshow
149 90 gm
0.06790 0. 32 0.00679 0.(dividing a )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.10330 0. 32 0.01033 0.(Presentation Service Data Unit)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
( \()show
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.03146 0.(PSDU)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.06332 0. 32 0.00633 0.( = APDU\) into several )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.02288 0.(Presentation)ashow
165 90 gm
-0.07546 0.(Protocol Data Units)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.05116 0.( \()ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.10726 0.(PPDUs)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.07409 0.(\), where each PPDU would be entirely encrypted or clear-)ashow
181 90 gm
0.41793 0. 32 0.04179 0.(text. The reason given for this is, that the current presentation layer does not support)awidthshow
197 90 gm
-0.07669 0.(the use of more than one )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.08033 0.(Presentation Context)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.08361 0.( \(Transfer Syntax\) with one PPDU.)ashow
229 90 gm
0.07858 0. 32 0.00785 0.(The approach proposed in [NS89] has several serious shortcomings, among which are)awidthshow
245 90 gm
-0.12713 0.(the following:)ashow
277 90 gm
(-)show
277 126 gm
0.91491 0. 32 0.09149 0.(The segmentation and reassembly of the PSDU \(APDU\) at the Presentation)awidthshow
293 126 gm
0.86944 0. 32 0.08694 0.(Layer introduces a new complicated mechanism causing major changes and)awidthshow
309 126 gm
-0.10096 0.(excessive over-head at the Presentation Layer.)ashow
341 90 gm
(-)show
341 126 gm
0.27908 0. 32 0.02790 0.(The need to change Presentation Contexts between each resulting PPDU adds)awidthshow
357 126 gm
-0.05096 0.(further to this over-head.)ashow
389 90 gm
1.58676 0. 32 0.15867 0.(In fact, this extra complexity appears to be completely unnecessary. A proposed)awidthshow
405 90 gm
-0.10032 0.(simpler solution is the following:)ashow
437 90 gm
(-)show
437 126 gm
-0.00292 0.(Enhance the ASN.1 data definition language [IS8824, IS8824/A1, X.208] \(and)ashow
453 126 gm
1.12777 0. 32 0.11277 0.(the associated Abstract Syntax\) to include qualifiers )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.30296 0.(Encrypted)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.51589 0. 32 0.05158 0.( and )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.36120 0.(Signed)ashow
469 126 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.11434 0.(applicable to any \(structured\) data type.)ashow
501 90 gm
(-)show
501 126 gm
-0.09503 0.(Define Transfer Syntaxes capable of handling these new data types.)ashow
533 90 gm
0.49667 0. 32 0.04966 0.(It is obvious that the macro facility of the ASN.1 definition language will undergo a)awidthshow
549 90 gm
0.17395 0. 32 0.01739 0.(total renovation in the near future for reasons discussed e.g. in [Ros90]. It is also pro-)awidthshow
565 90 gm
0.43395 0. 32 0.04339 0.(bable, that ASN.1 and its )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.70220 0. 32 0.07022 0.(Basic Encoding Rules)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.64575 0. 32 0.06457 0.( \(BER\) [IS8825, IS8825/A1, X.209])awidthshow
581 90 gm
-0.10197 0.(will be extended to support cryptography instead leaving these things to be defined with)ashow
597 90 gm
0.21057 0. 32 0.02105 0.(macros. For reasons of both security and efficiency, BER should be redesigned in the)awidthshow
613 90 gm
0.14968 0. 32 0.01496 0.(near future. E.g. [HD89] proposes a transfer syntax which is claimed to be one to two)awidthshow
629 90 gm
0.78140 0. 32 0.07814 0.(orders of magnitude faster than BER. In the current version of the X.509 Authenti-)awidthshow
645 90 gm
-0.00231 0.(cation Framework [X.509], the following ASN.1 macro definitions for these functions)ashow
661 90 gm
-0.06211 0.(already exist \(see figure 3-6 below\).)ashow
693 90 gm
0.03646 0. 32 0.00364 0.(With the change in the roles of the Application and Presentation layers to be proposed)awidthshow
709 90 gm
0.56747 0. 32 0.05674 0.(here, the Application Layer would be responsible for performing the encryption and)awidthshow
725 90 gm
-0.08923 0.(signature functions while it would be the task of the Presentation Layer to negotiate and)ashow
741 90 gm
-0.09832 0.(manage the appropriate Presentation Contexts for this Security Context.)ashow
F T cp
%%Page: ? 48
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(45)show
802 288 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
99 126 gm
2 fs
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
-0.04100 0.(ENCRYPTED MACRO ::=)ashow
113 126 gm
0.41996 0.(BEGIN)ashow
127 126 gm
1.36291 0. 32 0.13629 0.(TYPE NOTATION)awidthshow
127 234 gm
-0.19551 0.(::= type \(ToBeEnciphered\))ashow
141 126 gm
1.59881 0. 32 0.15988 0.(VALUE NOTATION)awidthshow
141 234 gm
0.29296 0. 32 0.02929 0.(::= value \(VALUE BIT STRING\))awidthshow
155 126 gm
(END)show
185 126 gm
-0.07055 0.(SIGNED MACRO ::=)ashow
199 126 gm
0.41996 0.(BEGIN)ashow
213 126 gm
1.36291 0. 32 0.13629 0.(TYPE NOTATION)awidthshow
213 234 gm
-0.10221 0.(::= type \(ToBeSigned\))ashow
227 126 gm
1.59881 0. 32 0.15988 0.(VALUE NOTATION)awidthshow
227 234 gm
-0.15922 0.(::= value \(VALUE)ashow
241 162 gm
0.23458 0.(SEQUENCE{)ashow
255 198 gm
0.20129 0.(ToBeSigned,)ashow
269 198 gm
-0.06900 0.(AlgorithmIdentifier,)ashow
283 198 gm
-0.13354 0.(-- of the algorithm usedto compute the signature)ashow
297 162 gm
1.13830 0. 32 0.11383 0.(ENCRYPTED OCTET STRING)awidthshow
311 162 gm
-0.13899 0.(-- where the octet string is the result)ashow
325 162 gm
0.27328 0. 32 0.02732 0.(-- of the hashing of the value of 'ToBeSigned' --})awidthshow
339 126 gm
0.52337 0. 32 0.05233 0.(END -- of SIGNED. \))awidthshow
369 126 gm
0.42404 0. 32 0.04240 0.(SIGNATURE MACRO ::=)awidthshow
383 126 gm
0.41996 0.(BEGIN)ashow
397 126 gm
1.36291 0. 32 0.13629 0.(TYPE NOTATION)awidthshow
397 234 gm
-0.22450 0.(::= type \(OfSignature\))ashow
411 126 gm
1.59881 0. 32 0.15988 0.(VALUE NOTATION)awidthshow
411 234 gm
-0.15922 0.(::= value \(VALUE)ashow
425 162 gm
0.23458 0.(SEQUENCE{)ashow
439 198 gm
-0.06900 0.(AlgorithmIdentifier,)ashow
453 198 gm
-0.13354 0.(-- of the algorithm usedto compute the signature)ashow
467 162 gm
1.13830 0. 32 0.11383 0.(ENCRYPTED OCTET STRING)awidthshow
481 162 gm
-0.09320 0.(-- where the octet string is a function \(e.g. a compressed or hashed)ashow
495 162 gm
-0.01179 0.(-- version\) of the value 'OfSignature', which may include the)ashow
509 162 gm
-0.11196 0.(-- identifier of the algorithm used to compute the signature --})ashow
523 126 gm
0.93521 0. 32 0.09352 0.(END -- of SIGNATURE. \))awidthshow
555 90 gm
-0.26438 0.(Figure 3-6:)ashow
555 162 gm
1.04537 0. 32 0.10453 0.(ASN.1 macros ENCRYPTED, SIGNED and SIGNATURE [X.509].)awidthshow
587 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.00596 0.(In practise, data to be signed would first be transformed into a Canonical Form \(that is)ashow
603 90 gm
0.33615 0. 32 0.03361 0.(a fixed Transfer Syntax applicable to this Security Context, such as the ASN.1 BER\))awidthshow
619 90 gm
0.67977 0. 32 0.06797 0.(and then encrypted \(with the key applicable to this Security Context\). The resulting)awidthshow
635 90 gm
0.77270 0. 32 0.07727 0.(binary data would then be handed over to the Presentation Layer as an octet string.)awidthshow
651 90 gm
-0.11663 0.(With our new arrangement the Presentation Layer is no longer interested in the structure)ashow
667 90 gm
-0.04696 0.(or semantics of the PSDU, which is in harmony with the Layer Independence Principle)ashow
683 90 gm
-0.09941 0.(of the OSI reference model.)ashow
715 90 gm
1.11877 0. 32 0.11187 0.(As for signing data, a Digital Signature Scheme applicable to the current Security)awidthshow
731 90 gm
0.34835 0. 32 0.03483 0.(Context is employed in way similar to that described above for encryption. Here it is)awidthshow
747 90 gm
1.26861 0. 32 0.12686 0.(also possible to describe the Digital Signature mechanism in terms of ASN.1 and)awidthshow
F T cp
%%Page: ? 49
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(46)show
802 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
85 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.30294 0. 32 0.13029 0.(employing a PKC without ever using the key word )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.39636 0.(Signed)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.19140 0. 32 0.11914 0.(. However, the )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.47563 0.(Signed)ashow
101 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.00970 0.(qualifier still needs to be included in the ASN.1 definition language in order to respect)ashow
117 90 gm
-0.03327 0.(the orthogonality of Signature and Public Key Encryption and facilitate possible future)ashow
133 90 gm
-0.11837 0.(Digital Signature Schemes.)ashow
165 90 gm
-0.07319 0.(According to the OSI reference model [X.200], the Presentation Layer provides session)ashow
181 90 gm
0.20019 0. 32 0.02001 0.(services and the following facilities: )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.27008 0. 32 0.02700 0.(transformation of syntax)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.09399 0. 32 0.00939 0.( and )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.22888 0. 32 0.02288 0.(selection of syntax)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(.)show
197 90 gm
-0.12384 0.(There are three syntactic versions of the data: the syntax used by the originating applica-)ashow
213 90 gm
0.06729 0. 32 0.00672 0.(tion entity, the syntax used by the receiving application entity \(the local syntaxes\) and)awidthshow
229 90 gm
-0.06610 0.(the syntax used between the presentation entities \(the transfer syntax\). The presentation)ashow
245 90 gm
1.54586 0. 32 0.15458 0.(layer contains functions necessary to transform between these syntaxes and each)awidthshow
261 90 gm
-0.09751 0.(presentation entity must know the syntax used by its application entity.)ashow
293 90 gm
-0.06341 0.(In the OSI reference model the principles used to determine the seven layers of OSI are)ashow
309 90 gm
-0.06498 0.(given. Among these principles are the following [X.200]:)ashow
341 90 gm
(P2:)show
341 126 gm
0.03906 0. 32 0.00390 0.(create a boundary at a point where the description of services can be small and)awidthshow
357 126 gm
-0.12573 0.(the number of interactions across the boundary are minimized;)ashow
389 90 gm
(P5:)show
389 126 gm
1.34536 0. 32 0.13453 0.(select boundaries at a point which past experience has demonstrated to be)awidthshow
405 126 gm
-0.06903 0.(successful; and)ashow
437 90 gm
(P9:)show
437 126 gm
1.25625 0. 32 0.12562 0.(allow changes of functions or protocols to be made within a layer without)awidthshow
453 126 gm
-0.08784 0.(affecting other layers.)ashow
485 90 gm
-0.07600 0.(However, the current boundary between the application layer and the presentation layer)ashow
501 90 gm
0.22171 0. 32 0.02217 0.(seems to violate all of these three principles. With the current division data structures)awidthshow
517 90 gm
0.02349 0. 32 0.00234 0.(should be passed between the Application and Presentation Layers in the local syntax.)awidthshow
533 90 gm
0.04241 0. 32 0.00424 0.(Consequently, Presentation Layer would need to know about the structure of Applica-)awidthshow
549 90 gm
-0.07447 0.(tion PDUs to be able to convert between the local and transfer syntaxes. This creates an)ashow
565 90 gm
0.31112 0. 32 0.03111 0.(unnecessary dependency between the two layers and causes any changes made in the)awidthshow
581 90 gm
0.31982 0. 32 0.03198 0.(application layer PDUs to affect the presentation layer. Real implementation work of)awidthshow
597 90 gm
1.05300 0. 32 0.10530 0.(open systems, such as the work with C-VOPS [Kar87], has shown that in practice)awidthshow
613 90 gm
-0.10729 0.(syntax conversions have to be performed at the Application Layer.)ashow
645 90 gm
-0.09925 0.(The division of responsibilities between the Application and Presentation Layers should)ashow
661 90 gm
0.05203 0. 32 0.00520 0.(be revised. The proposed remedy is to let the Application Layer be responsible for the)awidthshow
677 90 gm
-0.02938 0.(conversions between the local and transfer syntaxes and only leave the negotiation and)ashow
693 90 gm
-0.10751 0.(management of Presentation Contexts to the Presentation Layer.)ashow
F T cp
%%Page: ? 50
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(47)show
802 288 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.10589 0.(Among the benefits of this new arrangement would the following:)ashow
133 90 gm
(-)show
133 126 gm
-0.11134 0.(In the new arrangement the Service Data Units transferred between any two OSI)ashow
149 126 gm
0.08346 0. 32 0.00834 0.(layers would be included in the Data PDUs of the lower layer as such, without)awidthshow
165 126 gm
0.54611 0. 32 0.05461 0.(any modifications, except possible encryption. No layer would need to know)awidthshow
181 126 gm
1.24923 0. 32 0.12492 0.(anything about the internal structure of its SDUs. That is, the Presentation)awidthshow
197 126 gm
-0.08076 0.(Layer would not need to know about the syntax of the Application PDUs.)ashow
229 90 gm
(-)show
229 126 gm
1.75811 0. 32 0.17581 0.(Encoding and decoding of APDUs could be done more efficiently in the)awidthshow
245 126 gm
0.18386 0. 32 0.01838 0.(Application Layer, without the need to pass control information related to this)awidthshow
261 126 gm
1.67404 0. 32 0.16740 0.(process between the two layers. This would also make the description of)awidthshow
277 126 gm
-0.11022 0.(services at the boundary between the application layer and the presentation layer)ashow
293 126 gm
-0.07078 0.(simpler \(see principle P2 above\).)ashow
325 90 gm
1.10885 0. 32 0.11088 0.(For the reasons stated above, practically all the upper layer security functions and)awidthshow
341 90 gm
-0.03337 0.(mechanisms, including data encryption, are actually placed in the Application Layer in)ashow
357 90 gm
0.35247 0. 32 0.03524 0.(this study. Only the definition and management of transfer syntaxes and presentation)awidthshow
373 90 gm
-0.10131 0.(contexts is left to the Presentation Layer.)ashow
405 90 gm
-0.08648 0.(Even though this may seem to be a fundamental change to the universally accepted OSI)ashow
421 90 gm
0.03799 0. 32 0.00379 0.(reference model it still can be done without serious consequences. OSI should only be)awidthshow
437 90 gm
0.71075 0. 32 0.07107 0.(concerned with the external protocol properties of telecommunications systems, not)awidthshow
453 90 gm
0.84579 0. 32 0.08457 0.(with their internals. The modification proposed here would not change the external)awidthshow
469 90 gm
-0.08702 0.(behavior of an open systems, only make it internally cleaner.)ashow
501 90 gm
-0.00175 0.(The architecture proposed in [NS89] has since then been developed further by a group)ashow
517 90 gm
0.19378 0. 32 0.01937 0.(of Korean experts who have also implemented their SCSE proposal to run on a Sun 3)awidthshow
533 90 gm
0.44418 0. 32 0.04441 0.(workstation and ISODE 5.0 [ISO90f]. The paper discusses the functions of authenti-)awidthshow
549 90 gm
1.37802 0. 32 0.13780 0.(cation, integrity and confidentiality. Plans for extending the design to cover non-)awidthshow
565 90 gm
1.41433 0. 32 0.14143 0.(repudiation and access control as well as for improving the efficiency of the test)awidthshow
581 90 gm
-0.12332 0.(implementation were also mentioned in this paper.)ashow
613 90 gm
1 fs
bu fc
2 F /|______Times-Bold fnt
bn
1.75003 0.(3.5.3)ashow
613 126 gm
2.38739 0. 32 0.23873 0.(The Lower Layers)awidthshow
645 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.64468 0. 32 0.06446 0.(Most security functions and mechanisms can be placed at the Transport or Network)awidthshow
661 90 gm
0.27038 0. 32 0.02703 0.(Layers of OSI, so that they are available for various protocol stacks and applications.)awidthshow
677 90 gm
0.24078 0. 32 0.02407 0.(The main difference between placing these functions and mechanisms into one or the)awidthshow
693 90 gm
0.48141 0. 32 0.04814 0.(other of these two layers is that a transport connection is always serving exactly one)awidthshow
709 90 gm
0.19424 0. 32 0.01942 0.(instance of application level communication between two systems whereas a network)awidthshow
725 90 gm
-0.11599 0.(connection can be multiplexed among several transport connections.)ashow
F T cp
%%Page: ? 51
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(48)show
802 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.08633 0.(Also, in connectionless-mode communication, datagrams at the Network layer are host-)ashow
117 90 gm
0.18203 0. 32 0.01820 0.(to-host, whereas datagrams at the Transport Layer are process-to-process \(that is they)awidthshow
133 90 gm
0.24185 0. 32 0.02418 0.(serve one instance of process-to-process communications, or one application associa-)awidthshow
149 90 gm
0.10101 0. 32 0.01010 0.(tion\). Even though functions and mechanisms placed in the upper part of the Network)awidthshow
165 90 gm
-0.06692 0.(Layer can provide end-to-end security functions \(in the host-to-host sense\) they cannot,)ashow
181 90 gm
0.23254 0. 32 0.02325 0.(in general, provide sufficient granularity, that is they cannot be focused on individual)awidthshow
197 90 gm
1.69708 0. 32 0.16970 0.(instances of user-to-user communication. For these reasons, the Transport Layer)awidthshow
213 90 gm
-0.09428 0.(usually is a better place for these functions and mechanisms than the Network layer.)ashow
245 90 gm
0.72036 0. 32 0.07203 0.(Unfortunately the question of placing certain functions at the Transport or Network)awidthshow
261 90 gm
1.37207 0. 32 0.13720 0.(layer often becomes a political issue. Transport layer being end-to-end, functions)awidthshow
277 90 gm
1.80389 0. 32 0.18038 0.(placed in the Transport layer or above it are entirely in the domain of terminal)awidthshow
293 90 gm
0.53390 0. 32 0.05339 0.(equipment and outside the control of teleoperators. For this reason there is usually a)awidthshow
309 90 gm
1.78237 0. 32 0.17823 0.(strong tendency to place functions and mechanisms in the Network \(rather than)awidthshow
325 90 gm
-0.12376 0.(Transport\) layer among the teleoperators participating in international standardization. It)ashow
341 90 gm
-0.10424 0.(is anticipated that the current liberalization trend in the area of telecommunications will,)ashow
357 90 gm
-0.06977 0.(in the long run, solve these political problems.)ashow
F T cp
%%Page: ? 52
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(49)show
802 288 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
110 90 gm
1 fs
18 fz
bu fc
2 F /|______Times-Bold fnt
bn
(4)show
110 126 gm
2.39562 0. 32 0.23956 0.(A Secure General Purpose OSI Protocol)awidthshow
128 126 gm
0.50201 0.(Stack)ashow
161 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.03958 0. 32 0.10395 0.(In this chapter we shall place the security functions and mechanisms that we have)awidthshow
177 90 gm
0.13412 0. 32 0.01341 0.(discussed in the preceding chapter and in the appendix into the layers of OSI and find)awidthshow
193 90 gm
-0.00170 0.(the appropriate mechanisms for realizing them. This placement is based on the criteria)ashow
209 90 gm
0.77972 0. 32 0.07797 0.(and considerations presented in chapter 3 and the appendix. To keep the work on a)awidthshow
225 90 gm
0.04043 0. 32 0.00404 0.(sufficiently general level, we do not not employ actual low-level mechanisms, such as)awidthshow
241 90 gm
1.25 0. 32 0.125 0.(cryptosystems, but keep the discussion on the level of protocol logic and abstract)awidthshow
257 90 gm
0.13076 0. 32 0.01307 0.(cryptographic mechanisms. Low-level mechanisms are dealt with in chapters 6 and 7,)awidthshow
273 90 gm
0.41824 0. 32 0.04182 0.(where real cryptosystems, real software environments, and concrete modifications to)awidthshow
289 90 gm
-0.06375 0.(the existing protocols and their PDUs are suggested.)ashow
321 90 gm
0.54199 0. 32 0.05419 0.(The functions and mechanisms are placed into a general purpose OSI protocol stack)awidthshow
337 90 gm
0.98983 0. 32 0.09898 0.(which can be used for various kinds of applications. Both connection-oriented and)awidthshow
353 90 gm
-0.05012 0.(connectionless communications are considered and the same protocol stack can also be)ashow
369 90 gm
-0.06999 0.(used to enhance the security of relayed services such as MHS.)ashow
401 90 gm
-0.09054 0.(Our goal here is as general a solution as possible, applicable to a large group of services)ashow
417 90 gm
1.19781 0. 32 0.11978 0.(and not tied into existing cryptosystems or protocols. It is realized that individual)awidthshow
433 90 gm
0.16204 0. 32 0.01620 0.(cryptosystems and even protocols will evolve and the solutions presented here should)awidthshow
449 90 gm
-0.11015 0.(outlive them.)ashow
481 90 gm
-0.02569 0.(In order to accommodate for a number of various applications, options for using or not)ashow
497 90 gm
-0.08068 0.(using various security functions need to be provided. Depending on the requirements of)ashow
513 90 gm
0.00930 0. 32 0.00093 0.(the specific application and economical reasons we may, for example, want to encrypt)awidthshow
529 90 gm
-0.06156 0.(all, some or none of the data being transferred.)ashow
561 90 gm
0.34667 0. 32 0.03466 0.(One instance of using a service across a network is illustrated in figure 2-1. Layers 1)awidthshow
577 90 gm
1.09268 0. 32 0.10926 0.(through 3 of the OSI system are shared among various users, services and service)awidthshow
593 90 gm
0.87356 0. 32 0.08735 0.(instances. It is therefore not feasible to implement security functions focusing on a)awidthshow
609 90 gm
0.53146 0. 32 0.05314 0.(single service instance in these layers. It is possible to embed security functions and)awidthshow
625 90 gm
-0.02139 0.(mechanisms in the lower layers, but they will only be effective across one hop or host-)ashow
641 90 gm
-0.06507 0.(to-host, not from application process to application process.)ashow
673 90 gm
-0.06942 0.(Some possible uses of security functions in layers 1 through 3 are the following:)ashow
705 90 gm
(-)show
705 126 gm
0.13244 0. 32 0.01324 0.(Use of physical layer encryption to provide for traffic flow confidentiality and)awidthshow
721 126 gm
-0.13761 0.(encryption of all traffic across a critical communication link.)ashow
F T cp
%%Page: ? 53
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(50)show
802 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(-)show
101 126 gm
0.65093 0. 32 0.06509 0.(Use of data link level encryption on an untrusted link \(such as radio link\) or)awidthshow
117 126 gm
-0.03132 0.(authentication, confidentiality, and integrity functions between pairs of stations)ashow
133 126 gm
-0.08859 0.(on a broadcast medium \(such as Local Area Network or Packet Radio\).)ashow
165 90 gm
(-)show
165 126 gm
-0.04241 0.(Use of network level security functions to secure communications between two)ashow
181 126 gm
-0.03820 0.(hosts on the same subnetwork or across an internet.)ashow
213 90 gm
-0.00227 0.(Although access control should primarily be left to the application, it is often useful to)ashow
229 90 gm
0.73547 0. 32 0.07354 0.(have multilevel access control in a distributed environment in order to stop dummy)awidthshow
245 90 gm
-0.07933 0.(traffic and most attacks as early as possible.)ashow
277 90 gm
(-)show
277 126 gm
-0.05776 0.(Data link level access control can be used in broadcast media, such as LANs, to)ashow
293 126 gm
0.30883 0. 32 0.03088 0.(limit access from untrusted \(or to critical\) hosts or networks. For example, all)awidthshow
309 126 gm
-0.09870 0.(messages arriving from a gateway to a critical host can be ignored.)ashow
341 90 gm
(-)show
341 126 gm
0.65368 0. 32 0.06536 0.(Similarly, network level access control can be used to limit data flow to and)awidthshow
357 126 gm
-0.06823 0.(from critical hosts.)ashow
389 90 gm
0.21987 0. 32 0.02198 0.(However, these measures alone should never be considered adequate and they should)awidthshow
405 90 gm
2.22930 0. 32 0.22293 0.(only be used to limit the number of attacks ever reaching the upper layers of)awidthshow
421 90 gm
0.43212 0. 32 0.04321 0.(information systems. If most attacks can be dealt with at the lower layers of the host)awidthshow
437 90 gm
0.36483 0. 32 0.03648 0.(machines \(or even by dedicated gateways and other telecommunications equipment\),)awidthshow
453 90 gm
-0.06283 0.(more resources are spared to deal with the more serious attacks. All of these techniques)ashow
469 90 gm
-0.00979 0.(merely serve as supplementary measures and do not provide the granularity or level of)ashow
485 90 gm
0.72723 0. 32 0.07272 0.(service necessary for secure use of various services by various users across a large,)awidthshow
501 90 gm
(untrusted network.)show
533 90 gm
0.30654 0. 32 0.03065 0.(Because layers 4 through 7 are end-to-end and no multiplexing takes place above the)awidthshow
549 90 gm
1.04309 0. 32 0.10430 0.(transport layer, that is, each \(N\)-connection \(n=4,7\) serves exactly one application)awidthshow
565 90 gm
0.45196 0. 32 0.04519 0.(association \(service instance\), it seems natural that all security functions and mecha-)awidthshow
581 90 gm
0.10986 0. 32 0.01098 0.(nisms relating to a single service instance should be placed in these layers. Already in)awidthshow
597 90 gm
-0.09274 0.(1983 Voydock and Kent concluded that end-to-end security measures, accomplished by)ashow
613 90 gm
-0.04096 0.(adding security mechanisms in the high-level protocols \(those of layers 4 through 7\) of)ashow
629 90 gm
-0.01380 0.(OSI, are more appropriate in an OSI environment than link-oriented security measures)ashow
645 90 gm
0.11462 0.([VK83].)ashow
677 90 gm
1.13372 0. 32 0.11337 0.(This work gives the first concrete and complete suggestion as to how the security)awidthshow
693 90 gm
-0.05020 0.(functions and mechanisms described in the OSI Security Architecture should be placed)ashow
709 90 gm
-0.05865 0.(in the layer of OSI in such a way as to considerably limit the degree of freedom in their)ashow
725 90 gm
0.47790 0. 32 0.04779 0.(placement without affecting the level of security offered by the OSI system. A well-)awidthshow
741 90 gm
0.02319 0. 32 0.00231 0.(founded placement of these functions and mechanisms is assumed to be of great value)awidthshow
757 90 gm
-0.07768 0.(in defining and building secure open systems in the near future.)ashow
F T cp
%%Page: ? 54
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(51)show
802 288 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
104 90 gm
1 fs
14 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.74998 0.(4.1)ashow
104 126 gm
0.58303 0.(Authentication)ashow
136 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.54403 0. 32 0.15440 0.(In the open systems environment there are many types of entities which may be)awidthshow
152 90 gm
0.32638 0. 32 0.03263 0.(identified, such as physical entities \(e.g. real open systems\), logical entities \(e.g. OSI)awidthshow
168 90 gm
0.36087 0. 32 0.03608 0.(layer entities\) and human entities. Identification associates an identity with an entity.)awidthshow
184 90 gm
-0.09326 0.(The process of corroborating an identity is called authentication [IS10181-2].)ashow
216 90 gm
1 fs
bu fc
2 F /|______Times-Bold fnt
bn
1.75003 0.(4.1.1)ashow
216 126 gm
2.90786 0. 32 0.29078 0.(Authentication and its Significance with Various Services)awidthshow
248 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.07962 0.(As indicated earlier in this thesis, reliable authentication of the other party of communi-)ashow
264 90 gm
1.08016 0. 32 0.10801 0.(cation is probably the most urgent problem in today's integrating, world-wide net-)awidthshow
280 90 gm
-0.09281 0.(works. Authentication can be divided into two classes:)ashow
312 90 gm
(-)show
312 126 gm
-0.11882 0.(Peer Entity Authentication, used with connection-oriented communications.)ashow
344 90 gm
(-)show
344 126 gm
0.64468 0. 32 0.06446 0.(Data Origin Authentication, used with connectionless and relayed communi-)awidthshow
360 126 gm
(cations.)show
392 90 gm
-0.18162 0.(Peer Entity Authentication only authenticates the entity participating in the authentication)ashow
408 90 gm
1.39907 0. 32 0.13990 0.(exchange, it cannot alone guarantee that the other party remains the same during)awidthshow
424 90 gm
-0.09349 0.(subsequent communications over the established connection. In Peer Entity Authentica-)ashow
440 90 gm
-0.04115 0.(tion a secure exchange of a session key in connection with the authentication exchange)ashow
456 90 gm
-0.08868 0.(is needed for continued authentication. This leads into the need to not only sign but also)ashow
472 90 gm
-0.11109 0.(encrypt at least parts of the authentication messages.)ashow
504 90 gm
0.18127 0. 32 0.01812 0.(The secure exchange of a fresh pairwise session key completes the establishment of a)awidthshow
520 90 gm
0.58013 0. 32 0.05801 0.(Security Context, effective on this connection, where only the two mutually authen-)awidthshow
536 90 gm
0.57205 0. 32 0.05720 0.(ticated parties are in possession of this session key which can be used for continued)awidthshow
552 90 gm
-0.11401 0.(authentication as well as purposes of data confidentiality and integrity.)ashow
584 90 gm
0.06515 0. 32 0.00651 0.(When using a service across a network, we have to be able to reliably authenticate the)awidthshow
600 90 gm
0.06423 0. 32 0.00642 0.(other party. This means the user being able to authenticate the service and server he is)awidthshow
616 90 gm
-0.09159 0.(using and the server being able to authenticate the user and his end system.)ashow
648 90 gm
0.00717 0. 32 0.00071 0.(Ultimately, data security means giving only the legitimate )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
(users)show
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
( access to the data and)show
664 90 gm
0.57891 0. 32 0.05789 0.(services they are authorized to access. Therefore, it is essential that the user, not his)awidthshow
680 90 gm
0.40985 0. 32 0.04098 0.(system, be in possession of the keys required for authentication. However, it is often)awidthshow
696 90 gm
-0.10736 0.(necessary to authenticate the end system as well, to ensure that:)ashow
F T cp
%%Page: ? 55
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(52)show
802 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(-)show
101 126 gm
-0.03935 0.(A legitimate user is not trying to access the service from a disallowed host \(e.g.)ashow
117 126 gm
1.34872 0. 32 0.13487 0.(at gun-point from the enemy's system or voluntarily from a system whose)awidthshow
133 126 gm
-0.09730 0.(security cannot be guaranteed\).)ashow
165 90 gm
(-)show
165 126 gm
0.03921 0. 32 0.00392 0.(An illegitimate user is not using the service having first somehow obtained the)awidthshow
181 126 gm
-0.07833 0.(keys necessary for authentication.)ashow
213 90 gm
0.35812 0. 32 0.03581 0.(So, we need to be able to authenticate the service, its user, or both, depending on the)awidthshow
229 90 gm
-0.09902 0.(specific service and its security requirements.)ashow
261 90 gm
1 fs
bu fc
2 F /|______Times-Bold fnt
bn
1.75003 0.(4.1.2)ashow
261 126 gm
2.23968 0. 32 0.22396 0.(Placement of Authentication in the OSI model)awidthshow
293 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.38839 0. 32 0.13883 0.(The application layer is the appropriate place for authentication because only the)awidthshow
309 90 gm
0.64498 0. 32 0.06449 0.(application layer knows about various services, service instances etc. Therefore, the)awidthshow
325 90 gm
-0.09684 0.(service and its user can only be reliably, and with sufficient granularity, authenticated at)ashow
341 90 gm
-0.03147 0.(this layer.)ashow
373 90 gm
0.64758 0. 32 0.06475 0.(While the authentication function is provided by the Application Layer, parts of the)awidthshow
389 90 gm
0.39611 0. 32 0.03961 0.(functionality need to reside above the OSI model. When authenticating the user, it is)awidthshow
405 90 gm
-0.05160 0.(essential that he need not give his keys to the system, even though the application layer)ashow
421 90 gm
0.07507 0. 32 0.00750 0.(can provide the mechanism for user authentication. For example, a careful user would)awidthshow
437 90 gm
-0.07289 0.(never feed in his secret authentication and signature keys to an untrusted sales terminal.)ashow
453 90 gm
-0.08787 0.(However, it is necessary that the terminal be able to authenticate the user to the banking)ashow
469 90 gm
-0.08967 0.(system and have him approve the money transfer with his digital signature.)ashow
501 90 gm
0.72463 0. 32 0.07246 0.(The Authentication Function logically belongs to the proposed new common SASE)awidthshow
517 90 gm
0.78384 0. 32 0.07838 0.(called SCSE \(Secure Communications Service Element, see [NS89]\). SCSE can, in)awidthshow
533 90 gm
0.11260 0. 32 0.01126 0.(turn, use the authentication exchange mechanism defined in the security addendum of)awidthshow
549 90 gm
-0.10757 0.(the Association Control Service Element \(ACSE\) [IS8649/A1].)ashow
581 90 gm
1.67266 0. 32 0.16726 0.(As an intermediate solution, it is possible to offer authentication function at the)awidthshow
597 90 gm
2.48916 0. 32 0.24891 0.(transport layer. The proposed secure "network" \(or in fact transport\) protocol)awidthshow
613 90 gm
-0.05976 0.([ISO90a,b] provides us with this option and the secret information used in the authenti-)ashow
629 90 gm
-0.05778 0.(cation can still be supplied from the upper layers. While this is not a very neat solution,)ashow
645 90 gm
-0.09455 0.(it gives us most of the benefits of authentication at the application layer and can be used)ashow
661 90 gm
0.30242 0. 32 0.03024 0.(in connection with virtually any service without us having to wait for the upper layer)awidthshow
677 90 gm
-0.09062 0.(protocol standards to reach maturity.)ashow
709 90 gm
1 fs
bu fc
2 F /|______Times-Bold fnt
bn
1.75003 0.(4.1.3)ashow
709 126 gm
3.34472 0. 32 0.33447 0.(Authentication Mechanisms)awidthshow
741 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.09996 0.(The two-way authentication protocol described in the appendix can be realized by using)ashow
757 90 gm
1.18576 0. 32 0.11857 0.(the authentication information exchange facility of the ACSE Security Addendum)awidthshow
F T cp
%%Page: ? 56
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(53)show
802 288 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
85 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.00245 0.([IS8649/A1]. Because ACSE only provides us with the means for a two-way authenti-)ashow
101 90 gm
0.28549 0. 32 0.02854 0.(cation exchange, it is vital that we have a reliable two-way authentication protocol to)awidthshow
117 90 gm
-0.12213 0.(implement with ACSE.)ashow
152 90 gm
1 fs
14 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.74998 0.(4.2)ashow
152 126 gm
0.76719 0.(Integrity)ashow
184 90 gm
12 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.75003 0.(4.2.1)ashow
184 126 gm
2.88925 0. 32 0.28892 0.(Integrity and its Significance with Various Services)awidthshow
216 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.09780 0. 32 0.00978 0.(Together with Authentication, Data Integrity is usually considered the most important)awidthshow
232 90 gm
-0.06327 0.(security function. In fact, functions such as Authentication and Non-repudiation are not)ashow
248 90 gm
0.23437 0. 32 0.02343 0.(of much value if not combined with Integrity. Being able to know, or even prove, the)awidthshow
264 90 gm
1.47827 0. 32 0.14782 0.(identity of the other party is useless if we cannot be certain that the information)awidthshow
280 90 gm
1.04675 0. 32 0.10467 0.(exchanged has not been tampered with. Similarly, knowing that the information is)awidthshow
296 90 gm
-0.10221 0.(intact does not mean much if we cannot be sure whom it came from.)ashow
328 90 gm
1 fs
bu fc
2 F /|______Times-Bold fnt
bn
1.75003 0.(4.2.2)ashow
328 126 gm
2.15011 0. 32 0.21501 0.(Placement of Integrity in the OSI Model)awidthshow
360 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.14715 0. 32 0.11471 0.(According to the OSI reference model, the Transport Service provides transparent)awidthshow
376 90 gm
-0.09475 0.(transfer of data between session entities relieving them from any concern about how the)ashow
392 90 gm
0.67687 0. 32 0.06768 0.(reliable and cost-effective transfer of data is achieved. The functions invoked at the)awidthshow
408 90 gm
0.09552 0. 32 0.00955 0.(transport layer to provide the requested quality of service depend on the quality of the)awidthshow
424 90 gm
0.39108 0. 32 0.03910 0.(underlying network service. The selected quality of service is maintained throughout)awidthshow
440 90 gm
-0.11067 0.(the lifetime of the transport connection and the session entity is notified of any failure to)ashow
456 90 gm
-0.08580 0.(maintain the required quality of service on the transport connection [X.200].)ashow
488 90 gm
-0.11277 0.(Among the end-to-end functions of Transport Layer already are the following: sequence)ashow
504 90 gm
0.61111 0. 32 0.06111 0.(control, error detection and monitoring of the quality of service, and error recovery.)awidthshow
520 90 gm
0.07965 0. 32 0.00796 0.(Because Transport Layer is responsible for end-to-end error detection and recovery, it)awidthshow
536 90 gm
-0.10765 0.(is natural to extend the error detection \(and correction\) functions and mechanisms of the)ashow
552 90 gm
1.13693 0. 32 0.11369 0.(transport layer to detect \(and as much as possible recover from\) malicious attacks)awidthshow
568 90 gm
-0.01754 0.(against integrity as well as transmission errors. Activation of these mechanisms can be)ashow
584 90 gm
-0.05166 0.(made easily, as an extension to the selection of functions describe above already taking)ashow
600 90 gm
-0.08732 0.(place when opening a transport connection.)ashow
632 90 gm
0.56579 0. 32 0.05657 0.(Being the lowest end-to-end layer, transport layer is the lowest possible layer for an)awidthshow
648 90 gm
-0.03897 0.(end-to-end integrity function and mechanism. This mechanism could also be placed on)ashow
664 90 gm
0.14785 0. 32 0.01478 0.(top of the network layer. However, this is not an acceptable solution because network)awidthshow
680 90 gm
1.32461 0. 32 0.13246 0.(connections can be multiplexed \(and in fact network service is increasingly often)awidthshow
696 90 gm
1.63970 0. 32 0.16397 0.(connectionless\). Only in layers 4 through 7 does each connection serve just one)awidthshow
712 90 gm
-0.01347 0.(instance of communications thereby offering sufficient granularity for the provision of)ashow
728 90 gm
-0.13641 0.(integrity and confidentiality.)ashow
F T cp
%%Page: ? 57
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(54)show
802 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.26251 0. 32 0.12625 0.(When using a sophisticated transport protocol, such as the ISO Class 4 Transport)awidthshow
117 90 gm
-0.08459 0.(Protocol \(ISO TP4\) or the Department of Defense Transmission Control Protocol \(DoD)ashow
133 90 gm
0.20126 0. 32 0.02012 0.(TCP\) [RFC81b], reliable end-to-end protection is provided against accidental modifi-)awidthshow
149 90 gm
-0.07954 0.(cations of the data stream between the two transport entities. In this case, strong end-to-)ashow
165 90 gm
1.66488 0. 32 0.16648 0.(end integrity is easily achieved by placing an encryption mechanisms below the)awidthshow
181 90 gm
-0.05642 0.(transport protocol as proposed in the appendix.)ashow
213 90 gm
0.13061 0. 32 0.01306 0.(It is, therefore, suggested that the Integrity Function be placed at the Transport Layer.)awidthshow
229 90 gm
0.18295 0. 32 0.01829 0.(This applies to both Connection-oriented and Connectionless Transport Service when)awidthshow
245 90 gm
-0.07482 0.(the integrity of the whole TPDU is to be ensured.)ashow
277 90 gm
0.13549 0. 32 0.01354 0.(With some applications, Selective Field Integrity is desired. This function needs to be)awidthshow
293 90 gm
0.55892 0. 32 0.05589 0.(provided at the Application Layer because no lower layer is capable of dealing with)awidthshow
309 90 gm
0.18234 0. 32 0.01823 0.(various fields of the APDU. It is suggested, that Selective Field Integrity be placed in)awidthshow
325 90 gm
0.47592 0. 32 0.04759 0.(the Secure Communications Service Element \(SCSE\) of the Application Layer. This)awidthshow
341 90 gm
1.85806 0. 32 0.18580 0.(arrangement requires some support from the Presentation Layer. New data type)awidthshow
357 90 gm
("Signed" has to be included in the ASN.1 specification language and transfer syntaxes)show
373 90 gm
-0.10517 0.(capable of handing this new data type need to be deviced.)ashow
405 90 gm
0.85601 0. 32 0.08560 0.(It is also possible to cope with just one new type "Encrypted" and define signature)awidthshow
421 90 gm
1.13861 0. 32 0.11386 0.(mechanisms based on encryption by means of ASN.1. However, this is not a neat)awidthshow
437 90 gm
0.39230 0. 32 0.03923 0.(solution because digital signatures should be considered separately from PKCs, even)awidthshow
453 90 gm
-0.04368 0.(though most current signature schemes are based on the use of PKCs.)ashow
485 90 gm
0.40649 0. 32 0.04064 0.(The use of transport layer gateways complicates the provision of end-to-end security)awidthshow
501 90 gm
-0.06462 0.(services at the transport layer, because then the transport connection is not truly end-to-)ashow
517 90 gm
-0.05252 0.(end. When this is the case, two approaches are possible:)ashow
549 90 gm
(-)show
549 126 gm
0.04882 0. 32 0.00488 0.(Use trusted gateways within your own organization. This approach contradicts)awidthshow
565 126 gm
-0.09382 0.(with our original goal of minimizing the use of trusted parties.)ashow
597 90 gm
(-)show
597 126 gm
-0.13232 0.(Use the selective field integrity function of the application layer.)ashow
629 90 gm
1 fs
bu fc
2 F /|______Times-Bold fnt
bn
1.75003 0.(4.2.3)ashow
629 126 gm
3.34777 0. 32 0.33477 0.(Integrity Mechanisms)awidthshow
661 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.96832 0. 32 0.09683 0.(Data Integrity is closely coupled with Confidentiality and can be provided with an)awidthshow
677 90 gm
1.92840 0. 32 0.19284 0.(Integrity Check Value calculated by using symmetric or asymmetric encryption)awidthshow
693 90 gm
-0.03425 0.(mechanisms. Usually data encryption, combined with redundancy in the cleartext data,)ashow
709 90 gm
-0.09020 0.(is sufficient to provide Integrity as a by-product of Confidentiality.)ashow
F T cp
%%Page: ? 58
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(55)show
802 288 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.06402 0.(With connection-oriented services, it is suggested that non-selective "bulk-integrity" be)ashow
117 90 gm
1.25396 0. 32 0.12539 0.(provided by means of a secure transport protocol of the type SP4, EESP, or their)awidthshow
133 90 gm
-0.05827 0.(derivatives.)ashow
165 90 gm
1.20254 0. 32 0.12025 0.(SP4 is an encapsulating protocol placed at the bottom of the Transport Layer and)awidthshow
181 90 gm
0.49346 0. 32 0.04934 0.(encrypting all TPDUs of the actual Transport Protocol. EESP is a derivative of SP4,)awidthshow
197 90 gm
-0.01440 0.(fixing some of the problems found in the preliminary SP4 specification. However, this)ashow
213 90 gm
-0.02186 0.(proposal too has some faults which need to be corrected. SP3 is the counterpart of SP4)ashow
229 90 gm
-0.06927 0.(placed at uppermost part of the network layer. An introduction to SP3 and SP4 is found)ashow
245 90 gm
0.47149 0. 32 0.04714 0.(in [Nel88] and to SP4 in [BDH88]. For more precise definitions of the protocols see)awidthshow
261 90 gm
1.25900 0. 32 0.12590 0.([SDN89a, SDN89b, ISO90b]. In [Hou89] a protocol based on SP4 is proposed to)awidthshow
277 90 gm
-0.03921 0.(enhance the Xerox XNS \(Xerox Network Systems\) protocol suite with the functions of)ashow
293 90 gm
0.09963 0. 32 0.00996 0.(authentication, confidentiality and integrity. SP4-like functionality is also proposed in)awidthshow
309 90 gm
-0.07756 0.([Bir85] to be used with remote procedure calls.)ashow
341 90 gm
-0.07646 0.(The protocols mentioned above always do offer Message Integrity. That is, they protect)ashow
357 90 gm
-0.04420 0.(each individual TPDU from modifications. With connection-oriented communications,)ashow
373 90 gm
-0.06327 0.(Message Integrity alone is not sufficient but Sequence Integrity is required. This means)ashow
389 90 gm
-0.09371 0.(that not only each TPDU but also the entire TPDU sequence is intact. That is, no TPDU)ashow
405 90 gm
-0.07801 0.(has been deleted, added, repeated, or misplaced without this being detected.)ashow
437 90 gm
0.44235 0. 32 0.04423 0.(Because the entire TPDU is encrypted, it is sufficient for Sequence Integrity that the)awidthshow
453 90 gm
0.27877 0. 32 0.02787 0.(TPDUs carry sequence numbers. This is the case with TP4 but, alas, not with TP0. If)awidthshow
469 90 gm
-0.01057 0.(TP0 is used the Security Protocol has to be augmented with sequence numbers. A pro-)ashow
485 90 gm
0.09399 0. 32 0.00939 0.(posal to that direction is found in [CGV90]. Also, the current EESP proposal does not)awidthshow
501 90 gm
-0.05398 0.(detect TPDUs omitted from the end of a transport connection if TP0 is used. TP4 again)ashow
517 90 gm
-0.06907 0.(has sufficient functionality \(a graceful disconnect procedure with negotiation of the last)ashow
533 90 gm
-0.10166 0.(TPDU sequence number\) to detect such attempts.)ashow
565 90 gm
0.17883 0. 32 0.01788 0.(It is suggested, that a pairwise session key be generated for each connection, securely)awidthshow
581 90 gm
0.47088 0. 32 0.04708 0.(exchanged in connection with the Authentication Exchange, used with the Transport)awidthshow
597 90 gm
0.52322 0. 32 0.05232 0.(Layer Security Protocol, and disposed of at the end of the connection. This pairwise)awidthshow
613 90 gm
-0.08987 0.(key forms an important part of the Security Context.)ashow
645 90 gm
-0.00994 0.(With connectionless services, only Message Integrity can be provided. Here setting up)ashow
661 90 gm
0.93627 0. 32 0.09362 0.(a Security Context including a pairwise symmetric key is impractical unless a pre-)awidthshow
677 90 gm
0.12161 0. 32 0.01216 0.(defined Default Context exists. It is, therefore, suggested that each message be signed)awidthshow
693 90 gm
2.27340 0. 32 0.22734 0.(with the secret key of the sender. This procedure offers not only Data Origin)awidthshow
709 90 gm
-0.10200 0.(Authentication but also the stronger function of Non-repudiation of Origin.)ashow
F T cp
%%Page: ? 59
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(56)show
802 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
104 90 gm
1 fs
14 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.74998 0.(4.3)ashow
104 126 gm
0.69970 0.(Confidentiality)ashow
136 90 gm
12 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.75003 0.(4.3.1)ashow
136 126 gm
3.08212 0. 32 0.30821 0.(Confidentiality and its Significance with Various Services)awidthshow
168 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.82305 0. 32 0.08230 0.(Confidentiality is usually the first function that people associate with data security.)awidthshow
184 90 gm
0.55145 0. 32 0.05514 0.(However, it is generally not as important as Authentication or Integrity. Most of the)awidthshow
200 90 gm
0.88378 0. 32 0.08837 0.(data passed through a network is not very critical and the sheer bulk of it makes it)awidthshow
216 90 gm
-0.05924 0.(difficult for the enemy to find the relevant pieces of information and make use of them.)ashow
232 90 gm
0.03326 0. 32 0.00332 0.(However, some of the data is always critical and  should not be sent in cleartext. Most)awidthshow
248 90 gm
0.62271 0. 32 0.06227 0.(notably passwords and usernames must always be considered pieces of such critical)awidthshow
264 90 gm
-0.04042 0.(information, as mentioned in section 1.2.)ashow
296 90 gm
-0.11453 0.(Confidentiality should be used to make gaining access to the data more expensive for an)ashow
312 90 gm
-0.02540 0.(enemy than the value of the information revealed would be for him. This requires risk-)ashow
328 90 gm
-0.06564 0.(assessment and security classification of data. It should again be noted that the Security)ashow
344 90 gm
0.22613 0. 32 0.02261 0.(and Integrity classes of the same information may be quite different. For example the)awidthshow
360 90 gm
-0.09684 0.(Integrity Level of a public record is very high whereas its Security Level is nil.)ashow
392 90 gm
0.12847 0. 32 0.01284 0.(However, confidentiality is vital for many applications, such as Electronic Data Inter-)awidthshow
408 90 gm
-0.01722 0.(change \(EDI\), Electronic Funds Transfer \(EFT\) etc., and it can often be provided at no)ashow
424 90 gm
-0.03950 0.(extra cost, as a by-product of Integrity.)ashow
456 90 gm
1 fs
bu fc
2 F /|______Times-Bold fnt
bn
1.75003 0.(4.3.2)ashow
456 126 gm
2.41012 0. 32 0.24101 0.(Placement of Confidentiality in the OSI Model)awidthshow
488 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.12464 0.(Confidentiality is closely coupled with Integrity and it logically belongs to the Transport)ashow
504 90 gm
-0.01745 0.(Layer because it augments the Transport Service in a most natural way. Like Integrity,)ashow
520 90 gm
0.00778 0. 32 0.00077 0.(Confidentiality can be viewed as one more attribute of the quality of transport service.)awidthshow
536 90 gm
0.07034 0. 32 0.00703 0.(Also, since Confidentiality is usually produced by the same mechanism as integrity, it)awidthshow
552 90 gm
-0.11291 0.(is natural to place these two functions at the same layer \(and use the same mechanism to)ashow
568 90 gm
-0.11659 0.(implement them both\) in order to avoid unnecessary duplication of functionality.)ashow
600 90 gm
0.30197 0. 32 0.03019 0.(In fact, based on the preceding discussion, Transport Layer is the only possible place)awidthshow
616 90 gm
-0.09648 0.(for end-to-end bulk confidentiality for the following reasons:)ashow
648 90 gm
(-)show
648 126 gm
0.07003 0. 32 0.00700 0.(End-to-end Confidentiality cannot be placed below the transport layer because)awidthshow
664 126 gm
-0.08242 0.(the lower layers are not necessarily end-to-end.)ashow
696 90 gm
(-)show
696 126 gm
1.08581 0. 32 0.10858 0.(Confidentiality should be placed below the transport protocol \(such as ISO)awidthshow
712 126 gm
-0.08421 0.(TP4\) in order to provide end-to-end integrity at no extra cost.)ashow
F T cp
%%Page: ? 60
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(57)show
802 288 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.51925 0. 32 0.05192 0.(Bulk confidentiality should, therefore, be placed at the transport layer in such a way)awidthshow
117 90 gm
1.04522 0. 32 0.10452 0.(that the actual TPDUs can be encrypted and that each transport connection can be)awidthshow
133 90 gm
-0.06993 0.(protected independently of the other connections \(that is, a different key can be used on)ashow
149 90 gm
-0.11805 0.(each connection and not all connections need to be encrypted\).)ashow
181 90 gm
0.20782 0. 32 0.02078 0.(Just like with Selective Field Integrity, the function of Selective Field Confidentiality)awidthshow
197 90 gm
0.79284 0. 32 0.07928 0.(needs to be provided at the Application Layer because no lower layer is capable of)awidthshow
213 90 gm
0.22247 0. 32 0.02224 0.(dealing with various fields of the APDU. Selective Field Confidentiality is one of the)awidthshow
229 90 gm
3.67095 0. 32 0.36709 0.(functions provided by the SCSE of the Application Layer. Like Integrity,)awidthshow
245 90 gm
0.29907 0. 32 0.02990 0.(Confidentiality in the Application Layer requires some support from the Presentation)awidthshow
261 90 gm
1.54144 0. 32 0.15414 0.(Layer. What was said previously about the effect of transport layer gateways on)awidthshow
277 90 gm
-0.12857 0.(integrity also applies to confidentiality at the transport layer.)ashow
309 90 gm
1 fs
bu fc
2 F /|______Times-Bold fnt
bn
1.75003 0.(4.3.3)ashow
309 126 gm
3.91479 0. 32 0.39147 0.(Confidentiality Mechanisms)awidthshow
341 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.98907 0. 32 0.09890 0.(For Connection Confidentiality, the same Transport Layer Security Protocol as for)awidthshow
357 90 gm
-0.05831 0.(Connection Integrity is used.)ashow
389 90 gm
0.17761 0. 32 0.01776 0.(For Connectionless Confidentiality, Public Key Encryption with the public key of the)awidthshow
405 90 gm
-0.05690 0.(recipient is used.)ashow
437 90 gm
1.64840 0. 32 0.16484 0.(If a pre-defined \(or otherwise agreed-on\) common Security Context, including a)awidthshow
453 90 gm
0.45639 0. 32 0.04563 0.(pairwise symmetric key between the sender and the recipient, exists, it is possible to)awidthshow
469 90 gm
1.71203 0. 32 0.17120 0.(use symmetric encryption with this key for Connectionless Confidentiality. This)awidthshow
485 90 gm
0.10025 0. 32 0.01002 0.(common Security Context can also be set up by including the pairwise key, encrypted)awidthshow
501 90 gm
1.36276 0. 32 0.13627 0.(with the public key of the recipient, in the message. This procedure makes sense)awidthshow
517 90 gm
-0.06564 0.(performance-wise if the message is very long.)ashow
552 90 gm
1 fs
14 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.74998 0.(4.4)ashow
552 126 gm
0.61160 0.(Non-Repudiation)ashow
584 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.05569 0. 32 0.00556 0.(Non-Repudiation is a security function, which provides proof of the origin or delivery)awidthshow
600 90 gm
0.22171 0. 32 0.02217 0.(of data in order to protect the sender against false denial by the recipient that the data)awidthshow
616 90 gm
0.03646 0. 32 0.00364 0.(has been received, or to protect the recipient against false denial by the sender that the)awidthshow
632 90 gm
1.22879 0. 32 0.12287 0.(data has been sent. Non-repudiation implies the existence of a trusted third party,)awidthshow
648 90 gm
-0.07450 0.(whose primary role is to arbitrate disputes resulting from Non-Repudiation [ISO90e].)ashow
680 90 gm
1 fs
bu fc
2 F /|______Times-Bold fnt
bn
1.75003 0.(4.4.1)ashow
680 126 gm
3.13812 0. 32 0.31381 0.(Non-Repudiation and its Significance with Various Services)awidthshow
712 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.05828 0.(Data Communication is gradually replacing the transfer of paper documents within and)ashow
728 90 gm
1.81671 0. 32 0.18167 0.(between organizations. If Electronic Documents and direct transactions between)awidthshow
744 90 gm
-0.07807 0.(information systems are ever to replace \(or even seriously compete with\) paper in inter-)ashow
F T cp
%%Page: ? 61
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(58)show
802 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
85 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.10044 0.(corporate business, it is essential that there exist means to make commitments electroni-)ashow
101 90 gm
-0.06410 0.(cally.)ashow
133 90 gm
0.24719 0. 32 0.02471 0.(Non-repudiation is especially important with services such as MHS, where electronic)awidthshow
149 90 gm
0.34698 0. 32 0.03469 0.(mail needs to be signed, EDI, where inter-corporate offers, orders, bills etc. are to be)awidthshow
165 90 gm
0.97930 0. 32 0.09793 0.(handled electronically, and EMT, where \(possibly large\) sums of money are trans-)awidthshow
181 90 gm
0.06138 0.(ferred.)ashow
213 90 gm
-0.07875 0.(Non-repudiation has associated with it a hoard of legal problems that need to be solved.)ashow
229 90 gm
0.92330 0. 32 0.09233 0.(Before electronic commitments can be used in the court of law, a lot of legislative)awidthshow
245 90 gm
-0.03637 0.(work, which is outside the scope of engineering as well as that of this study, is needed.)ashow
277 90 gm
2.03216 0. 32 0.20321 0.(In any case, we must first define sound methods for making and showing true)awidthshow
293 90 gm
0.42098 0. 32 0.04209 0.(electronic commitments before any concrete legislation in this area is possible. Then)awidthshow
309 90 gm
-0.05007 0.(there is a chance that laws defining the properties of an acceptable digital signature can)ashow
325 90 gm
-0.02056 0.(be passed and a procedure for keeping and updating an official list of currently accept-)ashow
341 90 gm
0.36743 0. 32 0.03674 0.(able signature mechanisms, as well as an official record of approved CAs, can be set)awidthshow
357 90 gm
0.5 0.(up.)ashow
389 90 gm
1 fs
bu fc
2 F /|______Times-Bold fnt
bn
1.75003 0.(4.4.2)ashow
389 126 gm
2.47314 0. 32 0.24731 0.(Placement of Non-Repudiation in the OSI Model)awidthshow
421 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.83395 0. 32 0.18339 0.(Non-repudiation is strongly application-dependent but a generic non-repudiation)awidthshow
437 90 gm
0.07965 0. 32 0.00796 0.(function can still be included in the SCSE of the Application Layer. This function can)awidthshow
453 90 gm
0.55175 0. 32 0.05517 0.(be used to sign any APDU with no regard to its structure or semantics. This generic)awidthshow
469 90 gm
0.00625 0. 32 0.00062 0.(service can, in turn, be used by various SASEs for various purposes.)awidthshow
501 90 gm
1 fs
bu fc
2 F /|______Times-Bold fnt
bn
1.75003 0.(4.4.3)ashow
501 126 gm
4.10186 0. 32 0.41018 0.(Non-Repudiation Mechanisms)awidthshow
533 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.95687 0. 32 0.09568 0.(Non-repudiation is usually based on digital signatures which, in turn, are currently)awidthshow
549 90 gm
0.29678 0. 32 0.02967 0.(based on PKCs. A message signed with the secret key of the sender can be proved to)awidthshow
565 90 gm
1.62048 0. 32 0.16204 0.(have been sent by the holder of the secret key, because nobody else could have)awidthshow
581 90 gm
0.06301 0. 32 0.00630 0.(generated the signature. Giving away one's secret key can be considered giving out an)awidthshow
597 90 gm
0.25329 0. 32 0.02532 0.(open proxy, even though a procedure for cancelling compromised keys will normally)awidthshow
613 90 gm
0.06958 0. 32 0.00695 0.(have to be provided. Cryptosums based on symmetric encryption can be used to make)awidthshow
629 90 gm
-0.11068 0.(the generation and checking of signatures more efficient.)ashow
661 90 gm
0.76583 0. 32 0.07658 0.(It is proposed that a Digital Signature Mechanism be embedded in the SCSE in the)awidthshow
677 90 gm
-0.00991 0.(application layer. In terms of low-level mechanisms the signature mechanism operates)ashow
693 90 gm
-0.09875 0.(in the following way:)ashow
725 90 gm
(-)show
725 126 gm
-0.11225 0.(Convert the APDU into a canonical form.)ashow
757 90 gm
(-)show
757 126 gm
-0.07394 0.(Compute a cryptosum of the APDU.)ashow
F T cp
%%Page: ? 62
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(59)show
802 288 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(-)show
101 126 gm
-0.08279 0.(Encrypt the cryptosum with the secret key of the sender.)ashow
133 90 gm
(-)show
133 126 gm
-0.12561 0.(Attach this signature to the original APDU.)ashow
165 90 gm
-0.10404 0.(In the receiving end the signature is checked in a similar fashion.)ashow
197 90 gm
0.14068 0. 32 0.01406 0.(In case of non-repudiation of receipt, it deserves to be noted that the mechanism must)awidthshow
213 90 gm
-0.02783 0.(be activated )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.03048 0.(before)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.02812 0.( the data is transmitted to the recipient. Otherwise the recipient may)ashow
229 90 gm
-0.07557 0.(first examine the data and then decide whether or not he wishes to acknowledge it. This)ashow
245 90 gm
-0.08479 0.(leads into one of the two solutions:)ashow
277 90 gm
(-)show
277 126 gm
2.49435 0. 32 0.24943 0.(First deliver a digital finger-print of the message and require a signed)awidthshow
293 126 gm
1.16867 0. 32 0.11686 0.(acknowledgement from the recipient \("intent to receive"\). Then deliver the)awidthshow
309 126 gm
(whole message.)show
341 90 gm
(-)show
341 126 gm
-0.00151 0.(Use a trusted security server to handle the delivery and require a receipt before)ashow
357 126 gm
-0.07467 0.(submitting the message.)ashow
389 90 gm
1.68365 0. 32 0.16836 0.(Neither of these two approaches completely solves the problem, as explained in)awidthshow
405 90 gm
1.99630 0. 32 0.19963 0.([ISO90e]. Also, since we do not wish to include any more trusted parties than)awidthshow
421 90 gm
0.19668 0. 32 0.01966 0.(absolutely necessary, we decide, that a receipt obtained voluntarily from the recipient)awidthshow
437 90 gm
-0.03700 0.(shall be adequate for our purposes.)ashow
469 90 gm
0.16128 0. 32 0.01612 0.(Notary services can be used to support non-repudiation. It is, for example, possible to)awidthshow
485 90 gm
-0.06678 0.(allow a trusted notary server to authenticate the communicating parties and register and)ashow
501 90 gm
1.52221 0. 32 0.15222 0.(certify commitments made between them. This kind of service can be offered in)awidthshow
517 90 gm
0.77972 0. 32 0.07797 0.(connection with, or instead of, the mechanism described above. This study concen-)awidthshow
533 90 gm
-0.13600 0.(trates on realizing secure communications with a minimal number of trusted parties \(that)ashow
549 90 gm
0.42816 0. 32 0.04281 0.(is, we trust in only our own CA\). Therefore, trusted servers are not dealt with in any)awidthshow
565 90 gm
-0.11814 0.(detail here.)ashow
600 90 gm
1 fs
14 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.74998 0.(4.5)ashow
600 126 gm
4.00421 0. 32 0.40042 0.(Access Control)awidthshow
632 90 gm
12 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.75003 0.(4.5.1)ashow
632 126 gm
2.96936 0. 32 0.29693 0.(Access Control and its Significance with Various Services)awidthshow
664 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.71127 0. 32 0.17112 0.(Access Control is not a security function in the same sense as the four security)awidthshow
680 90 gm
0.08422 0. 32 0.00842 0.(functions discussed above. For example, we do not explicitly ask for access control to)awidthshow
696 90 gm
0.06576 0. 32 0.00657 0.(be employed with a connection when opening it. Rather, access control has to do with)awidthshow
712 90 gm
-0.13470 0.(Authentication as well as Network and Applications Management.)ashow
F T cp
%%Page: ? 63
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(60)show
802 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
1 fs
12 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.75003 0.(4.5.2)ashow
101 126 gm
2.33810 0. 32 0.23381 0.(Placement of Access Control in the OSI Model)awidthshow
133 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.07882 0.(Access Control can be employed at most levels of OSI to limit illegitimate access to \(or)ashow
149 90 gm
2.37548 0. 32 0.23754 0.(from\) networks and services. In current distributed systems Access Control is)awidthshow
165 90 gm
-0.05699 0.(performed by means of e.g. the following mechanisms:)ashow
193 90 gm
(-)show
193 126 gm
-0.10453 0.(At the Data Link Layer, with filters in bridges.)ashow
221 90 gm
(-)show
221 126 gm
-0.05963 0.(At the Network Layer, in routers with limitations based on network addresses.)ashow
249 90 gm
(-)show
249 126 gm
0.86669 0. 32 0.08666 0.(At the Transport Layer, in routers based on TCP Socket Numbers \(and OSI)awidthshow
265 126 gm
0.02760 0.(TSAP-numbers\).)ashow
293 90 gm
(-)show
293 126 gm
-0.16543 0.(Within the Application.)ashow
325 90 gm
-0.14228 0.(The ultimate responsibility for Access Control is in the Application and therefore mainly)ashow
341 90 gm
-0.02719 0.(beyond the scope of OSI.)ashow
373 90 gm
-0.00183 0.(Access Control in the lower layers \(Transport, Network and Data Link\) can be used to)ashow
389 90 gm
0.07949 0. 32 0.00794 0.(effectively reduce the number of serious attacks. Management of virtual networks can)awidthshow
405 90 gm
0.91125 0. 32 0.09112 0.(be used to aid in this. Current routers have Access Control Lists etc. which can be)awidthshow
421 90 gm
0.81253 0. 32 0.08125 0.(maintained by means of standardized network management protocols. Frame Relay)awidthshow
437 90 gm
-0.12585 0.(techniques will make it possible to define virtual networks at the Datalink Layer.)ashow
469 90 gm
1 fs
bu fc
2 F /|______Times-Bold fnt
bn
1.75003 0.(4.5.3)ashow
469 126 gm
3.42193 0. 32 0.34219 0.(Access Control Mechanisms)awidthshow
501 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.30334 0. 32 0.03033 0.(Access Control should be based on reliable \(strong\) authentication of the user and an)awidthshow
517 90 gm
-0.00196 0.(information base kept by the application on the privileges and restrictions of each user)ashow
533 90 gm
0.08483 0. 32 0.00848 0.(or group of users. It is important to separate Authentication from Access Control. The)awidthshow
549 90 gm
1.46713 0. 32 0.14671 0.(Access Control Scheme included in the current FTAM standard [IS8571-2] is an)awidthshow
565 90 gm
-0.06401 0.(example of mixing \(simple, application specific\) authentication and access control with)ashow
581 90 gm
-0.06546 0.(disastrous consequences. This example demonstrates the necessity to find more general)ashow
597 90 gm
0.39871 0. 32 0.03987 0.(solutions to the security problems of open systems instead of solving these problems)awidthshow
613 90 gm
-0.07487 0.(on a per-application basis.)ashow
F T cp
%%Page: ? 64
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(61)show
802 288 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
110 90 gm
1 fs
18 fz
bu fc
2 F /|______Times-Bold fnt
bn
(5)show
110 126 gm
3.28521 0. 32 0.32852 0.(Management Issues)awidthshow
143 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.06715 0.(All security functions and services can only be provided within the context of a defined)ashow
159 90 gm
0.84762 0. 32 0.08476 0.(security policy for a specific application. Ultimately, it is left as a responsibility of)awidthshow
175 90 gm
1.42349 0. 32 0.14234 0.(systems management to enforce this security policy by activating the appropriate)awidthshow
191 90 gm
1.28112 0. 32 0.12811 0.(security functions required by the security policy. International standardization of)awidthshow
207 90 gm
1.13265 0. 32 0.11326 0.(systems management is increasingly focusing on security management, as demon-)awidthshow
223 90 gm
0.66390 0. 32 0.06639 0.(strated by e.g. [IS10164-7,8,9].)awidthshow
258 90 gm
1 fs
14 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.74998 0.(5.1)ashow
258 126 gm
3.09402 0. 32 0.30940 0.(Activation and Negotiation of Security Functions)awidthshow
290 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.11822 0.(Security functions can be activated in either of the two ways:)ashow
322 90 gm
(-)show
322 126 gm
-0.01974 0.(On user request.)ashow
354 90 gm
(-)show
354 126 gm
-0.11355 0.(By system management as dictated by the security policy.)ashow
386 90 gm
0.63247 0. 32 0.06324 0.(In the general-purpose secure OSI protocol stack drafted in chapter 4, security is an)awidthshow
402 90 gm
-0.02607 0.(integral element of the quality of service provided by the communications system. The)ashow
418 90 gm
0.03692 0. 32 0.00369 0.(user can indicate the security functions he wishes to activate by the Quality of Service)awidthshow
434 90 gm
-0.01046 0.(\(QOS\) parameter when opening the communications. Only formal changes are needed)ashow
450 90 gm
-0.13388 0.(in the current service interfaces to accommodate for this facility.)ashow
482 90 gm
1.81137 0. 32 0.18113 0.(Each OSI layer can provide the security services requested that it is capable of)awidthshow
498 90 gm
0.79864 0. 32 0.07986 0.(providing and pass a request for the rest on to the lower layers. In this manner, the)awidthshow
514 90 gm
0.39596 0. 32 0.03959 0.(application is not greatly affected by the fact that some security functions are moved)awidthshow
530 90 gm
0.57144 0. 32 0.05714 0.(from one layer to another. For example, Authentication or Integrity could be moved)awidthshow
546 90 gm
-0.01339 0.(from the transport layer up to the application layer without any changes to the applica-)ashow
562 90 gm
-0.02384 0.(tions using these functions.)ashow
594 90 gm
0.86166 0. 32 0.08616 0.(The communication service provider need not provide exactly the security services)awidthshow
610 90 gm
1.22940 0. 32 0.12294 0.(requested by the user. For example, if the user requires data integrity, the service)awidthshow
626 90 gm
0.44952 0. 32 0.04495 0.(provider can activate an encryption mechanism offering both integrity and confiden-)awidthshow
642 90 gm
1.39633 0. 32 0.13963 0.(tiality. Also the system may have a policy of, for example, not offering integrity)awidthshow
658 90 gm
0.10925 0. 32 0.01092 0.(without authentication, or vice versa. Should the user ask for integrity, he may end up)awidthshow
674 90 gm
-0.03414 0.(getting authentication and confidentiality too. Also, systems management may activate)ashow
690 90 gm
2.05871 0. 32 0.20587 0.(security functions without any interference from the user when dictated by the)awidthshow
706 90 gm
-0.12620 0.(applicable security policy.)ashow
738 90 gm
-0.06813 0.(When negotiating the use of security functions and mechanisms between the communi-)ashow
754 90 gm
0.26763 0. 32 0.02676 0.(cating parties, a complicated negotiating procedure should be avoided. It is enough if)awidthshow
F T cp
%%Page: ? 65
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(62)show
802 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
85 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.70745 0. 32 0.17074 0.(we let the originating party choose the set of functions it is willing to use. The)awidthshow
101 90 gm
0.27221 0. 32 0.02722 0.(responding party may either accept this offer, add its own requirements, or refuse the)awidthshow
117 90 gm
1.77658 0. 32 0.17765 0.(connection. Similarly the originating party can refuse the connection should the)awidthshow
133 90 gm
0.30105 0. 32 0.03010 0.(responding party require the use of additional security functions and mechanisms not)awidthshow
149 90 gm
-0.01109 0.(supported by this end system.)ashow
181 90 gm
0.42129 0. 32 0.04212 0.(The negotiation mechanism suggested above appears to be a reasonable compromise)awidthshow
197 90 gm
0.02166 0. 32 0.00216 0.(between simplicity and functionality. It can be easily implemented, it only uses a two-)awidthshow
213 90 gm
-0.06161 0.(way handshake, and nevertheless it provides adequate functionality for most purposes.)ashow
248 90 gm
1 fs
14 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.74998 0.(5.2)ashow
248 126 gm
2.51403 0. 32 0.25140 0.(Distribution and Management of Keys)awidthshow
280 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.10913 0.(Keys are divided into two categories:)ashow
312 90 gm
(-)show
312 126 gm
1.15539 0. 32 0.11553 0.(Master Keys, used for authentication, key exchange, and key management.)awidthshow
328 126 gm
2.09869 0. 32 0.20986 0.(They can also be used for encrypting short datagrams in connectionless)awidthshow
344 126 gm
0.90011 0. 32 0.09001 0.(communications. These keys are rather permanent in nature, they should be)awidthshow
360 126 gm
-0.08116 0.(stored with utmost care and never be used for the encryption of bulk traffic.)ashow
392 90 gm
(-)show
392 126 gm
1.32080 0. 32 0.13208 0.(Session Keys, used for the encryption of bulk traffic. These keys are very)awidthshow
408 126 gm
0.57281 0. 32 0.05728 0.(perishable and should not be used for extended periods of time. They should)awidthshow
424 126 gm
-0.06452 0.(normally be pairwise.)ashow
456 90 gm
1.27075 0. 32 0.12707 0.(A third group of keys are those used for encrypting stored data. These keys have)awidthshow
472 90 gm
0.24429 0. 32 0.02442 0.(nothing to do with data transfer and their generation and secure storage is beyond the)awidthshow
488 90 gm
0.07186 0. 32 0.00718 0.(scope of this study.)awidthshow
520 90 gm
0.27832 0. 32 0.02783 0.(In most security schemes, keys are referred to by key-IDs. The idea is to separate the)awidthshow
536 90 gm
0.69305 0. 32 0.06930 0.(use of keys from their distribution. Keys are stored in a database, referenced by the)awidthshow
552 90 gm
0.00991 0. 32 0.00099 0.(key-IDs, and used as needed.)awidthshow
584 90 gm
1.01699 0. 32 0.10169 0.(However, this approach has a severe shortcoming. When using a key stored in the)awidthshow
600 90 gm
2.20855 0. 32 0.22085 0.(database we cannot have any knowledge of its freshness. In fact, this practise)awidthshow
616 90 gm
0.08972 0. 32 0.00897 0.(encourages sloppy usage of session keys. It is highly likely that in many cases a small)awidthshow
632 90 gm
-0.07763 0.(collection of keys will be used for extended periods of time leading into repeated use of)ashow
648 90 gm
-0.04354 0.(the same keys. Also, stored keys can leak before or after their use making it possible to)ashow
664 90 gm
-0.08190 0.(decrypt recorded traffic afterwards.)ashow
696 90 gm
0.61462 0. 32 0.06146 0.(Generating symmetric encryption keys is almost trivial and session keys usually are)awidthshow
712 90 gm
0.42327 0. 32 0.04232 0.(symmetric. Even strong public key pairs can nowadays rather easily be generated by)awidthshow
728 90 gm
1.24542 0. 32 0.12454 0.(using a cheap personal computer. It is therefore evident that labelling and storing)awidthshow
744 90 gm
1.80053 0. 32 0.18005 0.(session keys does more harm than good and this practise should be abandoned.)awidthshow
F T cp
%%Page: ? 66
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(63)show
802 288 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
85 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.21942 0. 32 0.02194 0.(Instead, fresh session keys should be generated when needed and securely exchanged)awidthshow
101 90 gm
-0.05805 0.(in connection with authentication by using the permanent master keys. Should the need)ashow
117 90 gm
0.00473 0. 32 0.00047 0.(arise to change session keys in the middle of a long session, this can easily be done by)awidthshow
133 90 gm
-0.12622 0.(repeating the authentication procedure and its associated key exchange.)ashow
165 90 gm
1 fs
bu fc
2 F /|______Times-Bold fnt
bn
1.75003 0.(5.2.1)ashow
165 126 gm
2.35824 0. 32 0.23582 0.(Management of Master Keys)awidthshow
197 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.12843 0.(The minimal procedures for the management of master keys are the following:)ashow
229 90 gm
(-)show
229 126 gm
1.50588 0. 32 0.15058 0.(User A registers to his CA exchanging Public Keys with it. The user can)awidthshow
245 126 gm
0.23620 0. 32 0.02362 0.(generate his own key pair himself, so that he need not trust anybody else with)awidthshow
261 126 gm
0.52581 0. 32 0.05258 0.(his secret key. The CA gives A a Signed Certificate of A's Public Key K)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.16249 0.(P,A)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(:)show
277 126 gm
0.17915 0.(S)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.18650 0.(CA)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.47927 0. 32 0.04792 0.({CA, A, K)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.13676 0.(P,A)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.19287 0. 32 0.01928 0.(, t)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.11920 0.(e)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.42434 0. 32 0.04243 0.(}, where t)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.11920 0.(e)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.45440 0. 32 0.04544 0.( is the expiration time of the certificate. Also)awidthshow
293 126 gm
0.23956 0. 32 0.02395 0.(the CA's Public Key K)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.07325 0.(P,CA)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.17822 0. 32 0.01782 0.( is handed over to A in such a way as to sustain its)awidthshow
309 126 gm
-0.07283 0.(integrity.)ashow
341 90 gm
(-)show
341 126 gm
-0.01937 0.(The CAs form a global hierarchy logically structured as a tree. Each CA in this)ashow
357 126 gm
-0.11999 0.(tree certifies its father and children.)ashow
389 90 gm
-0.07815 0.(It is important to notice that the hierarchy of CAs need not have anything to do with the)ashow
405 90 gm
-0.05972 0.(hierarchy of Directory Server Agents \(DSAs\) distributing the certificates. For example,)ashow
421 90 gm
1.76727 0. 32 0.17672 0.(the CAs may be administrative bodies while the DSAs may be administered by)awidthshow
437 90 gm
-0.11181 0.(teleoperators and private companies.)ashow
469 90 gm
0.02319 0. 32 0.00231 0.(To facilitate the possibility of using different key pairs for different purposes \(e.g. one)awidthshow
485 90 gm
1.92687 0. 32 0.19268 0.(key pair for confidentiality, another for non-repudiation\) we should include the)awidthshow
501 90 gm
0.09338 0. 32 0.00933 0.(intended area of use of the public key in each certificate. Because the PKCs used may)awidthshow
517 90 gm
0.70922 0. 32 0.07092 0.(\(and will\) change with time, we must also include an identifier of the algorithm for)awidthshow
533 90 gm
-0.10375 0.(which the public key is intended. This is most easily done by letting the key value in the)ashow
549 90 gm
0.52673 0. 32 0.05267 0.(certificate be a structured data type with all essential information \(such as algorithm)awidthshow
565 90 gm
1.26602 0. 32 0.12660 0.(identifier and scope of use\) included. Considering the fast progress in the area of)awidthshow
581 90 gm
0.02243 0. 32 0.00224 0.(cryptology, we must be prepared for completely new types of keys, which may be, for)awidthshow
597 90 gm
0.36468 0. 32 0.03646 0.(example, large sets of data items. This should be borne in mind when certificates are)awidthshow
613 90 gm
0.04336 0.(designed.)ashow
645 90 gm
0.02212 0. 32 0.00221 0.(In the CCITT recommendation X.509 a )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.03417 0. 32 0.00341 0.(Certification Path)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.01953 0. 32 0.00195 0.( is formed between the CAs)awidthshow
661 90 gm
-0.08920 0.(of two parties served by different CAs and wishing to communicate in a secure manner.)ashow
693 90 gm
0.21102 0. 32 0.02110 0.(Let us assume that A trusts CA)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.09187 0.(A)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.23101 0. 32 0.02310 0.( and wishes to communicate with B belonging to the)awidthshow
708 90 gm
-0.04644 0.(domain of CA)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.05413 0.(B)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.04002 0.(. A now possesses an integral copy of K)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.04454 0.(P,CA)ashow
0 1 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.05274 0.(A)ashow
0 -1 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
( )show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.04045 0.(\(the public key of CA)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.05860 0.(A)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.05676 0.(\).)ashow
725 90 gm
-0.12478 0.(However, CA)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.14871 0.(A)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.09843 0.( cannot directly certify B because B belongs to a different administrative)ashow
741 90 gm
0.17562 0. 32 0.01756 0.(domain, namely that of CA)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.05812 0.(B)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.15121 0. 32 0.01512 0.(. We now need to find a Certification Path between CA)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(A)show
757 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.04943 0. 32 0.00494 0.(and CA)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(B)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.02700 0. 32 0.00270 0.(, that is a chain of CA)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(i)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.03051 0. 32 0.00305 0.(, such that: A => CA)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(A)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.02746 0. 32 0.00274 0.( -> CA)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(1)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.02746 0. 32 0.00274 0.( -> CA)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(2)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.02380 0. 32 0.00238 0.( -> ... -> CA)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(n )show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(->)show
F T cp
%%Page: ? 67
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(64)show
802 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
85 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.31140 0.(CA)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.20254 0. 32 0.12025 0.(B )awidthshow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
2.37655 0. 32 0.23765 0.(-> B \(A trusts CA)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.13604 0.(A)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
3.04107 0. 32 0.30410 0.(, which certifies CA)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.78681 0.(1)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
3.04107 0. 32 0.30410 0.(, which certifies CA)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.78681 0.(2)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
3.47412 0. 32 0.34741 0.(, which)awidthshow
101 90 gm
0.19119 0. 32 0.01911 0.(certifies...which certifies CA)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(n)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.16586 0. 32 0.01658 0.(,which certifies CA)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(B)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.13793 0. 32 0.01379 0.(, which certifies B\). This unbroken)awidthshow
117 90 gm
-0.06541 0.(chain of trust implies that A can trust in the integrity of B's Public Key K)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.08659 0.(PB)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.07293 0.( included in)ashow
132 90 gm
-0.02899 0.(the certificate S)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.04545 0.(CA)ashow
0 1 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
(B)show
0 -3 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.04893 0.({CA)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(A)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.03199 0.(, A, K)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.03213 0.(P,B)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.02037 0.(, t)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(e)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.03433 0.(} issued by CA)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(B)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(.)show
165 90 gm
-0.00167 0.(This means that A has to acquire from somewhere \(not necessarily from the directory\))ashow
181 90 gm
0.10498 0. 32 0.01049 0.(all the certificates necessary for forming this Certification Path \(that is one Certificate)awidthshow
197 90 gm
0.58364 0. 32 0.05836 0.(for each arrow "->" in the formula above\). These Certificates may be obtained from)awidthshow
213 90 gm
-0.05674 0.(anywhere, not necessarily from different DSAs.)ashow
245 90 gm
-0.07859 0.(In a tree-like structure of CAs the shortest Certification Path is never overly long. It can)ashow
261 90 gm
0.05416 0. 32 0.00541 0.(be shortened further by having CAs with lots of traffic between their domains directly)awidthshow
277 90 gm
0.09994 0. 32 0.00999 0.(cross-certify one-another. It is not obvious how a reasonably short and reliable path is)awidthshow
293 90 gm
-0.02497 0.(found. For example X.509 does not recommend any method for this.)ashow
325 90 gm
-0.12619 0.(The three basic approaches are the following:)ashow
357 90 gm
(-)show
357 126 gm
0.59753 0. 32 0.05975 0.(The originating party can find a certification path and pass it to the recipient)awidthshow
373 126 gm
-0.05902 0.(along with the message.)ashow
405 90 gm
(-)show
405 126 gm
-0.11114 0.(The responding party can find a certification path.)ashow
437 90 gm
(-)show
437 126 gm
1.33178 0. 32 0.13317 0.(The originator can provide part of the certification path and the responder)awidthshow
453 126 gm
-0.13537 0.(complete the path.)ashow
485 90 gm
0.20462 0. 32 0.02046 0.(These three modes of operation are not mutually exclusive. Obviously, the amount of)awidthshow
501 90 gm
0.33187 0. 32 0.03318 0.(trust that a user can place in a certification path cannot be greater than the amount of)awidthshow
517 90 gm
0.44647 0. 32 0.04464 0.(trust he is willing to place in the weakest link of the chain. If the responder does not)awidthshow
533 90 gm
0.27496 0. 32 0.02749 0.(trust in \(parts of\) the path provided by the originator and wants to find a safer certifi-)awidthshow
549 90 gm
-0.07531 0.(cation path this option should be left open for him as proposed in [MWR89].)ashow
581 90 gm
0.13259 0. 32 0.01325 0.(A simple solution for finding a path is to require that every communicating party if in)awidthshow
597 90 gm
0.38131 0. 32 0.03813 0.(possession of the \(bi-directional\) certification path between itself and the world root.)awidthshow
613 90 gm
0.37933 0. 32 0.03793 0.(The sender passes the half-path from the world root to itself along with the message.)awidthshow
629 90 gm
0.33187 0. 32 0.03318 0.(The recipient combines this information with the half path from itself to to the world)awidthshow
645 90 gm
0.31723 0. 32 0.03172 0.(root to find the certification path via the closest common ancestor in the tree of CAs.)awidthshow
661 90 gm
1.75323 0. 32 0.17532 0.(Optimization, e.g. based on knowledge about the uppermost level of the closest)awidthshow
677 90 gm
-0.03472 0.(common ancestor, is possible but not necessary.)ashow
709 90 gm
0.83724 0. 32 0.08372 0.(The normal way of distributing certificates is via the Directory by according to the)awidthshow
725 90 gm
0.32531 0. 32 0.03253 0.(CCITT recommendation X.509. However, certificates can be distributed through any)awidthshow
741 90 gm
0.92117 0. 32 0.09211 0.(channel and in the scheme described above each party only has to know the rather)awidthshow
F T cp
%%Page: ? 68
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(65)show
802 288 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
85 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01705 0.(stable certification path between itself and the world root making the need of directory)ashow
101 90 gm
-0.11880 0.(queries in forming certification path rather infrequent.)ashow
133 90 gm
1 fs
bu fc
2 F /|______Times-Bold fnt
bn
1.75003 0.(5.2.2)ashow
133 126 gm
3.27926 0. 32 0.32792 0.(Management of Session Keys)awidthshow
165 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.27227 0. 32 0.12722 0.(Ways of exchanging fresh keys in connection with authentication and using them)awidthshow
181 90 gm
0.64376 0. 32 0.06437 0.(exclusively for this one session should be studied. Here, no need to identify session)awidthshow
197 90 gm
0.19119 0. 32 0.01911 0.(keys exists, as long as they are mutually agreed upon. The session key never needs to)awidthshow
213 90 gm
-0.04005 0.(be explicitly referenced, the key belonging to the current security context always being)ashow
229 90 gm
-0.01298 0.(used. After the session the key is disposed of.)ashow
261 90 gm
-0.08308 0.(To guarantee the freshness of keys, at least three approaches are possible:)ashow
293 90 gm
(-)show
293 126 gm
-0.01727 0.(Store hash values of old keys and refuse synonym keys.)ashow
325 90 gm
(-)show
325 126 gm
-0.01191 0.(Use two xored half-keys, one chosen by each party, to form a session key.)ashow
357 90 gm
(-)show
357 126 gm
-0.06996 0.(Use a trusted server \(key distribution center\) to generate fresh keys.)ashow
389 90 gm
0.46066 0. 32 0.04606 0.(Old keys cannot be stored as such because they must not leak. Therefore, a one-way)awidthshow
405 90 gm
0.15045 0. 32 0.01504 0.(hash function needs to be applied on them before they can be stored. A proposed new)awidthshow
421 90 gm
-0.00953 0.(key is first hashed and then checked against the hash values of used keys. If the values)ashow
437 90 gm
-0.06932 0.(match, the new key is rejected, otherwise accepted as being fresh.)ashow
469 90 gm
1.77291 0. 32 0.17729 0.(One way of achieving freshness is generating pairwise session keys by bit-wise)awidthshow
485 90 gm
-0.02201 0.(exclusive or \(xor\) operation between two half-keys. In this scheme the communicating)ashow
501 90 gm
0.80368 0. 32 0.08036 0.(parties A and B choose their own half-keys K)awidthshow
0 2 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.29533 0.(A)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.55923 0. 32 0.05592 0.( and K)awidthshow
0 2 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.27287 0.(B)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.05484 0. 32 0.10548 0.(, respectively. The pairwise)awidthshow
517 90 gm
0.30578 0. 32 0.03057 0.(session key K)awidthshow
0 2 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.09460 0.(AB)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.23651 0. 32 0.02365 0.( is formed as follows: K)awidthshow
0 2 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.09460 0.(AB)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.13519 0. 32 0.01351 0.( = K)awidthshow
0 2 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.09834 0.(A)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.23284 0. 32 0.02328 0.( XOR K)awidthshow
0 2 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.09086 0.(B)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.25222 0. 32 0.02522 0.(. In this scheme a protocol)awidthshow
533 90 gm
0.88256 0. 32 0.08825 0.(for securely exchanging the half-keys without A knowing K)awidthshow
0 2 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.25152 0.(B)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.56823 0. 32 0.05682 0.( before it has sent K)awidthshow
0 2 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
(A)show
549 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.60537 0. 32 0.16053 0.(\(and without B knowing K)awidthshow
0 2 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.51890 0.(A)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.08306 0. 32 0.10830 0.( before it has sent K)awidthshow
0 2 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.47941 0.(B)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.45690 0. 32 0.14569 0.(\) is needed. The most straight-)awidthshow
565 90 gm
0.24703 0. 32 0.02470 0.(forward way of achieving this is with the help of a trusted security server involved in)awidthshow
581 90 gm
0.17166 0. 32 0.01716 0.(the process.)awidthshow
613 90 gm
0.67581 0. 32 0.06758 0.(Also, a trusted security server can be used to generate and securely distribute fresh,)awidthshow
629 90 gm
0.22338 0. 32 0.02233 0.(strong, pairwise session keys. However, this is not a desirable solution since we want)awidthshow
645 90 gm
-0.11981 0.(to minimize the use of trusted functionality.)ashow
677 90 gm
0.58319 0. 32 0.05831 0.(In practise, the freshness of randomly generated keys can usually be trusted without)awidthshow
693 90 gm
0.71990 0. 32 0.07199 0.(any extra precautions. Well designed authentication protocols suffice to prevent the)awidthshow
709 90 gm
0.42800 0. 32 0.04280 0.(replay of authentication sequences \(and the malicious reintroduction of old, compro-)awidthshow
725 90 gm
0.87051 0. 32 0.08705 0.(mised session keys\). It is, therefore, adequate that the originating party generates a)awidthshow
741 90 gm
-0.06233 0.(random session key when needed and securely conveys it to the responding party.)ashow
F T cp
%%Page: ? 69
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(66)show
802 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
1 fs
12 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.75003 0.(5.2.3)ashow
101 126 gm
2.19238 0. 32 0.21923 0.(On the Generation of Public Key Pairs)awidthshow
133 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.06639 0.(The generation of strong Public Key Pairs \(e.g. for RSA\) is a fairly simple task that can)ashow
149 90 gm
-0.06098 0.(be performed, for example, on a microcomputer. However, for the non-technical user it)ashow
165 90 gm
0.11993 0. 32 0.01199 0.(is necessary that he be able to purchase Public Key Pairs from a trusted supplier. This)awidthshow
181 90 gm
-0.08140 0.(supplier can be the CA the user registers to.)ashow
213 90 gm
0.35659 0. 32 0.03565 0.(When the keys are generated by someone else than the user, the following procedure)awidthshow
229 90 gm
-0.07287 0.(should be followed:)ashow
261 90 gm
(-)show
261 126 gm
1.59729 0. 32 0.15972 0.(A trusted piece of software and hardware is used for key generation. For)awidthshow
277 126 gm
0.88134 0. 32 0.08813 0.(example a dedicated microcomputer with the proper software. The software)awidthshow
293 126 gm
1.53518 0. 32 0.15351 0.(should first be inspected as source code, then compiled. The system used)awidthshow
309 126 gm
-0.07881 0.(should be sealed after inspection.)ashow
341 90 gm
(-)show
341 126 gm
0.58898 0. 32 0.05889 0.(The system should work in such a way that when a key pair is generated the)awidthshow
357 126 gm
-0.01119 0.(secret key is only output on a diskette \(or other medium\) belonging to the user.)ashow
373 126 gm
0.16891 0. 32 0.01689 0.(After this, the memory of the system is erased and the service provider cannot)awidthshow
389 126 gm
-0.08380 0.(obtain a copy of the secret key.)ashow
421 90 gm
0.02563 0. 32 0.00256 0.(It should be noted, that with zero-knowledge techniques the identification information)awidthshow
437 90 gm
1.59255 0. 32 0.15925 0.(cannot be generated by the user but it always needs to be generated by the CA.)awidthshow
453 90 gm
-0.02548 0.(Compares with public key pairs generated by the user, this causes the extra problem of)ashow
469 90 gm
-0.01325 0.(securely transferring the secret authentication information from the CA to the user and)ashow
485 90 gm
-0.01345 0.(requires us to trust the CA to keep this authentication information secret \(or dispose of)ashow
501 90 gm
-0.06272 0.(it\) and not misuse it.)ashow
533 90 gm
1.44577 0. 32 0.14457 0.(In fact we always have to trust the CA in any case. If we want to use PKCs for)awidthshow
549 90 gm
-0.10809 0.(authentication and encryption we have to trust in the certificates issued by the CA. Even)ashow
565 90 gm
-0.04476 0.(if a crooked CA does not know the secret key generated by us, it can always generate a)ashow
581 90 gm
-0.09562 0.(key pair of its own and issue a false certificate for the public part of it.)ashow
613 90 gm
-0.07588 0.(Similarly, we always have to distribute some general, public authentication information)ashow
629 90 gm
0.74752 0. 32 0.07475 0.(to all users. If we are using PKCs this is the public key of the CA. In case of zero-)awidthshow
645 90 gm
-0.11134 0.(knowledge schemes it is the public verification information.)ashow
677 90 gm
0.19821 0. 32 0.01982 0.(So, in fact zero-knowledge schemes don't introduce any new problems, except that of)awidthshow
693 90 gm
-0.08958 0.(securely transferring the secret key to each user. This problem is more than made up for)ashow
709 90 gm
-0.11030 0.(by the ease of key management, when no user-dependent public authentication informa-)ashow
725 90 gm
-0.02159 0.(tion needs to be distributed but the same public information is used to authenticate any)ashow
741 90 gm
0.09262 0. 32 0.00926 0.(user. We can therefore expect the use of zero-knowledge schemes in authentication to)awidthshow
757 90 gm
-0.06221 0.(rapidly grow in the near future.)ashow
F T cp
%%Page: ? 70
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(67)show
802 288 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
110 90 gm
1 fs
18 fz
bu fc
2 F /|______Times-Bold fnt
bn
(6)show
110 126 gm
3.60671 0. 32 0.36067 0.(Implementational Issues)awidthshow
143 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.36010 0. 32 0.03601 0.(The goal of this work is to come up with solutions for open systems security that are)awidthshow
159 90 gm
-0.06498 0.(implementable. This chapter deals with the implementational issues associated with the)ashow
175 90 gm
0.33050 0. 32 0.03305 0.(solutions proposed here and seeks to demonstrate that it actually is feasible to imple-)awidthshow
191 90 gm
0.53695 0. 32 0.05369 0.(ment a secure open system with a reasonable amount of work, based on the existing)awidthshow
207 90 gm
-0.12161 0.(OSI implementations.)ashow
239 90 gm
0.67901 0. 32 0.06790 0.(In this chapter the effect of various hardware and software solutions on the over-all)awidthshow
255 90 gm
0.58807 0. 32 0.05880 0.(security of an open system are analyzed. Also some existing cryptosystems are sug-)awidthshow
271 90 gm
-0.10778 0.(gested to fill in the parts still missing after the preceding chapters.)ashow
306 90 gm
1 fs
14 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.74998 0.(6.1)ashow
306 126 gm
4.36660 0. 32 0.43666 0.(Software Environments)awidthshow
338 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.71701 0. 32 0.07170 0.(Because the goal of this work is solutions that can be implemented with reasonable)awidthshow
354 90 gm
-0.02970 0.(modifications to the existing open systems implementations, it is necessary to consider)ashow
370 90 gm
0.64849 0. 32 0.06484 0.(the existing software environments and their use in implementing the solutions pro-)awidthshow
386 90 gm
0.18051 0. 32 0.01805 0.(posed here.)awidthshow
418 90 gm
1 fs
bu fc
2 F /|______Times-Bold fnt
bn
1.75003 0.(6.1.1)ashow
418 126 gm
3.10684 0. 32 0.31068 0.(Some Sample Environments)awidthshow
450 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.11184 0. 32 0.01118 0.(In the implementation work going on at Telecom Finland, two software environments)awidthshow
466 90 gm
-0.08854 0.(are being used. These are the C-VOPS protocol development and run-time environment)ashow
482 90 gm
0.32348 0. 32 0.03234 0.(developed at the Technical Research Centre of Finland [Kar86, Kar87] and the inter-)awidthshow
498 90 gm
0.11520 0. 32 0.01152 0.(nationally well-established ISODE software package, whose development was started)awidthshow
514 90 gm
1.19033 0. 32 0.11903 0.(by Marshall Rose [Ros90, PSI90]. A brief overview of these two environments is)awidthshow
530 90 gm
-0.03057 0.(given here.)ashow
562 90 gm
1 fs
bu fc
2 F /|______Times-Bold fnt
bn
0.66911 0.(C-VOPS)ashow
594 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.03016 0.(Development of software tools for implementing open systems was started at the Tele-)ashow
610 90 gm
0.00762 0. 32 0.00076 0.(communications laboratory of the Technical Research Centre of Finland in 1983. This)awidthshow
626 90 gm
0.87478 0. 32 0.08747 0.(work led to the birth of the Virtual Operating System \(VOPS\) originally written in)awidthshow
642 90 gm
-0.11973 0.(Pascal and running on a VAX/VMS minicomputer.)ashow
674 90 gm
0.42602 0. 32 0.04260 0.(The main goals of VOPS were to develop an integrated environment for developing,)awidthshow
690 90 gm
0.58334 0. 32 0.05833 0.(testing, and running layered protocols that would run on virtually any computer and)awidthshow
706 90 gm
0.80749 0. 32 0.08074 0.(host operating system. Protocols were modelled as Extended Finite State Automata)awidthshow
722 90 gm
-0.05828 0.(\(EFSAs\) which were then converted into state transition tables accepted by VOPS. The)ashow
738 90 gm
0.60546 0. 32 0.06054 0.(control logic was implemented as a data structure rather than in program code. This)awidthshow
754 90 gm
0.64987 0. 32 0.06498 0.(made the protocols much easier to modify and debug. The EFSA would contain the)awidthshow
F T cp
%%Page: ? 71
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(68)show
802 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
85 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.00793 0. 32 0.00079 0.(sequential control logic \(see fig. 3-1\) of the protocol whereas the coding and decoding)awidthshow
101 90 gm
-0.07942 0.(functions were written as separate subroutines and linked together with the system.)ashow
133 90 gm
0.81710 0. 32 0.08171 0.(Each protocol entity instance runs as a virtual process of VOPS whereas the whole)awidthshow
149 90 gm
0.67581 0. 32 0.06758 0.(VOPS system is just one process from the host operating system's point of view, as)awidthshow
165 90 gm
0.97946 0. 32 0.09794 0.(illustrated in figure 6-1. In this way, the protocol entities only rely on the services)awidthshow
181 90 gm
0.30502 0. 32 0.03050 0.(offered by VOPS, such as scheduling, dynamic memory allocation, message passing,)awidthshow
197 90 gm
-0.09513 0.(and timer services, and are completely independent of the host operating system.)ashow
229 90 gm
0.45166 0. 32 0.04516 0.(The VOPS environment itself being written in a high-level language, porting it from)awidthshow
245 90 gm
2.20565 0. 32 0.22056 0.(one system to another is fairly straight-forward. All the host operating system)awidthshow
261 90 gm
0.03936 0. 32 0.00393 0.(dependent parts of VOPS were collected to a couple of modules. When these modules)awidthshow
277 90 gm
0.84518 0. 32 0.08451 0.(were rewritten, the whole system could be compiled for a new machine and all the)awidthshow
293 90 gm
-0.10845 0.(existing protocol implementations could be used without any modifications.)ashow
325 90 gm
-0.00625 0.(The portability of VOPS was demonstrated in practise by using the same software in a)ashow
341 90 gm
0.41046 0. 32 0.04104 0.(number of systems, such as VAX/VMS, intel 8086/iRMX-86 and IBM PC/PC-DOS,)awidthshow
357 90 gm
-0.09887 0.(with a very reasonable effort in porting the system. Also the same protocol implementa-)ashow
373 90 gm
-0.05963 0.(tions were used as parts of various protocol stacks, demonstrating the modularity of the)ashow
389 90 gm
-0.04411 0.(system. For example, the first prototype transport layer gateway \(just like the gateways)ashow
405 90 gm
1.36505 0. 32 0.13650 0.(described in [Ros90] and [LT90]\) relaying between TP4/LAN and TP0/PDN was)awidthshow
421 90 gm
1.31072 0. 32 0.13107 0.(designed in 1983 [KLP83] and built in 1985 at the Technical Research Centre of)awidthshow
437 90 gm
0.04782 0.(Finland.)ashow
469 90 gm
0.35903 0. 32 0.03590 0.(With VOPS the CCITT Teletex document transfer system, which at the time was the)awidthshow
485 90 gm
0.45364 0. 32 0.04536 0.(only standardized seven-layer open system, was implemented in 1983 through 1985.)awidthshow
501 90 gm
1.29806 0. 32 0.12980 0.(The implementation was validated by Telecom Finland in 1985 and turned into a)awidthshow
517 90 gm
0.94802 0. 32 0.09480 0.(commercial product \(the first available Teletex implementation for VAX/VMS\) by)awidthshow
533 90 gm
1.30615 0. 32 0.13061 0.(Scandinavian Softline Technologies Inc. This implementation was then used by a)awidthshow
549 90 gm
-0.04574 0.(number of large Finnish corporations as the "transport system" in the first national EDI)ashow
565 90 gm
-0.05822 0.(experiments.)ashow
597 90 gm
0.39413 0. 32 0.03941 0.(In early 1986 the development of the second generation VOPS was started. C-VOPS)awidthshow
613 90 gm
0.59936 0. 32 0.05993 0.(\(for C-language VOPS\) was written in the C programming language, which is more)awidthshow
629 90 gm
-0.04187 0.(portable, more modular, and better suited for systems programming than Pascal. At the)ashow
645 90 gm
0.11917 0. 32 0.01191 0.(same time a block-structured and more powerful C-like protocol description language)awidthshow
661 90 gm
-0.07109 0.(was developed for specifying the EFSAs. Also an ASN.1 compiler and interpreter were)ashow
677 90 gm
-0.01292 0.(developed to be used with C-VOPS [Koi87, Nok90].)ashow
709 90 gm
0.72509 0. 32 0.07250 0.(C-VOPS was later adopted by several large Finnish organizations as their preferred)awidthshow
725 90 gm
-0.06648 0.(protocol development environment. Telenokia Inc. chose C-VOPS as the basis for their)ashow
741 90 gm
0.58517 0. 32 0.05851 0.(GSM system development after comparing it with the other available environments,)awidthshow
757 90 gm
-0.11892 0.(including ISODE and Retix.)ashow
F T cp
%%Page: ? 72
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(69)show
802 288 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.17196 0. 32 0.01719 0.(There currently exists a large library of C-VOPS protocol implementations, including)awidthshow
117 90 gm
0.17379 0. 32 0.01737 0.(the most complete FTAM protocol stack available today, a complete MAP 2.1 imple-)awidthshow
133 90 gm
0.90606 0. 32 0.09060 0.(mentation \(completed in 1987\), and the X.500 Directory \(including X.509\). For an)awidthshow
149 90 gm
-0.07106 0.(overview of the current status of the C-VOPS protocol library see [AKS90].)ashow
181 90 gm
0.10284 0. 32 0.01028 0.(The strengths of C-VOPS still are its portability, modularity, large number of existing)awidthshow
197 90 gm
1.52221 0. 32 0.15222 0.(protocol implementations, integrated testing facilities, and available licensing for)awidthshow
213 90 gm
-0.09602 0.(commercial use. A current description of the C-VOPS tool and its features can be found)ashow
229 90 gm
-0.04222 0.(in [HKK90]. The basic principle of C-VOPS is presented in figure 6-1.)ashow
0 0 gm
(nc 256 161 591 433 6 rc)kp
64 gr
322 170 343 210 1 rc
2 2 pen
0 gr
323 171 342 209 0 rc
337 187 gm
1 setTxMode
bu fc
2 F /|______Times-Roman fnt
bn
(7.)show
64 gr
362 170 383 210 1 rc
0 gr
363 171 382 209 0 rc
377 187 gm
1 setTxMode
(6.)show
64 gr
402 170 423 210 1 rc
0 gr
403 171 422 209 0 rc
417 187 gm
1 setTxMode
(4.)show
64 gr
442 170 463 210 1 rc
0 gr
443 171 462 209 0 rc
458 187 gm
1 setTxMode
(5.)show
64 gr
483 170 503 210 1 rc
0 gr
484 171 502 209 0 rc
498 187 gm
1 setTxMode
(3.)show
64 gr
523 170 544 210 1 rc
0 gr
524 171 543 209 0 rc
538 187 gm
1 setTxMode
(2.)show
64 gr
561 170 591 210 1 rc
0 gr
562 171 590 209 0 rc
573 185 gm
0.00366 0 rmoveto
1 setTxMode
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
(I/O)show
584 180 gm
0.25756 0 rmoveto
(driver)show
64 gr
259 161 298 219 1 rc
0 gr
260 162 297 218 0 rc
276 166 gm
1 setTxMode
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.02096 0.(Application)ashow
288 175 gm
-0.09033 0.(Process)ashow
0 gr
316 183 328 195 250 290 1 ar
291 183 303 195 70 110 1 ar
1 1 pen
302 189 gm
317 189 lin
356 183 368 195 250 290 1 ar
336 183 348 195 70 110 1 ar
347 189 gm
357 189 lin
396 183 408 195 250 290 1 ar
376 183 388 195 70 110 1 ar
387 189 gm
397 189 lin
436 183 448 195 250 290 1 ar
416 183 428 195 70 110 1 ar
427 189 gm
437 189 lin
476 183 488 195 250 290 1 ar
456 183 468 195 70 110 1 ar
467 189 gm
477 189 lin
516 183 528 195 250 290 1 ar
496 183 508 195 70 110 1 ar
507 189 gm
517 189 lin
555 183 567 195 250 290 1 ar
537 183 549 195 70 110 1 ar
548 189 gm
556 189 lin
0 0 pen
60 gr
556 189 lin
0.937  60 45 {dup mul exch dup mul add 1.0 exch sub }setscreen setgray
320 303 541 433 1 rc
2 2 pen
0 gr
321 304 540 432 0 rc
64 gr
360 389 379 427 1 rc
1 2 lw
1 1 pen
0 gr
360.5 389.5 378.5 426.5 0 rc
1 1 lw
0 0 pen
556 189 lin
373 404 gm
1 setTxMode
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(7.)show
64 gr
384 389 404 427 1 rc
1 2 lw
1 1 pen
0 gr
384.5 389.5 403.5 426.5 0 rc
1 1 lw
0 0 pen
376 404 gm
376 404 lin
397 404 gm
1 setTxMode
(6.)show
64 gr
408 389 428 427 1 rc
1 2 lw
1 1 pen
0 gr
408.5 389.5 427.5 426.5 0 rc
1 1 lw
0 0 pen
400 404 gm
400 404 lin
421 404 gm
1 setTxMode
(4.)show
64 gr
433 389 452 427 1 rc
1 2 lw
1 1 pen
0 gr
433.5 389.5 451.5 426.5 0 rc
1 1 lw
0 0 pen
424 404 gm
424 404 lin
445 404 gm
1 setTxMode
(5.)show
64 gr
457 389 476 427 1 rc
1 2 lw
1 1 pen
0 gr
457.5 389.5 475.5 426.5 0 rc
1 1 lw
0 0 pen
448 404 gm
448 404 lin
469 404 gm
1 setTxMode
(3.)show
64 gr
481 389 500 427 1 rc
1 2 lw
1 1 pen
0 gr
481.5 389.5 499.5 426.5 0 rc
1 1 lw
0 0 pen
472 404 gm
472 404 lin
493 404 gm
1 setTxMode
(2.)show
64 gr
327 389 355 427 1 rc
1 2 lw
1 1 pen
0 gr
327.5 389.5 354.5 426.5 0 rc
1 1 lw
0 0 pen
496 404 gm
496 404 lin
338 393 gm
0.76538 0 rmoveto
1 setTxMode
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
(interface)show
349 404 gm
(up)show
64 gr
505 389 533 427 1 rc
1 2 lw
1 1 pen
0 gr
505.5 389.5 532.5 426.5 0 rc
1 1 lw
0 0 pen
341 393 gm
341 393 lin
516 393 gm
0.76538 0 rmoveto
1 setTxMode
(interface)show
527 399 gm
0.00134 0 rmoveto
(down)show
64 gr
416 310 444 357 1 rc
1 2 lw
1 1 pen
0 gr
416.5 310.5 443.5 356.5 0 rc
1 1 lw
0 0 pen
519 393 gm
519 393 lin
433 318 gm
1 setTxMode
-0.19979 0.(C-VOPS)ashow
1 2 lw
1 1 pen
341 389 gm
0 gr
420 356 lin
1 1 lw
0 0 pen
420 356 lin
1 2 lw
1 1 pen
369 389 gm
423 356 lin
1 1 lw
0 0 pen
423 356 lin
1 2 lw
1 1 pen
393 389 gm
425 356 lin
1 1 lw
0 0 pen
425 356 lin
1 2 lw
1 1 pen
417 389 gm
428 356 lin
1 1 lw
0 0 pen
428 356 lin
1 2 lw
1 1 pen
518 389 gm
439 356 lin
1 1 lw
0 0 pen
439 356 lin
1 2 lw
1 1 pen
490 389 gm
437 356 lin
1 1 lw
0 0 pen
437 356 lin
1 2 lw
1 1 pen
466 389 gm
434 356 lin
1 1 lw
0 0 pen
434 356 lin
1 2 lw
1 1 pen
442 389 gm
432 356 lin
1 1 lw
0 0 pen
432 356 lin
554 362 566 374 250 290 1 ar
533 362 545 374 70 110 1 ar
1 1 pen
544 368 gm
555 368 lin
64 gr
561 348 591 388 1 rc
2 2 pen
0 gr
562 349 590 387 0 rc
573 363 gm
0.00366 0 rmoveto
1 setTxMode
(I/O)show
584 358 gm
0.25756 0 rmoveto
(driver)show
64 gr
256 339 295 398 1 rc
0 gr
257 340 294 397 0 rc
273 344 gm
1 setTxMode
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.02096 0.(Application)ashow
285 353 gm
-0.09033 0.(Process)ashow
0 gr
313 362 325 374 250 290 1 ar
288 362 300 374 70 110 1 ar
1 1 pen
299 368 gm
314 368 lin
620 90 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
2 fs
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
-0.26438 0.(Figure 6-1:)ashow
620 162 gm
-0.00392 0.(A conventional vs. C-VOPS -based open systems implementation.)ashow
652 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.11468 0.(The next generation of VOPS is already under development since 1988. The Distributed)ashow
668 90 gm
-0.04685 0.(VOPS \(D-VOPS\) has all the good features of C-VOPS but it is also designed to be dis-)ashow
684 90 gm
1.65618 0. 32 0.16561 0.(tributed to a number of processors. Compilers for the SDL [Z.100] and LOTOS)awidthshow
700 90 gm
0.30471 0. 32 0.03047 0.([IS8807] protocol specification languages are also being developed for D-VOPS \(see)awidthshow
716 90 gm
-0.05191 0.(also [IS10167]\). D-VOPS is described in detail in [KM91].)ashow
F T cp
%%Page: ? 73
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(70)show
802 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.25802 0. 32 0.02580 0.(I believe, that the cheap and powerful microprocessors available today and the use of)awidthshow
117 90 gm
0.50994 0. 32 0.05099 0.(parallel processing, together with automatic and semi-automatic tools for converting)awidthshow
133 90 gm
-0.00230 0.(high-level formal protocol descriptions into executable programs, will provide us with)ashow
149 90 gm
-0.11663 0.(the keys to implement affordable and efficient open systems that can take full advantage)ashow
165 90 gm
0.07720 0. 32 0.00772 0.(of the transmission capacity of tomorrow's high-performance data networks. Sophisti-)awidthshow
181 90 gm
-0.05224 0.(cated software tools, such as C-VOPS and D-VOPS, are of great value in this work.)ashow
213 90 gm
1 fs
bu fc
2 F /|______Times-Bold fnt
bn
0.41534 0.(ISODE)ashow
245 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.06889 0.(ISODE is in many ways fundamentally different from C-VOPS. Rather than a develop-)ashow
261 90 gm
-0.04470 0.(ment environment, it is a large, well-structured collection of program modules with the)ashow
277 90 gm
0.63796 0. 32 0.06379 0.(appropriate )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.15412 0.(make)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.41610 0. 32 0.04161 0.( files etc. included. ISODE relies heavily on the system calls of the)awidthshow
293 90 gm
0.17578 0. 32 0.01757 0.(SunOS operating system, being initially developed on a Sun 3 workstation, and is not)awidthshow
309 90 gm
0.71060 0. 32 0.07106 0.(easily ported to other versions of Unix, let alone other operating systems. While C-)awidthshow
325 90 gm
-0.01788 0.(VOPS tries to minimize the number of real processes \(replacing them with virtual pro-)ashow
341 90 gm
-0.06211 0.(cesses\) ISODE )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.05543 0.(forks)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.05520 0.( a large number of processes in the best Unix tradition.)ashow
373 90 gm
0.20202 0. 32 0.02020 0.(ISODE has rapidly become the most widely used OSI protocol development environ-)awidthshow
389 90 gm
1.18286 0. 32 0.11828 0.(ment, both in the U.S. and in Europe. The current version 6.0 of ISODE includes)awidthshow
405 90 gm
0.82885 0. 32 0.08288 0.(many interesting things in addition to the normal FTAM and MHS, such as ASN.1)awidthshow
421 90 gm
-0.08049 0.(tools, FTAM/FTP gateway, OSI Directory Service, OSI Virtual Terminal, OSI Reliable)ashow
437 90 gm
0.45776 0. 32 0.04577 0.(Transfer, transport layer gateways between TP0, TP4 and TCP, and support for both)awidthshow
453 90 gm
2.52639 0. 32 0.25263 0.(X.25 and DoD IP networks [PSI90]. ISODE 6.0 is aligned with U.S. GOSIP)awidthshow
469 90 gm
0.48843 0. 32 0.04884 0.([GOS89]. ISODE has in fact become the de facto reference against which other OSI)awidthshow
485 90 gm
-0.13304 0.(implementations are frequently tested.)ashow
517 90 gm
1 fs
bu fc
2 F /|______Times-Bold fnt
bn
1.75003 0.(6.1.2)ashow
517 126 gm
2.83111 0. 32 0.28311 0.(The Effects of Software Environment on Systems Security)awidthshow
549 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.10293 0.(The implications of the software environment on the overall security of the system must)ashow
565 90 gm
0.88592 0. 32 0.08859 0.(be stressed here. While in theory it is often significant in which layer a function is)awidthshow
581 90 gm
-0.08198 0.(placed this may not be so with the actual working system.)ashow
613 90 gm
-0.01731 0.(It can, for example, be argued that peer entity authentication on the level of the FTAM)ashow
629 90 gm
0.52536 0. 32 0.05253 0.(SASE is more reliable than on the level of ACSE, which again is more reliable than)awidthshow
645 90 gm
0.05294 0. 32 0.00529 0.(authentication at the Transport Layer. However, this need not be the case. In an actual)awidthshow
661 90 gm
-0.07968 0.(implementation at least layers 4 through 7 are usually running within the same software)ashow
677 90 gm
0.44235 0. 32 0.04423 0.(environment. For example, with ISODE they are running as Unix processes with the)awidthshow
693 90 gm
0.35064 0. 32 0.03506 0.(same owner, privileges etc., or with C-VOPS they are running as virtual tasks within)awidthshow
709 90 gm
0.59234 0. 32 0.05923 0.(the same process of the host operating system. Therefore, mechanisms in any of the)awidthshow
725 90 gm
-0.09162 0.(layers 4 through 7 can be considered equally vulnerable \(or resistant\) to outside attacks.)ashow
F T cp
%%Page: ? 74
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(71)show
802 288 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.14028 0. 32 0.11402 0.(Usually layers 4 through 7 of OSI are implemented within the same environment.)awidthshow
117 90 gm
0.25802 0. 32 0.02580 0.(Therefore, the degree of trust one can place in security measures located within these)awidthshow
133 90 gm
0.24978 0. 32 0.02497 0.(layers if practically independent of the layer. E.g. Confidentiality can equally well be)awidthshow
149 90 gm
-0.10510 0.(placed in the Transport Layer or in the Application Layer as far as the size of the trusted)ashow
165 90 gm
-0.03538 0.(software base is concerned.)ashow
200 90 gm
1 fs
14 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.74998 0.(6.2)ashow
200 126 gm
1.87515 0. 32 0.18751 0.(On the Use of Hardware and Software)awidthshow
232 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01339 0.(The price of encryption hardware is decreasing and its availability is improving. In the)ashow
248 90 gm
0.16220 0. 32 0.01622 0.(near future it will be feasible to encrypt all data with a symmetric cryptosystem at the)awidthshow
264 90 gm
0.48461 0. 32 0.04846 0.(full speed of current LANs \(1-100 Mb/s\). Encryption chips are still rather expensive)awidthshow
280 90 gm
0.03387 0. 32 0.00338 0.(and hard to get outside the U.S., mainly because of the policy of the National Security)awidthshow
296 90 gm
0.32150 0. 32 0.03215 0.(Agency \(NSA\) to limit the exportation and use of encryption devices abroad. In time)awidthshow
312 90 gm
1.74545 0. 32 0.17454 0.(this area will enjoy the benefits of the same kind of technological progress and)awidthshow
328 90 gm
-0.10865 0.(commercial competition as we have seen in the area of microprocessors.)ashow
360 90 gm
-0.03939 0.(A study on VLSI implementations of PKCs is found in [BG89].)ashow
392 90 gm
-0.05781 0.(The use of signal processors can offer speeds comparable to hardware implementations)ashow
408 90 gm
-0.11653 0.(with the flexibility of software implementations.)ashow
443 90 gm
1 fs
14 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.74998 0.(6.3)ashow
443 126 gm
1.65878 0. 32 0.16587 0.(On the Role of Smart Cards)awidthshow
475 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.02102 0.(As mentioned earlier, it is desirable to authenticate not only the end system but also its)ashow
491 90 gm
0.83267 0. 32 0.08326 0.(user. This will make it possible for the user to use information services in a secure)awidthshow
507 90 gm
-0.05581 0.(manner, make commitments etc. from any work station. Especially when using a  work)ashow
523 90 gm
0.50155 0. 32 0.05015 0.(station other than that of his own, the user should not trust in it. At the very least he)awidthshow
539 90 gm
0.16921 0. 32 0.01692 0.(should never give his master keys \(those used for authentication and key distribution\))awidthshow
555 90 gm
0.32028 0. 32 0.03202 0.(to an untrusted piece of equipment. Even giving a perishable session key to someone)awidthshow
571 90 gm
-0.01293 0.(else is a security threat but at least this threat is limited in time and does not enable the)ashow
587 90 gm
-0.14192 0.(enemy to make commitments on behalf of the legitimate user.)ashow
619 90 gm
-0.04127 0.(In fact, it can be argued that it is judicially essential that the functions of authentication)ashow
635 90 gm
0.58074 0. 32 0.05807 0.(and non-repudiation be raised on the level of the user, rather than left to his "agent")awidthshow
651 90 gm
-0.07052 0.(within the OSI world \(that is his Application Entity\). For example, it can be argued that)ashow
667 90 gm
0.08438 0. 32 0.00843 0.(it is not the work station of the President but only the President himself that should be)awidthshow
683 90 gm
-0.09403 0.(allowed to declare a war.)ashow
715 90 gm
-0.02146 0.(In secure communications between application instances A and B, it is essential that at)ashow
731 90 gm
-0.09593 0.(least some part of the security context SC)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.14019 0.(AB)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.10041 0.( depend on the user in the following ways:)ashow
F T cp
%%Page: ? 75
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(72)show
802 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(-)show
101 126 gm
-0.05847 0.(Identification of the user is required when setting up the security context \("need)ashow
117 126 gm
-0.02668 0.(to know"\) and activity from the part of the user is required for making commit-)ashow
133 126 gm
0.06773 0.(ments.)ashow
165 90 gm
(-)show
165 126 gm
-0.13130 0.(The security context will be automatically terminated as soon as the user secedes)ashow
181 126 gm
-0.08102 0.(from the transaction.)ashow
213 90 gm
0.25268 0. 32 0.02526 0.(If the secret required for authentication and digital signature is possessed by the user,)awidthshow
229 90 gm
0.15945 0. 32 0.01594 0.(and can only be used by him, it is fairly simple to give this kind of authentication and)awidthshow
245 90 gm
-0.02874 0.(non-repudiation a judicial standing by means of legislation. If, on the other hand, these)ashow
261 90 gm
1.09115 0. 32 0.10911 0.(operations were performed entirely by a piece of equipment \(that is the user's end)awidthshow
277 90 gm
-0.05618 0.(system\), it would always be possible to dispute them later.)ashow
309 90 gm
-0.00617 0.(However, the cryptographic keys and functions involved in strong authentication, data)ashow
325 90 gm
0.21728 0. 32 0.02172 0.(encryption, and digital signature are too complicated to be memorized and performed)awidthshow
341 90 gm
0.20706 0. 32 0.02070 0.(mentally. This means that the user needs to store his keys somewhere and use a piece)awidthshow
357 90 gm
-0.08850 0.(of trusted equipment to perform the cryptographic functions.)ashow
389 90 gm
0.36376 0. 32 0.03637 0.(There clearly exists a need for a small, trusted personal piece of equipment, which is)awidthshow
405 90 gm
-0.08015 0.(capable of securely storing the keys and performing the cryptographic functions needed)ashow
421 90 gm
-0.04051 0.(and can only be activated by its legitimate owner. A smart card can be used to securely)ashow
437 90 gm
1.51428 0. 32 0.15142 0.(hold its owner's secret keys and include hardware mechanisms implementing the)awidthshow
453 90 gm
0.28717 0. 32 0.02871 0.(cryptosystems employed. For the activation of the smart card a biometric mechanism)awidthshow
469 90 gm
1.38854 0. 32 0.13885 0.(\(based on e.g. recognition of retina patterns or finger prints\) could be used but a)awidthshow
485 90 gm
0.45074 0. 32 0.04507 0.(Personal Identity Number \(PIN code, comparable to that of the PIN codes of current)awidthshow
501 90 gm
-0.10542 0.(dumb plastic cards\) memorized by the user can be considered adequate.)ashow
533 90 gm
-0.07536 0.(The current smart cards are not suitable for our purposes for several reasons:)ashow
565 90 gm
(-)show
565 126 gm
-0.05654 0.(They include functions that are not at all necessary but add to the complexity of)ashow
581 126 gm
-0.02207 0.(the device, such as a "purse" for storing money.)ashow
613 90 gm
(-)show
613 126 gm
-0.01472 0.(They lack an integrated keyboard, which is absolutely vital for safe authentica-)ashow
629 126 gm
-0.01924 0.(tion of the user.)ashow
661 90 gm
-0.00553 0.(To protect against misuse after theft or loss of a smart card, it must be activated with a)ashow
677 90 gm
-0.06468 0.(PIN code. Without this PIN code the card cannot be activated and used. The security of)ashow
693 90 gm
-0.01333 0.(a smart card depends on the secrecy of this PIN code, should it leak the smart card can)ashow
709 90 gm
0.14816 0. 32 0.01481 0.(be misused by anyone gaining possession of the card. Therefore, the PIN code should)awidthshow
725 90 gm
0.46554 0. 32 0.04655 0.(be memorized by the owner of the card and never be written down, or keyed into an)awidthshow
741 90 gm
-0.09333 0.(untrusted piece of equipment.)ashow
F T cp
%%Page: ? 76
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(73)show
802 288 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.11045 0.(What is an untrusted piece of equipment? Any public device, such as an automatic teller)ashow
117 90 gm
1.31011 0. 32 0.13101 0.(machine or vending machine, certainly has to be considered untrustworthy. One's)awidthshow
133 90 gm
0.54046 0. 32 0.05404 0.(private work station probably is relatively trustworthy, provided that it is sealed and)awidthshow
149 90 gm
1.10580 0. 32 0.11058 0.(kept behind locked doors. However, ultimately the smallest possible set of trusted)awidthshow
165 90 gm
-0.10247 0.(equipment is the smart card itself. A minimum requirement for a truly secure smart card)ashow
181 90 gm
-0.06013 0.(is that it has a keyboard of its own for keying in the secret PIN code.)ashow
213 90 gm
-0.06970 0.(On the other hand, some facilities commonly included in modern smart cards, such as a)ashow
229 90 gm
0.50079 0. 32 0.05007 0.(rechargeable purse for petty cash, will be completely unnecessary in the near future.)awidthshow
245 90 gm
-0.02183 0.(With the integrating networks and real-time banking services emerging, authentication)ashow
261 90 gm
0.75942 0. 32 0.07594 0.(and non-repudiation \(combined with integrity and confidentiality\) will be sufficient)awidthshow
277 90 gm
0.05462 0. 32 0.00546 0.(functions for electronic purchases. Once the user is identified, any one of his accounts)awidthshow
293 90 gm
-0.05610 0.(can be debited, in real-time, through the network. With small purchases, where the cost)ashow
309 90 gm
-0.07212 0.(of real-time communications and processing would be unreasonable, vending machines)ashow
325 90 gm
0.63034 0. 32 0.06303 0.(and such can be operated off-line. Larger transactions can still be processed in real-)awidthshow
341 90 gm
0.03601 0. 32 0.00360 0.(time. The limit for checking the status of the card \(e.g. reported stolen\) and balance of)awidthshow
357 90 gm
-0.00961 0.(the account can be made variable \(from day to day and machine to machine\) to further)ashow
373 90 gm
-0.06298 0.(discourage the misuse of smart cards that have got into wrong hands.)ashow
405 90 gm
-0.14495 0.(The essential facilities a smart card must include are the following:)ashow
437 90 gm
(-)show
437 126 gm
-0.04202 0.(Public key cryptosystem for encrypting and decrypting data and generating and)ashow
453 126 gm
0.49453 0. 32 0.04945 0.(checking digital signatures. It must be impossible to gain access to the secret)awidthshow
469 126 gm
-0.05728 0.(key of the card by any means.)ashow
501 90 gm
(-)show
501 126 gm
-0.11955 0.(Symmetric cryptosystem for bulk encryption and decryption \(confidentiality and)ashow
517 126 gm
0.18234 0. 32 0.01823 0.(integrity of communications\). It should be possible to load in pairwise session)awidthshow
533 126 gm
0.04440 0. 32 0.00444 0.(keys encrypted and signed with public key cryptosystems without the pairwise)awidthshow
549 126 gm
-0.09291 0.(keys ever leaving the card in an unencrypted form.)ashow
581 90 gm
(-)show
581 126 gm
-0.10705 0.(Memory to keep a log of the most recent transactions.)ashow
613 90 gm
(-)show
613 126 gm
-0.06932 0.(Integrated keyboard to key in the PIN code.)ashow
645 90 gm
(-)show
645 126 gm
-0.09339 0.(Preferably, a small display for displaying critical information.)ashow
677 90 gm
0.06393 0. 32 0.00639 0.(The reasons for wanting all these facilities on the smart card are more or less obvious.)awidthshow
693 90 gm
1.34155 0. 32 0.13415 0.(Without an integrated keyboard PIN-codes would easily be compromised and the)awidthshow
709 90 gm
0.27984 0. 32 0.02798 0.(reliable authentication and non-repudiation functions of the smart card lost. A hostile)awidthshow
725 90 gm
0.49636 0. 32 0.04963 0.(machine could even swallow the smart card having first obtained the secret code for)awidthshow
741 90 gm
0.25604 0. 32 0.02560 0.(activating it. An asymmetric cryptosystem is essential for authentication, non-repudi-)awidthshow
757 90 gm
-0.08827 0.(ation, and confidentiality.)ashow
F T cp
%%Page: ? 77
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(74)show
802 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.05508 0. 32 0.00550 0.(A symmetric cryptosystem is needed on the card for efficient bulk encryption in order)awidthshow
117 90 gm
1.03103 0. 32 0.10310 0.(to achieve confidentiality, integrity, and continued authentication with connection-)awidthshow
133 90 gm
0.03616 0. 32 0.00361 0.(oriented services, as described in section 3.2.1. If this mechanism was not to reside on)awidthshow
149 90 gm
-0.02607 0.(the card, the terminal would have to know the pairwise session key and could continue)ashow
165 90 gm
-0.02033 0.(the transaction on behalf of the user even after the smart card has been extracted. Even)ashow
181 90 gm
-0.08876 0.(though the terminal could not make commitments without the secret keys on the card, it)ashow
197 90 gm
0.81893 0. 32 0.08189 0.(could still impersonate as the user after the user has left. If the physical encryption)awidthshow
213 90 gm
0.44082 0. 32 0.04408 0.(mechanism, as well as the pairwise symmetric key, is on the smart card, the security)awidthshow
229 90 gm
-0.11952 0.(context will automatically be terminated when when the user takes his card and leaves.)ashow
261 90 gm
1.32339 0. 32 0.13233 0.(An integrated display is needed, because without a trusted system that includes a)awidthshow
277 90 gm
1.13189 0. 32 0.11318 0.(display the user cannot know for sure what he is signing. For example, a vending)awidthshow
293 90 gm
0.88317 0. 32 0.08831 0.(machine or an automatic teller machine could debit $1,000 from the user's account)awidthshow
309 90 gm
0.10513 0. 32 0.01051 0.(while the user thinks he is approving a transaction of $100. In fact, the machine could)awidthshow
325 90 gm
0.46401 0. 32 0.04640 0.(perform any number of transactions that the user is completely unaware of while his)awidthshow
341 90 gm
-0.05561 0.(activated card is inserted in the machine. The way to prevent this is by letting the user's)ashow
357 90 gm
0.43472 0. 32 0.04347 0.(card display the essentials of a transaction before the user commits himself to it. For)awidthshow
373 90 gm
-0.03887 0.(example, the card could display the message: "debit $1,000" after which the user could)ashow
389 90 gm
-0.05403 0.(either approve or abort the transaction by pressing a key on the card's keyboard.)ashow
421 90 gm
0.43609 0. 32 0.04360 0.(The log memory is needed in order to settle any possible disputes later. Its existence)awidthshow
437 90 gm
0.68725 0. 32 0.06872 0.(alone considerably reduces the chance of a dispute. In the log memory the card can)awidthshow
453 90 gm
0.24139 0. 32 0.02413 0.(store an unforgeable receipt, signed by the other party, of each transaction made with)awidthshow
469 90 gm
1.31851 0. 32 0.13185 0.(the card. The user can periodically download the contents of the log e.g. into his)awidthshow
485 90 gm
0.18173 0. 32 0.01817 0.(personal work station or a commercial \(or official\) trusted machine, thereby releasing)awidthshow
501 90 gm
-0.06118 0.(the memory space for reuse.)ashow
533 90 gm
0.05691 0. 32 0.00569 0.(The chip area, and therefore also the storage and processing capacity, of current smart)awidthshow
549 90 gm
0.06378 0. 32 0.00637 0.(cards is rather limited, as pointed out e.g. in [FP90]. Also display tehcnologies are not)awidthshow
565 90 gm
-0.07142 0.(yet sufficiently advanced for building small, cheap, and flexible displays. It is clear that)ashow
581 90 gm
-0.06240 0.(all of the facilities discussed above will not fit on a smart card for at least several years.)ashow
597 90 gm
-0.05917 0.(However, it can be argued that a smart card without these facilities cannot be used with)ashow
613 90 gm
-0.05108 0.(untrusted terminals and it can give the user a false impression of security thereby being)ashow
629 90 gm
-0.09538 0.(even less safe than the magnetic stripe card it superseded.)ashow
661 90 gm
-0.02032 0.(It appears that current smart cards are designed to protect the interests of banks, shops,)ashow
677 90 gm
0.95245 0. 32 0.09524 0.(and such rather than those of the customers. The large-scale automated transaction)awidthshow
693 90 gm
0.97290 0. 32 0.09729 0.(systems of the near future can \(and should\) be designed to protect the privacy and)awidthshow
709 90 gm
-0.08401 0.(maintain the security of both individuals and organizations, as pointed out in [Cha85].)ashow
741 90 gm
0.64926 0. 32 0.06492 0.(While waiting for the smart card technology to catch up with the requirements, it is)awidthshow
757 90 gm
1.84936 0. 32 0.18493 0.(possible to build larger trusted pieces of equipment that could, for example, be)awidthshow
F T cp
%%Page: ? 78
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(75)show
802 288 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
85 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.03652 0. 32 0.10365 0.(integrated into a pocket calculator or a personal portable phone emerging with the)awidthshow
101 90 gm
0.78521 0. 32 0.07852 0.(Universal Personal Telecommunications \(UPT\) concept. In such a phone we would)awidthshow
117 90 gm
0.07476 0. 32 0.00747 0.(actually have a wireless connection to worldwide networks at our disposal where ever)awidthshow
133 90 gm
-0.03521 0.(we are. On this scale, it is fairly easy to build tamper-proof modules to hold the critical)ashow
149 90 gm
-0.01588 0.(parts of the system.)ashow
184 90 gm
1 fs
14 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.74998 0.(6.4)ashow
184 126 gm
3.57849 0. 32 0.35784 0.(Real Cryptosystems)awidthshow
216 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.00241 0.(The core of this work is independent of existing cryptosystems and should remain that)ashow
232 90 gm
0.04180 0. 32 0.00418 0.(way. While the preceding chapters have not been based on any current cryptosystems,)awidthshow
248 90 gm
1.11236 0. 32 0.11123 0.(the availability of at least a good symmetric cryptosystem and a good asymmetric)awidthshow
264 90 gm
0.97366 0. 32 0.09736 0.(\(public key\) cryptosystem is assumed. To tie this work more firmly to the ground,)awidthshow
280 90 gm
0.67138 0. 32 0.06713 0.(some real cryptosystems, that can be used as pieces of the higher level mechanisms)awidthshow
296 90 gm
-0.05993 0.(described earlier, are suggested here.)ashow
328 90 gm
1.63116 0. 32 0.16311 0.(For a symmetric cryptosystem to be used for bulk encryption and calculation of)awidthshow
344 90 gm
-0.05821 0.(cryptosums DES is suggested. While DES is not believed to be totally unbreakable, the)ashow
360 90 gm
0.21850 0. 32 0.02185 0.(cost of breaking it is still relatively high \(probably even for NSA\) and few parties are)awidthshow
376 90 gm
0.88134 0. 32 0.08813 0.(even suspected to have the skills required for a serious attack against it, other than)awidthshow
392 90 gm
0.51834 0. 32 0.05183 0.(exhaustive search of keys. DES is also reasonably efficient to execute with software)awidthshow
408 90 gm
-0.05390 0.(and fast DES chips are in production. DES is described more closely in appendix 1 and)ashow
424 90 gm
0.26657 0. 32 0.02665 0.(in references [SB88, DP84, ANS81, ANS83].)awidthshow
456 90 gm
1.82586 0. 32 0.18258 0.(For a Public Key Cryptosystem the Rivest-Shamir-Adleman algorithm \(RSA\) is)awidthshow
472 90 gm
-0.03872 0.(recommended. With key lengths of about 1000 bits RSA is believed to be secure and it)ashow
488 90 gm
-0.00971 0.(has some nice properties which make is well suited for generation of digital signatures)ashow
504 90 gm
1.43203 0. 32 0.14320 0.(as well as data encryption. Breaking RSA is as hard as factoring a large integer.)awidthshow
520 90 gm
2.11090 0. 32 0.21109 0.(Therefore, significant advances in the area of number theory could make RSA)awidthshow
536 90 gm
0.94985 0. 32 0.09498 0.(unusable. RSA is described more closely in appendix 1 and in references [RSA78,)awidthshow
552 90 gm
0.13461 0.(DP84].)ashow
F T cp
%%Page: ? 79
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(76)show
802 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
110 90 gm
1 fs
18 fz
bu fc
2 F /|______Times-Bold fnt
bn
(7)show
110 126 gm
2.80822 0. 32 0.28082 0.(Implementing Secure FTAM)awidthshow
143 90 gm
2 fs
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
-0.05548 0.(The proof of a pudding is its eating.)ashow
159 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.07449 0.(\(an old English saying\))ashow
191 90 gm
0.15411 0. 32 0.01541 0.(Since the fall of 1989 implementation work based on the ideas presented in this study)awidthshow
207 90 gm
1.06460 0. 32 0.10646 0.(has been going on in Telecom Finland. As the first concrete application, a limited)awidthshow
223 90 gm
0.53894 0. 32 0.05389 0.(working prototype of secure FTAM is being built. The architecture of this project is)awidthshow
239 90 gm
-0.01412 0.(described in [KHA90].)ashow
274 90 gm
1 fs
14 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.74998 0.(7.1)ashow
274 126 gm
3.11538 0. 32 0.31153 0.(Requirements and Restrictions)awidthshow
306 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.05706 0. 32 0.00570 0.(The basic security requirements for FTAM were those stated in section 3.2.1, namely:)awidthshow
322 90 gm
0.59936 0. 32 0.05993 0.(Peer Entity Authentication, Connection Integrity, and Connection Confidentiality. It)awidthshow
338 90 gm
0.11672 0. 32 0.01167 0.(was concluded that Non-repudiation and Access Control could be left out for the time)awidthshow
354 90 gm
0.06797 0.(being.)ashow
389 90 gm
1 fs
14 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.74998 0.(7.2)ashow
389 126 gm
3.65402 0. 32 0.36540 0.(FTAM Security Profile)awidthshow
421 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.02874 0. 32 0.10287 0.(The ultimate profile of Secure FTAM is presented in figure 7-1 below. The figure)awidthshow
437 90 gm
0.24749 0. 32 0.02474 0.(shows both communications and security profiles, security related parts of the profile)awidthshow
453 90 gm
-0.07341 0.(are in bold-face. For practical reasons, the work was started with a modified profile and)ashow
469 90 gm
-0.03607 0.(later extended to that of figure 7-1. Here the Secure FTAM Profile is presented briefly,)ashow
485 90 gm
-0.06846 0.(layer by layer.)ashow
517 90 gm
0.32211 0. 32 0.03221 0.(In the application layer, the latest versions of FTAM [IS8571-4] and ACSE [IS8650])awidthshow
533 90 gm
-0.00918 0.(protocols are used. In the first phase, authentication is done at the transport layer but it)ashow
549 90 gm
1.06887 0. 32 0.10688 0.(will later be moved up to the application layer. The Security Addendum of ACSE)awidthshow
565 90 gm
-0.02592 0.([IS8650/A1] is used for the two-way authentication exchange. A limited version of the)ashow
581 90 gm
0.27252 0. 32 0.02725 0.(SCSE \(see section 3.4.3\) is implemented in phase two to perform the actual authenti-)awidthshow
597 90 gm
-0.08717 0.(cation function.)ashow
629 90 gm
1.13632 0. 32 0.11363 0.(In the presentation layer, the standard ISO presentation protocol [IS8823] is used.)awidthshow
645 90 gm
-0.02180 0.(When selective field integrity and confidentiality are included in the SCSE \(some time)ashow
661 90 gm
-0.08120 0.(in the future\), the presentation layer standards will have to be augmented with presenta-)ashow
677 90 gm
-0.08206 0.(tion contexts supporting data encryption.)ashow
709 90 gm
0.73791 0. 32 0.07379 0.(In the session layer, the standard ISO session protocol is used. The functional units)awidthshow
725 90 gm
-0.09968 0.(Kernel and Full Duplex are mandatory.)ashow
F T cp
%%Page: ? 80
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(77)show
802 288 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
2.32986 0. 32 0.23298 0.(In the transport layer, the standard ISO transport protocol [IS8073], including)awidthshow
117 90 gm
2.02087 0. 32 0.20208 0.(operation on a connectionless network service [IS8073/A2], is used. Class 4 is)awidthshow
133 90 gm
0.87310 0. 32 0.08731 0.(supported, with negotiation down to class 0 if necessary. An augmented version of)awidthshow
149 90 gm
1.13952 0. 32 0.11395 0.(EESP [ISO90a] is used, where certain defects, ambiguities, and contradictions are)awidthshow
165 90 gm
0.48721 0. 32 0.04872 0.(solved in a way commonly agreed on in the European COST-225 Secure Communi-)awidthshow
181 90 gm
-0.07028 0.(cations project [CGV90].)ashow
213 90 gm
0.29037 0. 32 0.02903 0.(In the network layer, the choice between two different subnetworks is given: one is a)awidthshow
229 90 gm
0.48843 0. 32 0.04884 0.(Local Area Network of the Ethernet-type, the other is the world-wide public packet-)awidthshow
245 90 gm
-0.06289 0.(switched X.25 data network. Three alternatives, all in accordance with the principles of)ashow
261 90 gm
1.57104 0. 32 0.15710 0.(OSI sub-layering, exist: ISO IP [IS8473] can be run on top of ISO 8802-2 LLC)awidthshow
277 90 gm
0.94390 0. 32 0.09439 0.([IS8802-2] or on X.25 PLP \(CCITT 1984, [IS8208]\); as the third alternative, X.25)awidthshow
293 90 gm
-0.02416 0.(can be used without ISO IP.)ashow
325 90 gm
0.59082 0. 32 0.05908 0.(At the two bottom layers, either a local are network of the Ethernet type [IS8802-3])awidthshow
341 90 gm
0.82962 0. 32 0.08296 0.(with ISO LLC type 1 [IS8802-2] or, with X.25, LAPB [IS7776] and X.21 physical)awidthshow
357 90 gm
1 2 lw
-0.00984 0.(interface [X.21] are used.)ashow
psb
pse
nc ct 39 0 put
0 0 gm
64 gr
qf
683 367 gm
pt
585 367 pl
585 433 pl
562 433 pl
ef
0 gr
eu
(nc 392 94 685 500 6 rc)kp
1 1 lw
0 0 pen
0 gr
562 433 lin
2 2 pen
393 236 683 499 0 rc
411 339 gm
1 setTxMode
bu fc
2 F /|______Times-Roman fnt
bn
-0.03561 0.(ISO 8571-4)ashow
429 298 gm
7.32714 0 rmoveto
1 fs
bu fc
2 F /|______Times-Bold fnt
bn
(SCSE and ISO 8650/DAD1)show
448 344 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.04675 0.(ISO 8650)ashow
476 344 gm
-0.04675 0.(ISO 8823)ashow
504 344 gm
-0.04675 0.(ISO 8327)ashow
533 260 gm
0.01562 0 rmoveto
(ISO 8073 and ISO 8073/Add. 2, Class 4 or 0)show
577 344 gm
-0.04675 0.(ISO 8473)ashow
626 255 gm
0.01171 0 rmoveto
(ISO 8802-2, Type 1)show
673 275 gm
-0.03561 0.(ISO 8802-3)ashow
645 274 gm
-0.03561 0.(ISO 8802-3)ashow
551 352 gm
0.99560 0 rmoveto
1 fs
bu fc
2 F /|______Times-Bold fnt
bn
(EESP)show
600 375 gm
0.18115 0 rmoveto
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(ISO 8208 \(CCITT X.25\))show
636 387 gm
-0.07009 0.(ISO 7776 \(LAPB\))ashow
673 401 gm
0.33789 0 rmoveto
(CCITT X.21)show
1 2 lw
1 1 pen
458 236 gm
0 gr
458 498 lin
1 1 lw
0 0 pen
458 498 lin
1 2 lw
1 1 pen
486 236 gm
486 498 lin
1 1 lw
0 0 pen
486 498 lin
1 2 lw
1 1 pen
514 236 gm
514 498 lin
1 1 lw
0 0 pen
514 498 lin
1 2 lw
1 1 pen
561 236 gm
561 498 lin
1 1 lw
0 0 pen
561 498 lin
1 2 lw
1 1 pen
608 236 gm
608 498 lin
1 1 lw
0 0 pen
608 498 lin
1 2 lw
1 1 pen
655 236 gm
655 498 lin
1 1 lw
0 0 pen
655 498 lin
429 96 gm
1 setTxMode
-0.13825 0.(7. Application Layer)ashow
476 96 gm
-0.06437 0.(6. Presentation Layer)ashow
504 96 gm
(5. Session Layer)show
542 96 gm
-0.03643 0.(4. Transport Layer)ashow
589 96 gm
(3. Network Layer)show
636 96 gm
-0.13462 0.(2. Data Link Layer)ashow
673 96 gm
-0.03964 0.(1. Physical Layer)ashow
626 198 gm
-0.16264 0.(\(LLC\))ashow
645 193 gm
-0.33010 0.(\(MAC\))ashow
577 183 gm
-0.14367 0.(\(Internet\))ashow
600 186 gm
-0.04530 0.(\(Subnet\))ashow
1 1 pen
730 90 gm
(nc 30 28 811 566 6 rc)kp
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.26438 0.(Figure 7-1:)ashow
730 162 gm
-0.01553 0.(Secure FTAM Profile.)ashow
F T cp
%%Page: ? 81
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(78)show
802 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01925 0.(Authentication is handled by the Secure Communications Service Element \(SCSE, see)ashow
117 90 gm
0.02365 0. 32 0.00236 0.(section 3.4.3\) with the help of the Association Control Service Element authentication)awidthshow
133 90 gm
-0.05264 0.(facility [IS8650/A1]. Bulk Integrity and Confidentiality are achieved by using the End-)ashow
149 90 gm
0.20568 0. 32 0.02056 0.(system to End-system Security Protocol \(EESP\) [ISO90a] at the bottom of the Trans-)awidthshow
165 90 gm
0.07720 0. 32 0.00772 0.(port Layer, as proposed in sections 4.2 and 4.3. DES is used as the symmetric encryp-)awidthshow
181 90 gm
-0.07388 0.(tion mechanism required by EESP.)ashow
213 90 gm
0.02349 0. 32 0.00234 0.(The EESP proposal also includes Peer Entity Authentication at the Transport Layer. It)awidthshow
229 90 gm
-0.04112 0.(was decided, that the first working prototype should use the Peer Entity Authentication)ashow
245 90 gm
0.45257 0. 32 0.04525 0.(facility of EESP but based on asymmetric, rather than symmetric, encryption. At the)awidthshow
261 90 gm
0.89508 0. 32 0.08950 0.(next stage, authentication will be moved up to the Application Layer and based on)awidthshow
277 90 gm
0.25970 0. 32 0.02597 0.(ACSE, as proposed in section 4.1. RSA is used as the asymmetric encryption mecha-)awidthshow
293 90 gm
-0.08366 0.(nism required for strong authentication.)ashow
328 90 gm
1 fs
14 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.74998 0.(7.3)ashow
328 126 gm
2.76885 0. 32 0.27688 0.(Management Issues)awidthshow
360 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.07008 0.(The certificate distribution mechanism of the Directory [X.509] is used to distribute the)ashow
376 90 gm
0.04348 0. 32 0.00434 0.(public keys. The X.500 Directory User Agents \(DUAs\), located at the communicating)awidthshow
392 90 gm
-0.02102 0.(end-systems, can query X.509-type certificates of the public keys of other parties from)ashow
408 90 gm
1.15982 0. 32 0.11598 0.(their Directory Server Agents \(DSAs\). The certified public keys are then used for)awidthshow
424 90 gm
0.55725 0. 32 0.05572 0.(mutual strong authentication and the exchange of a pair-wise session key to be used)awidthshow
440 90 gm
(with the EESP.)show
2 2 pen
623 333 gm
(nc 463 154 700 438 6 rc)kp
0 gr
655 398 lin
613 229 gm
660 192 lin
548 286 gm
501 286 lin
psb
pse
nc ct 39 0 put
594 220 gm
bp
576 239 T qi
557 239 qc
538 258 qc
538 295 qc
557 314 qc
557 333 qc
566 342 qc
585 342 qc
594 333 qc
604 333 qc
623 342 qc
632 333 qc
632 314 qc
641 304 qc
651 304 qc
660 295 qc
660 276 qc
651 267 qc
632 267 qc
623 258 qc
623 248 qc
613 220 qc
594 220 64 gr
T qq
qf
ef
0 gr
7 ec
(nc 463 154 700 438 6 rc)kp
585 259 gm
1 setTxMode
bu fc
2 F /|______Times-Roman fnt
bn
-0.03971 0.(Untrusted)ashow
597 262 gm
0.01025 0 rmoveto
(Network)show
609 260 gm
-0.14367 0.(\(Internet\))ashow
64 gr
463 258 512 316 1 rc
0 gr
464 259 511 315 0 rc
484 272 gm
0.66845 0 rmoveto
1 setTxMode
(X.500)show
496 275 gm
-0.49853 0.(DSA)ashow
64 gr
651 154 700 222 1 rc
0 gr
652 155 699 221 0 rc
681 171 gm
1 setTxMode
-0.44366 0.(FTAM)ashow
693 175 gm
-0.33082 0.(client)ashow
665 175 gm
-0.49472 0.(DUA)ashow
64 gr
651 370 700 438 1 rc
0 gr
652 371 699 437 0 rc
681 389 gm
1 setTxMode
-0.44366 0.(FTAM)ashow
693 391 gm
-0.06117 0.(server)ashow
665 393 gm
-0.49472 0.(DUA)ashow
0 gr
676 360 688 372 160 200 1 ar
676 219 688 231 340 380 1 ar
1 1 pen
682 230 gm
682 361 lin
496 250 508 262 96 136 1 ar
643 180 655 192 276 316 1 ar
644 188 gm
506 253 lin
642 394 654 406 221 261 1 ar
495 312 507 324 41 81 1 ar
505 320 gm
643 397 lin
679 242 gm
1 setTxMode
-0.09107 0.(Secure FTAM Session)ashow
569 171 gm
0.66845 0 rmoveto
(X.509)show
581 158 gm
-0.20887 0.(Certificates)ashow
569 379 gm
0.66845 0 rmoveto
(X.509)show
581 366 gm
-0.20887 0.(Certificates)ashow
734 90 gm
(nc 30 28 811 566 6 rc)kp
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.26438 0.(Figure 7-2:)ashow
734 162 gm
-0.00938 0.(Key management in Secure FTAM.)ashow
F T cp
%%Page: ? 82
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(79)show
802 288 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
104 90 gm
1 fs
14 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.74998 0.(7.4)ashow
104 126 gm
4.15527 0. 32 0.41552 0.(Implementation Environment)awidthshow
136 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.61508 0. 32 0.06150 0.(The FTAM implementation of ISODE is used as the basis of this work for practical)awidthshow
152 90 gm
0.52795 0. 32 0.05279 0.(reasons. Because it is our intention to experiment with secure FTAM internationally)awidthshow
168 90 gm
-0.11923 0.(within the COST-225 project, and because ISODE is the international de facto reference)ashow
184 90 gm
0.44235 0. 32 0.04423 0.(implementation it, rather than C-VOPS, was chosen as the basis of this work. A Sun)awidthshow
200 90 gm
0.10192 0. 32 0.01019 0.(3/80 workstation connected to both a Local Area Network and the public X.25 Packet)awidthshow
216 90 gm
0.47225 0. 32 0.04722 0.(Switched Data Network is used. The system is first tested with TP0 running on both)awidthshow
232 90 gm
0.00396 0. 32 0.00039 0.(X.25 and TCP/IP. Later on, ISO IP will be used in the LAN.)awidthshow
264 90 gm
0.48660 0. 32 0.04866 0.(The C-VOPS implementations of both the Directory Server Agent and the Directory)awidthshow
280 90 gm
-0.02423 0.(User Agent of the X.500 Directory \(including X.509\) are used and run on Sun 3.)ashow
315 90 gm
1 fs
14 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.74998 0.(7.5)ashow
315 126 gm
2.18765 0. 32 0.21876 0.(Current Status of the Project)awidthshow
347 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.73898 0. 32 0.07389 0.(The first version of Secure FTAM was successfully demonstrated at the COST-225)awidthshow
363 90 gm
-0.07885 0.(management committee meeting in Yugoslavia in October 1990. At that time, integrity,)ashow
379 90 gm
-0.06738 0.(confidentiality, and primitive authentication \(based on symmetric encryption and initial)ashow
395 90 gm
-0.03465 0.(sequence numbers of PDUs\), all done with EESP at the transport layer, were working.)ashow
427 90 gm
0.14572 0. 32 0.01457 0.(At the next phase, public key encryption and certificates distributed via X.509 will be)awidthshow
443 90 gm
1.47598 0. 32 0.14759 0.(used for key management. Interfacing the key management with X.509 was well)awidthshow
459 90 gm
-0.05813 0.(under-way in November. At the first stage, both the DUA and the DSA \(see figure 7-2\))ashow
475 90 gm
0.63232 0. 32 0.06323 0.(are running on the same Sun 3 workstation and communicating via shared memory.)awidthshow
491 90 gm
0.46081 0. 32 0.04608 0.(Later on, a real, distributed directory system will be used. In the year 1991 the work)awidthshow
507 90 gm
-0.15936 0.(will be continued by implementing Peer Entity Authentication in the Application Layer.)ashow
539 90 gm
0.28823 0. 32 0.02882 0.(Due to some limitations of the latest ISODE version \(v. 6.0\), the current status of the)awidthshow
555 90 gm
-0.07510 0.(system differs from figure 7-1 in several ways which are described here in some detail.)ashow
587 90 gm
0.40008 0. 32 0.04000 0.(In ISODE, only class 0 transport protocol is currently supported on the LAN. There-)awidthshow
603 90 gm
1.44973 0. 32 0.14497 0.(fore, transport protocol class 4, which is the preferable class with connectionless)awidthshow
619 90 gm
1.24069 0. 32 0.12406 0.(networks, cannot be used in LANs. ISODE currently runs TP0 on top of TCP/IP,)awidthshow
635 90 gm
0.45974 0. 32 0.04597 0.(instead of ISO IP, as shown in figure 7-3 \(just forget the EESP in end-system A and)awidthshow
651 90 gm
-0.08752 0.(you see the current profile of ISODE\).)ashow
683 90 gm
0.32043 0. 32 0.03204 0.(TCP/IP offers quality of service comparable to that of the X.25-type packet switched)awidthshow
699 90 gm
0.60821 0. 32 0.06082 0.(networks, which makes the use of TP0 on top of it quite reliable. The solution is an)awidthshow
715 90 gm
0.73593 0. 32 0.07359 0.(intermediate one and, luckily, does not reflect to the upper layers in any significant)awidthshow
731 90 gm
-0.04107 0.(way. Later on, the network layer can be changed into ISO IP and the transport protocol)ashow
747 90 gm
-0.10026 0.(into class 4 without significant impact on the other layers.)ashow
F T cp
%%Page: ? 83
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(80)show
802 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.17990 0. 32 0.01799 0.(The other alternative currently supported by ISODE is presented in figure 7-3 as end-)awidthshow
117 90 gm
-0.06401 0.(system B \(just forget the EESP again\). This is already a pure OSI protocol stack, where)ashow
133 90 gm
-0.06561 0.(class 0 transport protocol is run on top of the reliable virtual circuits offered by X.25.)ashow
165 90 gm
-0.07148 0.(In ISODE the LAN currently supported is not ISO 8802-3 \(IEEE 802.3\) but Ethernet 2.)ashow
181 90 gm
-0.00964 0.(There are subtle differences between these two types of LAN, both in the physical and)ashow
197 90 gm
-0.05065 0.(in the data link layer, which make them incompatible. Also, IEEE 802.2 Type 1, which)ashow
213 90 gm
-0.02038 0.(really is functionally empty \(just add a header consisting of a 0-octet to each frame\), is)ashow
229 90 gm
0.23834 0. 32 0.02383 0.(not included in the current ISODE distribution. In fact, practically the whole world is)awidthshow
245 90 gm
-0.09925 0.(using Ethernet 2 at the moment and even though stations of the two types can operate in)ashow
261 90 gm
0.36499 0. 32 0.03649 0.(the same physical network, they cannot \(without clever tricks, such those used in the)awidthshow
277 90 gm
0.05355 0. 32 0.00535 0.(BSD 4.3 Unix\) interoperate. Therefore, the use of Ethernet 2 is preferable for the time)awidthshow
293 90 gm
1 2 lw
0.06797 0.(being.)ashow
psb
pse
nc ct 39 0 put
0 0 gm
64 gr
qf
464 325 gm
pt
482 325 pl
482 447 pl
464 447 pl
ef
0 gr
eu
(nc 312 108 505 486 6 rc)kp
1 1 lw
0 0 pen
0 gr
464 447 lin
1 2 lw
psb
pse
nc ct 39 0 put
64 gr
qf
1 1 pen
464 147 gm
pt
482 147 pl
482 269 pl
464 269 pl
ef
0 gr
eu
(nc 312 108 505 486 6 rc)kp
1 1 lw
0 0 pen
0 gr
464 269 lin
64 gr
350 240 465 354 1 rc
2 2 pen
0 gr
351 241 464 353 0 rc
1 2 lw
1 1 pen
435 240 gm
435 353 lin
1 1 lw
0 0 pen
435 353 lin
1 2 lw
1 1 pen
379 240 gm
379 353 lin
1 1 lw
0 0 pen
379 353 lin
1 2 lw
1 1 pen
407 240 gm
407 353 lin
1 1 lw
0 0 pen
407 353 lin
1 2 lw
1 1 pen
351 296 gm
463 296 lin
1 1 lw
0 0 pen
463 296 lin
64 gr
313 108 465 185 1 rc
2 2 pen
0 gr
314 109 464 184 0 rc
1 2 lw
1 1 pen
435 184 gm
435 109 lin
1 1 lw
0 0 pen
435 109 lin
1 2 lw
1 1 pen
407 184 gm
407 109 lin
1 1 lw
0 0 pen
407 109 lin
1 2 lw
1 1 pen
379 184 gm
379 109 lin
1 1 lw
0 0 pen
379 109 lin
1 2 lw
1 1 pen
351 184 gm
351 109 lin
1 1 lw
0 0 pen
351 109 lin
369 135 gm
1 setTxMode
bu fc
2 F /|______Times-Roman fnt
bn
(TCP)show
397 141 gm
0.16796 0 rmoveto
(IP)show
425 122 gm
-0.18264 0.(Ethernet 2)ashow
452 122 gm
-0.18264 0.(Ethernet 2)ashow
369 258 gm
(TCP)show
397 261 gm
0.16796 0 rmoveto
(IP)show
425 244 gm
-0.18264 0.(Ethernet 2)ashow
452 244 gm
-0.18264 0.(Ethernet 2)ashow
397 312 gm
0.66845 0 rmoveto
(X.25)show
425 309 gm
-0.22259 0.(LAPB)ashow
453 312 gm
0.66845 0 rmoveto
(X.21)show
369 320 gm
0.16845 0 rmoveto
(\257)show
64 gr
313 408 465 485 1 rc
2 2 pen
0 gr
314 409 464 484 0 rc
1 2 lw
1 1 pen
435 484 gm
435 409 lin
1 1 lw
0 0 pen
435 409 lin
1 2 lw
1 1 pen
407 484 gm
407 409 lin
1 1 lw
0 0 pen
407 409 lin
1 2 lw
1 1 pen
379 484 gm
379 409 lin
1 1 lw
0 0 pen
379 409 lin
1 2 lw
1 1 pen
351 484 gm
351 409 lin
1 1 lw
0 0 pen
351 409 lin
397 435 gm
0.66845 0 rmoveto
1 setTxMode
(X.25)show
425 431 gm
-0.22259 0.(LAPB)ashow
453 435 gm
0.66845 0 rmoveto
(X.21)show
369 442 gm
0.16845 0 rmoveto
(\257)show
330 136 gm
(TP0)show
345 132 gm
(EESP)show
330 438 gm
(TP0)show
345 434 gm
(EESP)show
0 gr
389 348 401 360 340 380 1 ar
389 402 401 414 160 200 1 ar
1 1 pen
395 403 gm
395 359 lin
416 348 428 360 340 380 1 ar
416 402 428 414 160 200 1 ar
422 403 gm
422 359 lin
444 348 456 360 340 380 1 ar
444 402 456 414 160 200 1 ar
450 403 gm
450 359 lin
360 179 372 191 340 380 1 ar
360 234 372 246 160 200 1 ar
366 235 gm
366 190 lin
389 179 401 191 340 380 1 ar
389 234 401 246 160 200 1 ar
395 235 gm
395 190 lin
416 179 428 191 340 380 1 ar
416 234 428 246 160 200 1 ar
422 235 gm
422 190 lin
444 179 456 191 340 380 1 ar
444 234 456 246 160 200 1 ar
450 235 gm
450 190 lin
326 403 338 415 160 200 1 ar
326 178 338 190 340 380 1 ar
332 189 gm
332 404 lin
501 143 gm
1 setTxMode
(A)show
501 240 gm
-0.11831 0.(transport layer gateway)ashow
501 443 gm
(B)show
534 90 gm
(nc 30 28 811 566 6 rc)kp
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.26438 0.(Figure 7-3:)ashow
534 162 gm
-0.11331 0.(The current layers one through four.)ashow
566 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.06764 0.(As shown in figure 7-3, a transport layer gateway can be used to interconnect these two)ashow
582 90 gm
0.59570 0. 32 0.05957 0.(ISODE-based implementations in such as way, that EESP and TP0 truly are end-to-)awidthshow
598 90 gm
-0.07357 0.(end. With this kind of gateway, which can easily be built with ISODE \(and was already)ashow
614 90 gm
1.13891 0. 32 0.11389 0.(built and tested at the Technical Research Centre of Finland as early as 1986, see)awidthshow
630 90 gm
2.04986 0. 32 0.20498 0.([TTY88], pp. 29-30\), it is possible to communicate end-to-end between all the)awidthshow
646 90 gm
0.34133 0. 32 0.03413 0.(workstations connected to a LAN and all the computers connected to the world-wide)awidthshow
662 90 gm
(X.25 public data network.)show
694 90 gm
0.33660 0. 32 0.03366 0.(Since 1989 Telecom Finland has been offering the first public service for high-speed)awidthshow
710 90 gm
-0.03379 0.(LAN interconnection in the world. The Datanet Service currently operates nation-wide)ashow
726 90 gm
0.33554 0. 32 0.03355 0.(at the maximum speed of 2 Mb/s, which will soon be significantly increased. For the)awidthshow
742 90 gm
1.90750 0. 32 0.19075 0.(time being only DoD IP is officially supported but support for other protocols,)awidthshow
758 90 gm
2.00866 0. 32 0.20086 0.(including the routing of ISO IP and tunneling of proprietary protocols, will be)awidthshow
F T cp
%%Page: ? 84
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(81)show
802 288 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
85 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.08830 0.(announced soon. Infonet Inc. is developing a similar international LAN-interconnection)ashow
101 90 gm
0.03799 0. 32 0.00379 0.(service in cooperation with Telecom Finland. This means that the service will soon be)awidthshow
117 90 gm
-0.03216 0.(available in most of Europe and the U.S. This is a clear indication of the validity of the)ashow
133 90 gm
-0.08915 0.(speculation on network evolution presented in chapter 1.)ashow
165 90 gm
0.13778 0. 32 0.01377 0.(In this kind of global, untrusted commercial network, the importance of open systems)awidthshow
181 90 gm
0.60012 0. 32 0.06001 0.(security cannot be over-estimated. As the leading teleoperator in Finland \(where we)awidthshow
197 90 gm
0.20416 0. 32 0.02041 0.(have the most deregulated telecommunications business in Europe\), Telecom Finland)awidthshow
213 90 gm
0.48233 0. 32 0.04823 0.(intends to be among the first teleoperators to offer secure services in a network with)awidthshow
229 90 gm
0.50857 0. 32 0.05085 0.(world-wide connectivity. The results of the implementation project of secure FTAM)awidthshow
245 90 gm
-0.05519 0.(will provide valuable feed-back to the theory presented in this study and, possibly, lead)ashow
261 90 gm
0.07507 0. 32 0.00750 0.(to revising some parts of it. Being financed by Telecom Finland, it is only natural that)awidthshow
277 90 gm
-0.11795 0.(this project should lead into commercial applications within a couple of years.)ashow
F T cp
%%Page: ? 85
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(82)show
802 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
110 90 gm
1 fs
18 fz
bu fc
2 F /|______Times-Bold fnt
bn
(8)show
110 126 gm
0.69935 0.(Conclusions)ashow
143 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.13433 0. 32 0.11343 0.(This work was based on the security requirements of real applications used in the)awidthshow
159 90 gm
-0.05654 0.(business world and the real evolution of private and public networks. It was shown that)ashow
175 90 gm
-0.01188 0.(tomorrow's world-wide interconnected networks cannot be trusted but secure informa-)ashow
191 90 gm
1.18041 0. 32 0.11804 0.(tion systems have to be developed to operate on an untrusted network. Therefore,)awidthshow
207 90 gm
0.45776 0. 32 0.04577 0.(physical security measures and cryptographic techniques within the networks cannot)awidthshow
223 90 gm
-0.05752 0.(alone guarantee security in an open systems environment but end-to-end security needs)ashow
239 90 gm
0.59951 0. 32 0.05995 0.(to be built into terminal equipment \(both terminals and computers\) by using crypto-)awidthshow
255 90 gm
-0.07180 0.(graphic techniques.)ashow
287 90 gm
1.47720 0. 32 0.14772 0.(In this study, a security framework based on the properties of a layer entity was)awidthshow
303 90 gm
0.33905 0. 32 0.03390 0.(developed, integrated into the OSI reference model, and used to analyze a number of)awidthshow
319 90 gm
1.45950 0. 32 0.14595 0.(security functions and mechanisms and place them into the OSI model. The OSI)awidthshow
335 90 gm
0.24703 0. 32 0.02470 0.(reference model was taken as the basis of this study because it is the only universally)awidthshow
351 90 gm
-0.04675 0.(accepted framework we have. However, a critical view was kept on the OSI model and)ashow
367 90 gm
-0.03289 0.(several modifications and extensions to it were proposed. In this way, this study serves)ashow
383 90 gm
0.73318 0. 32 0.07331 0.(as a contribution to the ongoing, rather lively, OSI discussion. Most of this work is)awidthshow
399 90 gm
-0.15531 0.(also directly applicable to other layered telecommunications architectures.)ashow
431 90 gm
0.31921 0. 32 0.03192 0.(Starting from the customer needs, the security requirements of real applications were)awidthshow
447 90 gm
-0.00518 0.(analyzed, prioritized, and seen to be, to a large extent, rather similar from one applica-)ashow
463 90 gm
0.33096 0. 32 0.03309 0.(tion to another. It was therefore concluded, that security should be an integral part of)awidthshow
479 90 gm
0.52841 0. 32 0.05284 0.(the quality of service provided by OSI rather than something implemented on a per-)awidthshow
495 90 gm
-0.07695 0.(application basis.)ashow
527 90 gm
-0.00169 0.(A set of criteria affecting the placement of the security functions and mechanisms into)ashow
543 90 gm
-0.05543 0.(the layers of OSI were presented. These criteria were then used to determine the proper)ashow
559 90 gm
0.38879 0. 32 0.03887 0.(place of each security function and mechanism in the OSI reference model. For each)awidthshow
575 90 gm
-0.08409 0.(function, a mechanisms capable of implementing this function was found.)ashow
607 90 gm
0.04547 0. 32 0.00454 0.(Management issues associated with these functions and mechanisms were studied and)awidthshow
623 90 gm
0.02243 0. 32 0.00224 0.(solutions were found to problems such as the activation of these functions and mecha-)awidthshow
639 90 gm
-0.08168 0.(nisms and key management.)ashow
671 90 gm
0.57189 0. 32 0.05718 0.(This work is not tied into any existing cryptosystems, which are expected to change)awidthshow
687 90 gm
0.39489 0. 32 0.03948 0.(continuously with the advances in cryptology \(both cryptography and cryptanalysis\).)awidthshow
703 90 gm
-0.01347 0.(However, in order to tie this work more closely to reality, real cryptosystems, physical)ashow
719 90 gm
1.47079 0. 32 0.14707 0.(mechanisms for implementing them, and OSI software implementations, together)awidthshow
735 90 gm
-0.08279 0.(forming a sound platform for real implementations, were pointed out.)ashow
F T cp
%%Page: ? 86
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(83)show
802 288 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.00671 0. 32 0.00067 0.(The ultimate test of the ideas presented here is whether they will be found to be useful)awidthshow
117 90 gm
0.24047 0. 32 0.02404 0.(in implementing real secure open systems based, as much as possible, on the existing)awidthshow
133 90 gm
0.63171 0. 32 0.06317 0.(implementations. The solutions were tested in a pilot project implementing a secure)awidthshow
149 90 gm
-0.07133 0.(version of the internationally standardized FTAM service. This work is still continuing,)ashow
165 90 gm
-0.08392 0.(but encouraging results have already been achieved. Feed-back gained from this project)ashow
181 90 gm
-0.09988 0.(will prove to be valuable in developing these ideas further.)ashow
213 90 gm
0.19454 0. 32 0.01945 0.(It was shown that Secure Open Systems, in deed, are very much needed and that they)awidthshow
229 90 gm
0.42922 0. 32 0.04292 0.(can be efficiently built based on the existing protocols, cryptosystems, and OSI soft-)awidthshow
245 90 gm
-0.09341 0.(ware implementations. This study provides an architecture and implementational guide-)ashow
261 90 gm
-0.06015 0.(lines for building secure open systems from these building blocks.)ashow
293 90 gm
0.43273 0. 32 0.04327 0.(Along the way, several new concepts, such as )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.74447 0. 32 0.07444 0.(Security Context)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.22674 0. 32 0.02267 0.( and )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.70709 0. 32 0.07070 0.(Security Profile)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(,)show
309 90 gm
0.95046 0. 32 0.09504 0.(were defined and found to be useful. Many apparently fertile directions for further)awidthshow
325 90 gm
-0.09039 0.(research in the field of Secure Open Systems were pointed out. The architectural frame-)ashow
341 90 gm
-0.02615 0.(work and concepts developed in this study make it possible to formulate questions that)ashow
357 90 gm
0.22048 0. 32 0.02204 0.(have never been asked before, which brings a whole new research area, at the bound-)awidthshow
373 90 gm
0.42449 0. 32 0.04244 0.(ary between theoretical protocol research and cryptology, within the scope of formal)awidthshow
389 90 gm
-0.00344 0.(research. In this way, this work opens more doors than it closes.)ashow
421 90 gm
1.09649 0. 32 0.10964 0.(Among the directions for further work found and pointed out in this study are the)awidthshow
437 90 gm
-0.11027 0.(following:)ashow
469 90 gm
0.68756 0. 32 0.06875 0.(A formalism for analyzing the security of open systems and constructively building)awidthshow
485 90 gm
-0.05682 0.(provably secure open systems needs to be developed as pointed out in section 3.4.)ashow
517 90 gm
-0.01379 0.(The security mechanisms described in the appendix need to be split up further in order)ashow
533 90 gm
-0.10144 0.(to find the "atomic" elements of security. These elements appear to include mechanisms)ashow
549 90 gm
-0.03781 0.(for en/decrypting messages and signing them. If these basic mechanisms can in turn be)ashow
565 90 gm
0.33813 0. 32 0.03381 0.(implemented on silicon with a reasonable amount of chip area they can be integrated)awidthshow
581 90 gm
1.80694 0. 32 0.18069 0.(into various ICs which constitute the basic physically secure "computers" inter-)awidthshow
597 90 gm
0.37094 0. 32 0.03709 0.(connected via a global untrusted network consisting of hierarchy of networks \(multi-)awidthshow
613 90 gm
-0.01855 0.(chip carrier, circuit board, backplane, LAN, MAN, WAN\) all with high bandwidth but)ashow
629 90 gm
-0.09893 0.(the latency times increasing with the dimensions of the network.)ashow
661 90 gm
0.53268 0. 32 0.05326 0.(If these two goals are reached we'll be able to construct provably secure fully distri-)awidthshow
677 90 gm
0.29922 0. 32 0.02992 0.(buted global information systems trusting only in the physically secure chips and our)awidthshow
693 90 gm
0.80032 0. 32 0.08003 0.(Certification Authority. The task should not be underestimated but this direction of)awidthshow
709 90 gm
-0.07472 0.(research certainly looks very promising.)ashow
F T cp
%%Trailer
cd
end
%%Pages: 86 0

% Next: Appendices

%!PS-Adobe-2.0
%%Title: Appendices
%%Creator: NoWord
%%Pages: (atend)
%%BoundingBox: ? ? ? ?
%%PageBoundingBox: 28 30 566 811
%%For: AriA
%%IncludeProcSet: "(AppleDict md)" 68 0
%%EndComments
%%EndProlog
%%BeginDocumentSetup
md begin

T T -30 -28 811 566 100 72 72 3 F F F F T T T psu
(AriA; document: Appendices)jn
0 mf
od
%%EndDocumentSetup
%%Page: ? 1
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
bu fc
{}mark T /Times-Roman /|______Times-Roman 0 rf
bn
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(84)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 466 gm
-0.20510 0.(Appendix)ashow
110 90 gm
1 fs
bu fc
{}mark T /Times-Bold /|______Times-Bold 0 rf
bn
18 fz
bu fc
2 F /|______Times-Bold fnt
bn
2.00527 0.(A1)ashow
110 135 gm
3.77014 0. 32 0.37701 0.(Security Mechanisms)awidthshow
143 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.04818 0.(This appendix is provided as a general introduction to cryptology for those not familiar)ashow
159 90 gm
-0.07037 0.(with the topic.)ashow
191 90 gm
2 fs
bu fc
{}mark T /Times-Italic /|______Times-Italic 0 rf
bn
bu fc
2 F /|______Times-Italic fnt
bn
2.79998 0. 32 0.27999 0.(Security mechanisms)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.35925 0. 32 0.13592 0.(, as defined in [IS7498-2], are the means by which the OSI)awidthshow
207 90 gm
0.35720 0. 32 0.03572 0.(Security Functions can be provided. In the OSI Security Architecture mechanisms of)awidthshow
223 90 gm
-0.07037 0.(quite different levels are all called security mechanisms. In fact these mechanisms form)ashow
239 90 gm
-0.17808 0.(a hierarchy:)ashow
271 90 gm
(-)show
271 126 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.72647 0. 32 0.07264 0.(Higher level mechanisms)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.53070 0. 32 0.05307 0.(, such as security protocols and \(semantic\) message)awidthshow
287 126 gm
(contents.)show
319 90 gm
(-)show
319 126 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.77362 0. 32 0.07736 0.(Lower level mechanisms)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.52536 0. 32 0.05253 0.(, such as cryptosystems, forming parts of the above-)awidthshow
335 126 gm
-0.11943 0.(mentioned higher level mechanisms.)ashow
367 90 gm
(-)show
367 126 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.24557 0. 32 0.12455 0.(Physical mechanisms)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.64331 0. 32 0.06433 0.(, such as encryption chips and pieces of program code,)awidthshow
383 126 gm
1 2 lw
-0.13789 0.(implementing the above-mentioned mechanisms.)ashow
592 119 gm
(nc 409 112 640 481 6 rc)kp
0 gr
592 480 lin
1 1 lw
0 0 pen
592 480 lin
64 gr
545 208 574 284 1 rc
1 2 lw
1 1 pen
0 gr
545.5 208.5 573.5 283.5 0 rc
1 1 lw
0 0 pen
592 480 lin
556 224 gm
0.06152 0 rmoveto
1 setTxMode
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(Symmetric)show
568 219 gm
(Encr. Mechs.)show
64 gr
545 293 574 368 1 rc
1 2 lw
1 1 pen
0 gr
545.5 293.5 573.5 367.5 0 rc
1 1 lw
0 0 pen
559 224 gm
559 224 lin
556 306 gm
1 setTxMode
-0.04734 0.(Asymmetric)ashow
568 304 gm
(Encr. Mechs.)show
64 gr
480 124 508 200 1 rc
1 2 lw
1 1 pen
0 gr
480.5 124.5 507.5 199.5 0 rc
1 1 lw
0 0 pen
559 306 gm
559 306 lin
491 144 gm
1 setTxMode
-0.05358 0.(Integrity)ashow
503 136 gm
-0.05998 0.(Mechanisms)ashow
1 2 lw
1 1 pen
0 gr
438.5 232.5 507.5 325.5 0 rc
1 1 lw
0 0 pen
494 144 gm
494 144 lin
460 247 gm
1 setTxMode
-0.03277 0.(Authentication)ashow
472 252 gm
-0.05998 0.(Mechanisms)ashow
64 gr
480 382 508 476 1 rc
1 2 lw
1 1 pen
0 gr
480.5 382.5 507.5 475.5 0 rc
1 1 lw
0 0 pen
463 247 gm
463 247 lin
491 410 gm
1 setTxMode
-0.04005 0.(Signature)ashow
503 404 gm
-0.05998 0.(Mechanisms)ashow
1 2 lw
1 1 pen
0 gr
414.5 321.5 512.5 391.5 0 rc
1 1 lw
0 0 pen
494 410 gm
494 410 lin
446 343 gm
1 setTxMode
-0.30049 0.(Zero-)ashow
458 331 gm
-0.26173 0.(Knowledge)ashow
470 329 gm
-0.05998 0.(Mechanisms)ashow
1 2 lw
1 1 pen
0 gr
409.5 227.5 442.5 335.5 0 rc
1 1 lw
0 0 pen
449 343 gm
449 343 lin
429 244 gm
0.20434 0 rmoveto
1 setTxMode
(Security Protocols)show
64 gr
611 251 640 326 1 rc
1 2 lw
1 1 pen
0 gr
611.5 251.5 639.5 325.5 0 rc
1 1 lw
0 0 pen
432 244 gm
432 244 lin
622 272 gm
0.05908 0 rmoveto
1 setTxMode
(Physical)show
634 263 gm
-0.05998 0.(Mechanisms)ashow
1 2 lw
1 1 pen
461 119 gm
0 gr
461 480 lin
1 1 lw
0 0 pen
461 480 lin
432 113 gm
0.07495 0 rmoveto
1 setTxMode
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
(higher level mechanisms)show
531 113 gm
0.23999 0 rmoveto
(lower level mechanisms)show
629 113 gm
0.15258 0 rmoveto
(physical mechanisms)show
1 1 pen
677 90 gm
(nc 30 28 811 566 6 rc)kp
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
-0.17942 0.(Figure A1-1:)ashow
677 162 gm
-0.07237 0.(The hierarchy of security mechanisms.)ashow
709 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.47546 0. 32 0.04754 0.(The security of a local system can, to a great extent, be ensured by physical security)awidthshow
725 90 gm
-0.08149 0.(arrangements. In a global untrusted network it is impossible to guarantee the security of)ashow
741 90 gm
1.75567 0. 32 0.17556 0.(communications by means of physical security but cryptographic techniques are)awidthshow
757 90 gm
-0.06008 0.(needed. A lot of work has been done in the area of cryptology during the past couple of)ashow
F T cp
%%Page: ? 2
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(85)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 466 gm
-0.20510 0.(Appendix)ashow
85 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.74325 0. 32 0.07432 0.(thousand years but the most significant progress has taken place after the advent of)awidthshow
101 90 gm
-0.10626 0.(electronic computing. Today we have at our disposal a number of cryptographic mecha-)ashow
117 90 gm
-0.10945 0.(nisms that can be used in connection with open communications architectures.)ashow
149 90 gm
1.85653 0. 32 0.18565 0.(Among the basic cryptographic mechanisms are those used for data encryption,)awidthshow
165 90 gm
-0.10137 0.(integrity and authentication. Data encryption mechanisms can be used for all these three)ashow
181 90 gm
0.20950 0. 32 0.02095 0.(purposes and they are usually divided into symmetric and asymmetric cryptosystems.)awidthshow
197 90 gm
0.84182 0. 32 0.08418 0.(There are cryptosystems, not based on asymmetric encryption, that can be used for)awidthshow
213 90 gm
0.52856 0. 32 0.05285 0.(purposes or authentication and non-repudiation. Here we shall discuss the four main)awidthshow
229 90 gm
0.16540 0. 32 0.01654 0.(classes of cryptographic mechanisms: )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.22354 0. 32 0.02235 0.(symmetric encryption mechanisms)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(, )show
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.04238 0.(asymmetric)ashow
245 90 gm
0.15960 0. 32 0.01596 0.(encryption mechanisms)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(, )show
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.15609 0. 32 0.01560 0.(signature mechanisms)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.04440 0. 32 0.00444 0.(, and )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.14938 0. 32 0.01493 0.(integrity mechanisms)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.11474 0. 32 0.01147 0.(, separately.)awidthshow
261 90 gm
-0.10859 0.(The use of signature mechanisms for )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.10758 0.(authentication)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.10499 0.( is discussed and the important class)ashow
277 90 gm
0.68237 0. 32 0.06823 0.(of )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
2.54119 0. 32 0.25411 0.(zero-knowledge techniques)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.36688 0. 32 0.13668 0.( is briefly dealt with. Finally, the implementational)awidthshow
293 90 gm
-0.05813 0.(aspects of cryptographic mechanisms and the )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.06202 0.(physical mechanisms)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.06593 0.( implementing them)ashow
309 90 gm
-0.03952 0.(are touched upon.)ashow
341 90 gm
0.39764 0. 32 0.03976 0.(While this chapter is outside the core of this study, it is necessary to discuss security)awidthshow
357 90 gm
-0.05326 0.(mechanisms in some detail in order to demonstrate the implementability of the security)ashow
373 90 gm
-0.10545 0.(architecture proposed and tie this work more firmly to reality.)ashow
408 90 gm
1 fs
14 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.46440 0.(A1.1)ashow
408 135 gm
2.87292 0. 32 0.28729 0.(Data Encryption Mechanisms)awidthshow
440 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.10932 0.(An )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.10055 0.(encryption mechanism)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.08862 0.( is used to convert a cleartext message into a cryptogram, that)ashow
456 90 gm
-0.08589 0.(is into a form that is unintelligible to anyone not knowing the secret decryption method.)ashow
472 90 gm
0.42098 0. 32 0.04209 0.(An encryption mechanism is based on a )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.72311 0. 32 0.07231 0.(public algorithm)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.27633 0. 32 0.02763 0.( and at least one )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.12466 0.(key)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.52520 0. 32 0.05252 0.( whose)awidthshow
488 90 gm
-0.07919 0.(value is randomly chosen from a large set.)ashow
520 90 gm
-0.03344 0.(The need for separating the algorithm from the keys is obvious. In this way we can use)ashow
536 90 gm
-0.06976 0.(the same \(hardware or software\) implementation of a cryptosystem over and over again)ashow
552 90 gm
-0.12974 0.(with different key values. The algorithm remains the same and only a relatively compact)ashow
568 90 gm
-0.07830 0.(key value needs to be changed.)ashow
600 90 gm
0.87127 0. 32 0.08712 0.(The reason why the algorithm needs to be public is less obvious. The security of a)awidthshow
616 90 gm
-0.07745 0.(cryptographic mechanism should never be based on the secrecy of an algorithm. This is)ashow
632 90 gm
0.16464 0. 32 0.01646 0.(a generally accepted principle known as the )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.28701 0. 32 0.02870 0.(Kerckhoff's principle)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.14434 0. 32 0.01443 0.( \(named after a 19th)awidthshow
648 90 gm
-0.09048 0.(century Flemish linguist\). Only an algorithm that has been open for public criticism and)ashow
664 90 gm
1.62841 0. 32 0.16284 0.(cryptanalysis for a reasonable period of time can be trusted to be secure. Secret)awidthshow
680 90 gm
-0.10031 0.(algorithms may \(intentionally or not\) contain trapdoors and other faults.)ashow
712 90 gm
0.18661 0. 32 0.01866 0.(In fact, it can be claimed that not only the security of a cryptosystem but, in deed, the)awidthshow
728 90 gm
0.27481 0. 32 0.02748 0.(security of the entire open system should always be based on public mechanisms and)awidthshow
744 90 gm
0.12634 0. 32 0.01263 0.(secret keys. That is, everything else about a secure open system except the key values)awidthshow
F T cp
%%Page: ? 3
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(86)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 466 gm
-0.20510 0.(Appendix)ashow
85 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.28945 0. 32 0.02894 0.(should be public and open for analysis and criticism. Not only is this the only way to)awidthshow
101 90 gm
0.41671 0. 32 0.04167 0.(gain reasonable assurance of the security of an open system but it also seems to be a)awidthshow
117 90 gm
0.02532 0. 32 0.00253 0.(prerequisite for any legislation related to data security giving the security mechanisms)awidthshow
133 90 gm
-0.06768 0.(used a legal standing \(e.g. making digital signatures binding in the court of law\).)ashow
165 90 gm
-0.06381 0.(An interesting current research area in cryptology is that of )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.06816 0.(elliptic curve cryptosystems)ashow
181 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.88470 0. 32 0.08847 0.(based on a group of points on an elliptic curve. Originally proposed in 1985 by V.)awidthshow
197 90 gm
-0.05908 0.(Miller of IBM and further developed by N. Koblitz and others, these mechanisms seem)ashow
213 90 gm
0.73776 0. 32 0.07377 0.(to promise public key cryptosystems more secure than RSA with comparable block)awidthshow
229 90 gm
0.98526 0. 32 0.09852 0.(lengths in the near future. These cryptosystems are believed to be computationally)awidthshow
245 90 gm
0.45455 0. 32 0.04545 0.(intensive but the current fast progress in VLSI technology will help in their efficient)awidthshow
261 90 gm
-0.16511 0.(implementation [BVA90].)ashow
293 90 gm
-0.04560 0.(This is not meant to be a study on new emerging cryptosystems or their principles. The)ashow
309 90 gm
0.54916 0. 32 0.05491 0.(only motivation here is to show, that we cannot expect anything of the nature of the)awidthshow
325 90 gm
-0.00997 0.(keys of possible future cryptosystems. They may, for example, be sets of data items or)ashow
341 90 gm
-0.07156 0.(functions. Therefore, it is vital that we leave enough flexibility in our current designs to)ashow
357 90 gm
0.49835 0. 32 0.04983 0.(accommodate for new cryptosystems which inevitably will emerge. In this study the)awidthshow
373 90 gm
2.07366 0. 32 0.20736 0.(word )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59904 0.(key)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.96533 0. 32 0.19653 0.( is used to denote any \(secret or public\) reasonably compact piece of)awidthshow
389 90 gm
0.46508 0. 32 0.04650 0.(information which can be presented digitally \(as a bit-string\) and used in connection)awidthshow
405 90 gm
-0.10546 0.(with a public algorithm to form a cryptographic function.)ashow
433 90 gm
1 fs
bu fc
2 F /|______Times-Bold fnt
bn
1.46739 0.(A1.1.1)ashow
433 135 gm
3.01208 0. 32 0.30120 0.(Symmetric Encryption Mechanisms)awidthshow
465 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.20782 0. 32 0.02078 0.(In a )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.87524 0. 32 0.08752 0.(symmetric cryptosystem)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.38146 0. 32 0.03814 0.( we have two functions )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.12524 0.(encrypt)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.22735 0. 32 0.02273 0.( and )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.12524 0.(decrypt)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.47363 0. 32 0.04736 0.(. A message)awidthshow
481 90 gm
-0.05900 0.(encrypted with key K can only be decrypted with the same key. Symmetric key crypto-)ashow
497 90 gm
0.21118 0. 32 0.02111 0.(graphy, which dates back to ancient times, was developed into exact science in Shan-)awidthshow
513 90 gm
-0.01547 0.(non's famous paper written in 1945 as a secret report and declassified and published in)ashow
529 90 gm
0.46203 0. 32 0.04620 0.(1949 [Sha49].)awidthshow
561 90 gm
0.97885 0. 32 0.09788 0.(From here on we shall use the following notation for encrypting with a symmetric)awidthshow
577 90 gm
1.16012 0. 32 0.11601 0.(cryptosystem: c = eK\(m\), where m is the )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
2.21817 0. 32 0.22181 0.(cleartext message)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.63537 0. 32 0.06353 0.(, K is the )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.37254 0.(key)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.71716 0. 32 0.07171 0.(, e is the)awidthshow
593 90 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.22888 0. 32 0.02288 0.(encrypt function)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.07156 0. 32 0.00715 0.( and c is the )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.04254 0.(cryptogram)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.14297 0. 32 0.01429 0.(. Similarly, we use the following notation for)awidthshow
609 90 gm
-0.03651 0.(decryption: m = dK\(c\), where d is the )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.03697 0.(decrypt function)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(.)show
641 90 gm
-0.01406 0.(In our notation, the key used is combined with the function rather than supplied as one)ashow
657 90 gm
-0.06442 0.(of its arguments in order to point out the fact that the public part of the function and the)ashow
673 90 gm
-0.01780 0.(key together form a unique function used for encryption or decryption. The key can be)ashow
689 90 gm
-0.05967 0.(thought of as an index choosing one of a family of functions.)ashow
F T cp
%%Page: ? 4
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(87)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 466 gm
-0.20510 0.(Appendix)ashow
97 90 gm
1 fs
12 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.46739 0.(A1.1.2)ashow
97 135 gm
3.01956 0. 32 0.30195 0.(Asymmetric Encryption Mechanisms)awidthshow
129 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
2.57080 0. 32 0.25708 0.(The first mention of )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
4.28314 0. 32 0.42831 0.(public key cryptography)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
2.51296 0. 32 0.25129 0.( is found in [DH76]. The first)awidthshow
145 90 gm
0.57464 0. 32 0.05746 0.(implemented )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.52200 0. 32 0.05220 0.(public key cryptosystems)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.28778 0. 32 0.02877 0.( \(from here on simply )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.13482 0.(PKCs)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.35079 0. 32 0.03507 0.(\) were the Rivest-)awidthshow
161 90 gm
1.54541 0. 32 0.15454 0.(Shamir-Adleman \(RSA\) scheme, presented in [RSA78], and the Merkle-Hellman)awidthshow
177 90 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
2.37625 0. 32 0.23762 0.(trapdoor knapsacks)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.27807 0. 32 0.12780 0.(, presented in [MH78]. For an introduction to the history and)awidthshow
193 90 gm
-0.01371 0.(current status of public key cryptography see e.g. [Dif88] and [BVA90]. A short intro-)ashow
209 90 gm
-0.00244 0.(duction is also found e.g. in [Den83]. Even though the original Merkle-Hellman knap-)ashow
225 90 gm
0.11047 0. 32 0.01104 0.(sacks were soon broken, some of their improved versions are still believed to be quite)awidthshow
241 90 gm
-0.05018 0.(secure. Some improved Merkle-Hellman knapsacks are presented e.g. in [LLH89].)ashow
273 90 gm
-0.05480 0.(In a \(PKC\) the key can be divided into two parts, the )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.05799 0.(encryption key)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.05259 0.( and the )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.06585 0.(decryption)ashow
289 90 gm
(key)show
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.03005 0. 32 0.00300 0.(, in such a way that the encryption key specifies the )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.07110 0. 32 0.00711 0.(encryption transformation)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
( and)show
305 90 gm
3.58306 0. 32 0.35830 0.(the decryption key determines its left inverse mapping )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.94052 0.(decryption)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.62872 0. 32 0.16287 0.(. If it is)awidthshow
321 90 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.10446 0.(computationally unfeasible)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.09994 0.( \(for a more precise definition of the term see [DH79]\) to de-)ashow
337 90 gm
-0.11323 0.(termine the decryption key from the encryption key the PKC is called an )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.12828 0.(asymmetric)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.13131 0.( \(or)ashow
353 90 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.01359 0.(public key)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(\) )show
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.01502 0.(encryption mechanism)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.01290 0.(. If it is unfeasible to derive the encryption key from)ashow
369 90 gm
-0.09129 0.(the decryption key the PKC is called a )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.09777 0.(public key signature mechanism)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(.)show
401 90 gm
1.15539 0. 32 0.11553 0.(An asymmetric encryption mechanism provides complete confidentiality \(only the)awidthshow
417 90 gm
0.71197 0. 32 0.07119 0.(legitimate recipient in possession of the secret key can decrypt the message\) but no)awidthshow
433 90 gm
0.49011 0. 32 0.04901 0.(authentication of the sender \(anybody with access to the recipient's public key could)awidthshow
449 90 gm
-0.09573 0.(have generated the message\).)ashow
481 90 gm
0.36407 0. 32 0.03640 0.(From here on we shall use the following notation for encrypting with the public key:)awidthshow
497 90 gm
0.25863 0. 32 0.02586 0.(c = eK)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.10676 0.(P,X)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.37399 0. 32 0.03739 0.(\(m\), where m is the cleartext message, K)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.10676 0.(P,X)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.25192 0. 32 0.02519 0.( is the public key of X, e is the)awidthshow
513 90 gm
-0.06318 0.(Encrypt function, and c is the cryptogram.)ashow
545 90 gm
-0.04902 0.(The following notation is used for decrypting with the secret key: m = dK)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.05143 0.(S,X)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.05456 0.(\(c\), where)ashow
561 90 gm
-0.08010 0.(K)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.04708 0.(S,X)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.04138 0.( is the secret key of X and d is the )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.04753 0.(decrypt)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.04724 0.( function.)ashow
589 90 gm
1 fs
bu fc
2 F /|______Times-Bold fnt
bn
1.46739 0.(A1.1.3)ashow
589 135 gm
2.42599 0. 32 0.24259 0.(On the Use of Encryption Mechanisms)awidthshow
621 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.66732 0. 32 0.16673 0.(For encrypting large amounts of data symmetric cryptosystems are preferable to)awidthshow
637 90 gm
-0.04669 0.(asymmetric cryptosystems e.g. for the following reasons:)ashow
669 90 gm
0.04440 0. 32 0.00444 0.(Firstly, symmetric encryption is much more efficient than asymmetric encryption. For)awidthshow
685 90 gm
-0.10354 0.(example, both hardware and software implementations of DES are currently about 1000)ashow
701 90 gm
-0.10391 0.(times faster than corresponding RSA implementations \(with a reasonable key length\).)ashow
733 90 gm
-0.11587 0.(Secondly, when multicasting a large message it is much more efficient to use symmetric)ashow
749 90 gm
0.82870 0. 32 0.08287 0.(than asymmetric encryption. If the message is encrypted with the public key of the)awidthshow
F T cp
%%Page: ? 5
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(88)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 466 gm
-0.20510 0.(Appendix)ashow
85 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.06204 0.(recipient, a different key has to be used for each recipient, causing the same message to)ashow
101 90 gm
0.06103 0. 32 0.00610 0.(be encrypted and transferred several times. With symmetric encryption, only the sym-)awidthshow
117 90 gm
-0.06297 0.(metric key used needs to be encrypted separately and passed to each recipient, then this)ashow
133 90 gm
-0.08229 0.(one key \(now a part of the security context associated with this message\) can be used to)ashow
149 90 gm
-0.05805 0.(encrypt \(and decrypt\) the data which is multicast to all of the recipients. This scheme is)ashow
165 90 gm
-0.06150 0.(adopted e.g. in the )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.06883 0.(Privacy Enhancement for Internet E-mail)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.07391 0.( [RFC89a,b,c].)ashow
200 90 gm
1 fs
14 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.46440 0.(A1.2)ashow
200 135 gm
3.28659 0. 32 0.32865 0.(Signature Mechanisms)awidthshow
232 90 gm
2 fs
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
-0.04476 0.(Digital signatures)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.04295 0.( can be used to realize various security functions, including )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.05015 0.(authenti-)ashow
248 90 gm
0.38711 0.(cation)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.85800 0. 32 0.08580 0.( \(both of )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.87973 0. 32 0.18797 0.(peer entity)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.72250 0. 32 0.07225 0.( and )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.97906 0. 32 0.19790 0.(data origin)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.59524 0. 32 0.05952 0.(\), )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.40261 0.(non-repudiation)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.85800 0. 32 0.08580 0.( \(both of )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.37861 0.(origin)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.21078 0. 32 0.12107 0.( and)awidthshow
264 90 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.02630 0.(delivery)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.02359 0.(\), and )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.02461 0.(integrity)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(.)show
296 90 gm
0.17990 0. 32 0.01799 0.(The digital signature of a message is a redundant piece of information which depends)awidthshow
312 90 gm
-0.02525 0.(on the entire contents of the message in such a way that only the party in possession of)ashow
328 90 gm
0.33020 0. 32 0.03302 0.(the secret signing function can produce it but its validity can be checked without this)awidthshow
344 90 gm
0.14724 0. 32 0.01472 0.(secret information. The signature \(when associated with the message\) proves both the)awidthshow
360 90 gm
1.50588 0. 32 0.15058 0.(origin and integrity of the message providing the function of Non-repudiation of)awidthshow
376 90 gm
-0.05403 0.(Origin.)ashow
408 90 gm
-0.05729 0.(Just like with encryption mechanisms, a good digital signature scheme has the property)ashow
424 90 gm
0.39810 0. 32 0.03981 0.(that it is based on a public algorithm and a secret key. Public information is used for)awidthshow
440 90 gm
-0.05947 0.(checking the signature. It should be computationally unfeasible to generate valid signa-)ashow
456 90 gm
-0.03312 0.(tures without knowing the secret key as well as to find two different messages with the)ashow
472 90 gm
-0.08103 0.(same signature value.)ashow
504 90 gm
-0.03419 0.(A PKC is a signature mechanism if the encryption or )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.03489 0.(signing)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.03305 0.(, as we may call it now, is)ashow
520 90 gm
1.24343 0. 32 0.12434 0.(secret and the decryption, i.e. the checking of the signature is a public algorithm.)awidthshow
536 90 gm
-0.05058 0.(When using RSA, the most straight-forward way of signing a message is to encrypt the)ashow
552 90 gm
0.79544 0. 32 0.07954 0.(whole message with the secret key of the sender. In this case we need not send the)awidthshow
568 90 gm
0.27252 0. 32 0.02725 0.(cleartext message at all. If the message has sufficient redundancy, so that a randomly)awidthshow
584 90 gm
2.18109 0. 32 0.21810 0.(chosen cryptogram does not decrypt into an acceptable cleartext message with)awidthshow
600 90 gm
0.08377 0. 32 0.00837 0.(anybody's public key, we can be confident in, and show to an impartial judge, that the)awidthshow
616 90 gm
0.05203 0. 32 0.00520 0.(message was originated by the holder of the secret key. This kind of signature scheme)awidthshow
632 90 gm
-0.00216 0.(is presented in [IS9796] )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.00239 0.(Signature Algorithm with Message Recovery)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(, which currently)show
648 90 gm
(is a DIS version.)show
680 90 gm
0.16433 0. 32 0.01643 0.(A more common practice is to send the cleartext message together with the signature.)awidthshow
696 90 gm
-0.10569 0.(This makes it possible to read the contents of the message at intermediate nodes without)ashow
712 90 gm
-0.07864 0.(having to decrypt the message.)ashow
F T cp
%%Page: ? 6
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(89)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 466 gm
-0.20510 0.(Appendix)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.05676 0. 32 0.00567 0.(For performance reasons we usually encrypt a hash value based on the message rather)awidthshow
117 90 gm
0.56594 0. 32 0.05659 0.(than the whole message. The hash function used in computing the hash value has to)awidthshow
133 90 gm
1.10153 0. 32 0.11015 0.(have certain properties described more closely in e.g. [DP84]. Obviously we must)awidthshow
149 90 gm
-0.11724 0.(claim the hash function to be such, that it is computationally unfeasible to find two valid)ashow
165 90 gm
-0.09852 0.(cleartext messages with the same hash value.)ashow
197 90 gm
0.86639 0. 32 0.08663 0.(Hash functions are currently an area of very active research. A proposal for a hash)awidthshow
213 90 gm
-0.02243 0.(function which is light to compute with software is presented in [Riv90]. Among other)ashow
229 90 gm
1.30859 0. 32 0.13085 0.(recent proposals are Merkle's Snefru function and Miyaguchis's N-hash [MOI90].)awidthshow
245 90 gm
-0.04969 0.(Biham and Shamir have shown in [BS90] that it is easy to find synonyms \(i.e. different)ashow
261 90 gm
-0.02911 0.(messages with the same hash value\) for all of these three algorithms. Also in ISO stan-)ashow
277 90 gm
0.81527 0. 32 0.08152 0.(dard hash functions for digital signatures are being defined [IS10118-1,2]. [Mer89])awidthshow
293 90 gm
-0.03533 0.(discusses the use of DES in computing one-way hash functions. DES-based hash func-)ashow
309 90 gm
-0.09747 0.(tions still appear to be a safe choice for most commercial purposes.)ashow
341 90 gm
-0.07743 0.(A message is now signed in three steps:)ashow
373 90 gm
(-)show
373 126 gm
-0.10897 0.(Calculate the hash value of the message.)ashow
405 90 gm
(-)show
405 126 gm
-0.08709 0.(Encrypt the hash value with the secret key of the sender.)ashow
437 90 gm
(-)show
437 126 gm
-0.11724 0.(Attach the encrypted hash value \(signature\) to the original message.)ashow
469 90 gm
1.32797 0. 32 0.13279 0.(The notation S)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.46133 0.(X)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.04141 0. 32 0.10414 0.({m} is used in this study to mean "message m signed by X". The)awidthshow
485 90 gm
-0.09576 0.(notation does not stand for the signature but for the message together with its associated)ashow
501 90 gm
1.67633 0. 32 0.16763 0.(signature, hence the notation \(use of curly brackets instead of parentheses\). The)awidthshow
517 90 gm
0.93719 0. 32 0.09371 0.(notation S)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.27616 0.(X)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.65841 0. 32 0.06584 0.(\(m\) is used to denote the signature value of message m generated by X.)awidthshow
533 90 gm
-0.03129 0.(This practice is consistent with that adopted in e.g. [X.509].)ashow
568 90 gm
1 fs
14 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.46440 0.(A1.3)ashow
568 135 gm
3.79058 0. 32 0.37905 0.(Integrity Mechanisms)awidthshow
600 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.14221 0.(Data Integrity can be divided into two parts:)ashow
632 90 gm
(-)show
632 126 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.11685 0.(Message)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.07789 0.( \(or )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.09831 0.(content)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.06813 0.(\) )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.08802 0.(integrity)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.09375 0.( means that each individual message is intact \(that)ashow
648 126 gm
-0.07742 0.(is, received in exactly the same form as sent\).)ashow
680 90 gm
(-)show
680 126 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.18325 0. 32 0.01832 0.(Sequence integrity)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.11260 0. 32 0.01126 0.( means that the sequence of messages \(usually the sequence)awidthshow
696 126 gm
0.09078 0. 32 0.00907 0.(of messages sent across a connection during its life-time\) is intact. This means)awidthshow
712 126 gm
1.08184 0. 32 0.10818 0.(that no messages have, undetected, been omitted or duplicated and that the)awidthshow
728 126 gm
-0.05584 0.(original ordering of the messages is preserved.)ashow
F T cp
%%Page: ? 7
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(90)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 466 gm
-0.20510 0.(Appendix)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.57830 0. 32 0.05783 0.(In [ISO90d] integrity mechanisms are classified as those designed to protect against)awidthshow
117 90 gm
-0.00233 0.(random modifications and those designed to protect against modifications deliberately)ashow
133 90 gm
-0.08045 0.(engineered to defeat the integrity mechanism. In this study, we shall use the terms )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.14007 0.(weak)ashow
149 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.01426 0.(and )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.01304 0.(strong integrity)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.01322 0.(, respectively, for these two cases. Data integrity in the weak sense)ashow
165 90 gm
2.08282 0. 32 0.20828 0.(of the word means detecting all incidental \(random\) changes in the data being)awidthshow
181 90 gm
0.28137 0. 32 0.02813 0.(transferred, optionally recovering from the changes, when possible, and reporting the)awidthshow
197 90 gm
0.19485 0. 32 0.01948 0.(cases where recovery is not possible. Weak integrity is normally provided at the Data)awidthshow
213 90 gm
-0.01379 0.(Link layer point-to-point \(e.g. HDLC\) and at the Transport Layer end-to-end \(e.g. ISO)ashow
229 90 gm
0.26016 0. 32 0.02601 0.(TP4\). Protocols of both of these layers are designed to detect and recover from trans-)awidthshow
245 90 gm
-0.09355 0.(mission errors \(but not planned attacks against data integrity\).)ashow
277 90 gm
1.33728 0. 32 0.13372 0.(For weak message integrity simple redundancy in the data is adequate. Usually a)awidthshow
293 90 gm
-0.03921 0.(Checksum or, preferably, a Cyclic Redundancy Check \(CRC\) is used to detect chances)ashow
309 90 gm
-0.00625 0.(in the data. In LANs a 32-bit CRC is normally used and found to be quite effective for)ashow
325 90 gm
0.30838 0. 32 0.03083 0.(this purpose.)awidthshow
357 90 gm
1.15417 0. 32 0.11541 0.(Sequence integrity is achieved by labelling the messages with a running sequence)awidthshow
373 90 gm
-0.01403 0.(number which can be used to detect omitted, duplicated, or out-of-sequence messages.)ashow
389 90 gm
-0.05258 0.(To detect messages omitted at the end of a connection, a graceful disconnect procedure)ashow
405 90 gm
0.74279 0. 32 0.07427 0.(with the negotiation of the last sequence number sent is required before closing the)awidthshow
421 90 gm
-0.06462 0.(connection.)ashow
453 90 gm
2.58117 0. 32 0.25811 0.(For purposes of error recovery, retransmission of corrupted messages is used)awidthshow
469 90 gm
0.02822 0. 32 0.00282 0.(\(Automatic Repeat Request, ARQ\). In time-critical applications or with unidirectional)awidthshow
485 90 gm
0.16586 0. 32 0.01658 0.(transmission systems, error-correcting codes, such as Hamming codes, are sometimes)awidthshow
501 90 gm
-0.00791 0.(used \(Forward Error Correction\).)ashow
533 90 gm
-0.02114 0.(Integrity in the strong sense of the word means detecting not only accidental errors but)ashow
549 90 gm
0.14282 0. 32 0.01428 0.(also those deliberately caused by an enemy by means of an active attack. Here simple)awidthshow
565 90 gm
-0.03752 0.(redundancy added to the messages with public algorithms is not sufficient to guarantee)ashow
581 90 gm
1.44836 0. 32 0.14483 0.(message integrity and the use of sequence numbers is not sufficient to guarantee)awidthshow
597 90 gm
-0.10020 0.(sequence integrity because both can easily be forged.)ashow
629 90 gm
0.29113 0. 32 0.02911 0.(In the set-up illustrated in figure 4-2, X can easily modify the data stream between A)awidthshow
645 90 gm
1.69784 0. 32 0.16978 0.(and B, without this being detected by either communicating party, if only weak)awidthshow
661 90 gm
-0.04808 0.(integrity is provided. A simple way of doing this is by letting an untrusted intermediate)ashow
677 90 gm
0.22659 0. 32 0.02265 0.(node in the network, such as a router, act as a transport layer gateway between A and)awidthshow
693 90 gm
1.06430 0. 32 0.10643 0.(B, using the standard transport protocol towards both A and B, relaying the infor-)awidthshow
709 90 gm
0.66726 0. 32 0.06672 0.(mation transferred from one connection to another, modifying the information at its)awidthshow
725 90 gm
0.40939 0. 32 0.04093 0.(will, and letting both A and B believe that they are communicating end-to-end at the)awidthshow
741 90 gm
-0.08403 0.(transport layer. The attack is illustrated in figure 4-2 below.)ashow
F T cp
%%Page: ? 8
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(91)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 466 gm
1 2 lw
-0.20510 0.(Appendix)ashow
192 177 gm
(nc 88 150 226 443 6 rc)kp
0 gr
205 177 lin
1 1 lw
0 0 pen
205 177 lin
1 2 lw
1 1 pen
192 275 gm
205 275 lin
1 1 lw
0 0 pen
205 275 lin
1 2 lw
1 1 pen
192 315 gm
205 315 lin
1 1 lw
0 0 pen
205 315 lin
1 2 lw
1 1 pen
192 413 gm
205 413 lin
1 1 lw
0 0 pen
205 413 lin
1 2 lw
1 1 pen
205 177 gm
205 274 lin
1 1 lw
0 0 pen
205 274 lin
1 2 lw
1 1 pen
205 315 gm
205 412 lin
1 1 lw
0 0 pen
205 412 lin
1 2 lw
1 1 pen
122 286 gm
135 277 lin
1 1 lw
0 0 pen
135 277 lin
1 2 lw
1 1 pen
120 308 gm
133 317 lin
1 1 lw
0 0 pen
133 317 lin
64 gr
88 384 192 443 1 rc
1 2 lw
1 1 pen
0 gr
88.5 384.5 191.5 442.5 0 rc
1 1 lw
0 0 pen
133 317 lin
1 2 lw
1 1 pen
177 384 gm
177 442 lin
1 1 lw
0 0 pen
177 442 lin
1 2 lw
1 1 pen
162 384 gm
162 442 lin
1 1 lw
0 0 pen
162 442 lin
1 2 lw
1 1 pen
147 384 gm
147 442 lin
1 1 lw
0 0 pen
147 442 lin
1 2 lw
1 1 pen
132 384 gm
132 442 lin
1 1 lw
0 0 pen
132 442 lin
1 2 lw
1 1 pen
117 384 gm
117 442 lin
1 1 lw
0 0 pen
117 442 lin
1 2 lw
1 1 pen
103 384 gm
103 442 lin
1 1 lw
0 0 pen
103 442 lin
188 409 gm
0.5 0 rmoveto
1 setTxMode
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(1.)show
174 409 gm
0.5 0 rmoveto
(2.)show
159 409 gm
0.5 0 rmoveto
(3.)show
144 409 gm
0.5 0 rmoveto
(4.)show
130 409 gm
0.5 0 rmoveto
(5.)show
115 409 gm
0.5 0 rmoveto
(6.)show
100 409 gm
0.5 0 rmoveto
(7.)show
64 gr
132 252 192 341 1 rc
1 2 lw
1 1 pen
0 gr
132.5 252.5 191.5 340.5 0 rc
1 1 lw
0 0 pen
103 409 gm
103 409 lin
1 2 lw
1 1 pen
177 253 gm
177 339 lin
1 1 lw
0 0 pen
177 339 lin
1 2 lw
1 1 pen
162 253 gm
162 339 lin
1 1 lw
0 0 pen
162 339 lin
1 2 lw
1 1 pen
147 253 gm
147 339 lin
1 1 lw
0 0 pen
147 339 lin
1 2 lw
1 1 pen
132 296 gm
191 296 lin
1 1 lw
0 0 pen
191 296 lin
188 273 gm
0.5 0 rmoveto
1 setTxMode
(1.)show
174 273 gm
0.5 0 rmoveto
(2.)show
159 273 gm
0.5 0 rmoveto
(3.)show
144 273 gm
0.5 0 rmoveto
(4.)show
188 314 gm
0.5 0 rmoveto
(1.)show
174 314 gm
0.5 0 rmoveto
(2.)show
159 314 gm
0.5 0 rmoveto
(3.)show
144 314 gm
0.5 0 rmoveto
(4.)show
64 gr
88 150 192 209 1 rc
1 2 lw
1 1 pen
0 gr
88.5 150.5 191.5 208.5 0 rc
1 1 lw
0 0 pen
147 314 gm
147 314 lin
1 2 lw
1 1 pen
177 150 gm
177 208 lin
1 1 lw
0 0 pen
177 208 lin
1 2 lw
1 1 pen
162 150 gm
162 208 lin
1 1 lw
0 0 pen
162 208 lin
1 2 lw
1 1 pen
147 150 gm
147 208 lin
1 1 lw
0 0 pen
147 208 lin
1 2 lw
1 1 pen
132 150 gm
132 208 lin
1 1 lw
0 0 pen
132 208 lin
1 2 lw
1 1 pen
117 150 gm
117 208 lin
1 1 lw
0 0 pen
117 208 lin
1 2 lw
1 1 pen
103 150 gm
103 208 lin
1 1 lw
0 0 pen
103 208 lin
188 175 gm
0.5 0 rmoveto
1 setTxMode
(1.)show
174 175 gm
0.5 0 rmoveto
(2.)show
159 175 gm
0.5 0 rmoveto
(3.)show
144 175 gm
0.5 0 rmoveto
(4.)show
130 175 gm
0.5 0 rmoveto
(5.)show
115 175 gm
0.5 0 rmoveto
(6.)show
100 175 gm
0.5 0 rmoveto
(7.)show
0 gr
134 202 146 214 340 380 1 ar
134 246 146 258 160 200 1 ar
1 1 pen
140 247 gm
140 213 lin
148 202 160 214 340 380 1 ar
148 246 160 258 160 200 1 ar
154 247 gm
154 213 lin
163 202 175 214 340 380 1 ar
163 246 175 258 160 200 1 ar
169 247 gm
169 213 lin
177 202 189 214 340 380 1 ar
177 246 189 258 160 200 1 ar
183 247 gm
183 213 lin
134 334 146 346 340 380 1 ar
134 378 146 390 160 200 1 ar
140 379 gm
140 345 lin
148 334 160 346 340 380 1 ar
148 378 160 390 160 200 1 ar
154 379 gm
154 345 lin
163 334 175 346 340 380 1 ar
163 378 175 390 160 200 1 ar
169 379 gm
169 345 lin
177 334 189 346 340 380 1 ar
177 378 189 390 160 200 1 ar
183 379 gm
183 345 lin
64 gr
95 278 127 315 1 ov
1 2 lw
0 gr
95.5 278.5 126.5 314.5 0 ov
1 1 lw
0 0 pen
183 345 lin
223 291 gm
0.16845 0 rmoveto
1 setTxMode
(X)show
223 175 gm
(A)show
223 408 gm
(B)show
1 2 lw
1 1 pen
205 177 gm
0 gr
205 177 lin
1 1 lw
0 0 pen
205 177 lin
1 2 lw
1 1 pen
205 315 gm
205 315 lin
1 1 lw
0 0 pen
205 315 lin
115 282 gm
1 setTxMode
-0.24760 0.(Relay)ashow
1 1 pen
255 90 gm
(nc 30 28 811 566 6 rc)kp
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.17942 0.(Figure A1-2:)ashow
255 162 gm
-0.18113 0.(Attack against a weak integrity mechanism at the transport layer.)ashow
287 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.09994 0. 32 0.00999 0.(Strong Integrity can be efficiently achieved by using the orthogonal function of )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.02929 0.(confi-)ashow
303 90 gm
-0.00573 0.(dentiality)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.00610 0.( in combination with a )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.00660 0.(weak integrity mechanism)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.00579 0.(. If the confidentiality func-)ashow
319 90 gm
0.02059 0. 32 0.00205 0.(tion is placed below the weak integrity mechanism in the OSI Protocol Stack, then the)awidthshow
335 90 gm
-0.08499 0.(result is strong integrity. This result can be justified with the following reasoning:)ashow
367 90 gm
(-)show
367 126 gm
1.13037 0. 32 0.11303 0.(Assuming that the encryption mechanism is an acceptable one and that the)awidthshow
383 126 gm
2.01400 0. 32 0.20140 0.(enemy does not possess the key used, it is impossible for the enemy to)awidthshow
399 126 gm
0.85845 0. 32 0.08584 0.(determine anything of the contents of the cleartext message by studying the)awidthshow
415 126 gm
1.24603 0. 32 0.12460 0.(cryptogram. It is equally impossible for him to generate a cryptogram that)awidthshow
431 126 gm
-0.10171 0.(would decrypt into anything but a random cleartext message.)ashow
463 90 gm
(-)show
463 126 gm
0.87783 0. 32 0.08778 0.(Therefore, from the weak integrity mechanism's point-of-view, any changes)awidthshow
479 126 gm
0.35171 0. 32 0.03517 0.(introduced by the enemy to the stream of cryptograms are seen as completely)awidthshow
495 126 gm
-0.04226 0.(random changes in the stream of cleartext messages. But these random changes)ashow
511 126 gm
-0.10169 0.(are just what the weak integrity mechanism was designed to protect against.)ashow
543 90 gm
-0.05715 0.(It must be noted that there are a number of requirements for an "acceptable" encryption)ashow
559 90 gm
1.73736 0. 32 0.17373 0.(mechanism and weak integrity mechanism as well as for their combination. For)awidthshow
575 90 gm
0.83236 0. 32 0.08323 0.(example, when a block cipher \(with the ECB mode of operation\) is used, the weak)awidthshow
591 90 gm
1.06628 0. 32 0.10662 0.(integrity mechanism must be able to detect errors in the ordering of the encrypted)awidthshow
607 90 gm
0.11218 0.(blocks.)ashow
639 90 gm
1.32232 0. 32 0.13223 0.(If, for example, all TPDUs of TP4 are encrypted, then the Integrity Check Value)awidthshow
655 90 gm
1.14166 0. 32 0.11416 0.(carried by each TPDU is also encrypted and the TPDUs, including their sequence)awidthshow
671 90 gm
-0.02662 0.(numbers, cannot be modified by the enemy without this being detected. This makes all)ashow
687 90 gm
0.77346 0. 32 0.07734 0.(attempts to modify the content of individual messages or the sequence of messages)awidthshow
703 90 gm
-0.11415 0.(rather random and enables the normal functions of TP4 to detect \(and attempt to recover)ashow
719 90 gm
-0.07794 0.(from\) these modifications.)ashow
F T cp
%%Page: ? 9
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(92)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 466 gm
-0.20510 0.(Appendix)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.49423 0. 32 0.04942 0.(The situation is clarified in figure 4-3 below. In case a\) TP4 is run on top of a noisy)awidthshow
117 90 gm
0.41503 0. 32 0.04150 0.(channel. This results in reliable transfer on the transport connection between the two)awidthshow
133 90 gm
0.39077 0. 32 0.03907 0.(Transport Service Access Points. In case b\) the channel is not only noisy but hostile,)awidthshow
149 90 gm
-0.04476 0.(meaning that it causes planned non-random changes in the data stream transferred \(e.g.)ashow
165 90 gm
0.06805 0. 32 0.00680 0.(the situation depicted in figure 4-2\). This results in unreliable transfer on the transport)awidthshow
181 90 gm
0.99761 0. 32 0.09976 0.(connection. If end-to-end encryption is introduced below the transport protocol, as)awidthshow
197 90 gm
-0.00581 0.(depicted in case c\), all changes caused to the data stream by enemies not in possession)ashow
213 90 gm
0.63430 0. 32 0.06343 0.(of the encryption key are random and result in the illusion of a noisy channel at the)awidthshow
229 90 gm
0.15640 0. 32 0.01564 0.(interface between the encryption layer and the actual transport layer. This reduces the)awidthshow
245 90 gm
1.93237 0. 32 0.19323 0.(situation to that of case a\) resulting, again, in reliable transfer on the transport)awidthshow
261 90 gm
-0.06462 0.(connection.)ashow
0 0 gm
(nc 270 133 575 461 6 rc)kp
64 gr
270 133 575 461 1 rc
486 180 524 227 1 rc
1 2 lw
0 gr
486.5 180.5 523.5 226.5 0 rc
1 1 lw
0 0 pen
498 145 gm
498 145 lin
504 193 gm
1 setTxMode
bu fc
2 F /|______Times-Roman fnt
bn
(TP4)show
64 gr
486 330 524 377 1 rc
1 2 lw
1 1 pen
0 gr
486.5 330.5 523.5 376.5 0 rc
1 1 lw
0 0 pen
507 193 gm
507 193 lin
504 343 gm
1 setTxMode
(TP4)show
0 gr
494 220 506 232 340 380 1 ar
494 324 506 336 160 200 1 ar
1 1 pen
500 325 gm
500 231 lin
471 241 gm
1 setTxMode
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.47445 0.(reliable)ashow
471 278 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.07907 0.( transfer)ashow
1 2 lw
486 203 gm
0 gr
471 236 lin
1 1 lw
0 0 pen
471 236 lin
1 2 lw
1 1 pen
486 358 gm
471 325 lin
1 1 lw
0 0 pen
471 325 lin
64 gr
392 180 430 227 1 rc
1 2 lw
1 1 pen
0 gr
392.5 180.5 429.5 226.5 0 rc
1 1 lw
0 0 pen
471 325 lin
410 193 gm
1 setTxMode
(TP4)show
64 gr
392 330 430 377 1 rc
1 2 lw
1 1 pen
0 gr
392.5 330.5 429.5 376.5 0 rc
1 1 lw
0 0 pen
413 193 gm
413 193 lin
410 343 gm
1 setTxMode
(TP4)show
0 gr
400 220 412 232 340 380 1 ar
400 324 412 336 160 200 1 ar
1 1 pen
406 325 gm
406 231 lin
377 234 gm
1 setTxMode
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.36901 0.(unreliable)ashow
377 283 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.07907 0.( transfer)ashow
1 2 lw
392 203 gm
0 gr
378 231 lin
1 1 lw
0 0 pen
378 231 lin
1 2 lw
1 1 pen
392 358 gm
378 330 lin
1 1 lw
0 0 pen
378 330 lin
64 gr
298 180 336 227 1 rc
1 2 lw
1 1 pen
0 gr
298.5 180.5 335.5 226.5 0 rc
1 1 lw
0 0 pen
378 330 lin
316 193 gm
1 setTxMode
(TP4)show
64 gr
298 330 336 377 1 rc
1 2 lw
1 1 pen
0 gr
298.5 330.5 335.5 376.5 0 rc
1 1 lw
0 0 pen
319 193 gm
319 193 lin
316 343 gm
1 setTxMode
(TP4)show
64 gr
326 180 355 377 1 rc
1 2 lw
1 1 pen
0 gr
326.5 180.5 354.5 376.5 0 rc
1 1 lw
0 0 pen
319 343 gm
319 343 lin
345 241 gm
1 setTxMode
-0.32612 0.(a )ashow
345 249 gm
0.33642 0 rmoveto
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
(noisy)show
345 274 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.18753 0.( channel)ashow
0 gr
306 220 318 232 340 380 1 ar
306 324 318 336 160 200 1 ar
1 1 pen
312 325 gm
312 231 lin
284 241 gm
1 setTxMode
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.47445 0.(reliable)ashow
284 278 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.07907 0.( transfer)ashow
64 gr
420 180 449 377 1 rc
1 2 lw
0 gr
420.5 180.5 448.5 376.5 0 rc
1 1 lw
0 0 pen
287 241 gm
287 241 lin
438 238 gm
1 setTxMode
(a)show
438 243 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.14219 0.( hostile)ashow
438 277 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.18753 0.( channel)ashow
64 gr
514 180 571 377 1 rc
1 2 lw
1 1 pen
0 gr
514.5 180.5 570.5 376.5 0 rc
1 1 lw
0 0 pen
441 238 gm
441 238 lin
560 238 gm
1 setTxMode
(a)show
560 243 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.14219 0.( hostile)ashow
560 277 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.18753 0.( channel)ashow
1 2 lw
1 1 pen
542 376 gm
0 gr
542 180 lin
1 1 lw
0 0 pen
542 180 lin
532 225 gm
1 setTxMode
-0.11433 0.(end-to-end encryption)ashow
1 2 lw
1 1 pen
298 203 gm
0 gr
284 236 lin
1 1 lw
0 0 pen
284 236 lin
1 2 lw
1 1 pen
298 358 gm
284 325 lin
1 1 lw
0 0 pen
284 325 lin
1 2 lw
1 1 pen
514 170 gm
514 395 lin
1 1 lw
0 0 pen
514 395 lin
457 385 gm
1 setTxMode
-0.32612 0.(a )ashow
457 393 gm
0.33642 0 rmoveto
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
(noisy)show
457 418 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.18753 0.( channel)ashow
469 389 gm
-0.07482 0.(as seen by the)ashow
481 387 gm
-0.11618 0.(transport layer)ashow
0 gr
503 375 515 387 305 345 1 ar
1 1 pen
486 414 gm
506 385 lin
307 145 gm
1 setTxMode
-0.31938 0.(a\))ashow
401 145 gm
0.00341 0 rmoveto
(b\))show
495 145 gm
-0.31938 0.(c\))ashow
594 90 gm
(nc 30 28 811 566 6 rc)kp
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.17942 0.(Figure A1-3:)ashow
594 162 gm
-0.08070 0.(Weak integrity combined with encryption produces strong integrity.)ashow
626 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.42480 0. 32 0.04248 0.(In order to prove the reasoning presented above for a given transport protocol \320 data)awidthshow
642 90 gm
0.48995 0. 32 0.04899 0.(encryption scheme pair, detailed requirements of the transport protocol \(e.g. TP4\) to)awidthshow
658 90 gm
1.08459 0. 32 0.10845 0.(the underlying "channel" \(network service\) in order to guarantee reliable transport)awidthshow
674 90 gm
-0.02169 0.(service must first be stated. Then it must be shown, that the hostile channel augmented)ashow
690 90 gm
1.63772 0. 32 0.16377 0.(with the proposed encryption scheme \(e.g. DES\) does fulfill these requirements.)awidthshow
706 90 gm
-0.07800 0.(Because the purpose of this work is to create an architectural framework, not to analyze)ashow
722 90 gm
0.38436 0. 32 0.03843 0.(the properties of individual cryptosystems \(such as DES\) or protocols \(such as TP4\),)awidthshow
738 90 gm
-0.08317 0.(the detailed analysis is left for further study.)ashow
F T cp
%%Page: ? 10
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(93)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 466 gm
-0.20510 0.(Appendix)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.09506 0.(This revelation gives us one more criterion for placing the functions and mechanisms of)ashow
117 90 gm
-0.01000 0.(Integrity and Confidentiality in the layers of OSI. To avoid unnecessary duplication of)ashow
133 90 gm
0.25421 0. 32 0.02542 0.(functionality, it usually seems to be a good idea to place a confidentiality mechanism)awidthshow
149 90 gm
0.30593 0. 32 0.03059 0.(somewhere below an existing weak integrity mechanism and get strong integrity as a)awidthshow
165 90 gm
-0.04714 0.(by-product of these two mechanisms.)ashow
197 90 gm
1.11511 0. 32 0.11151 0.(S. Walker proposes, in [Wal89], that EESP-like protocols should be placed )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.40463 0.(above)ashow
213 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.04141 0. 32 0.10414 0.(rather than below the normal transport protocol in order to minimize the overhead)awidthshow
229 90 gm
0.08316 0. 32 0.00831 0.(caused by encryption and decryption in case of error recovery at the transport layer. It)awidthshow
245 90 gm
1.26174 0. 32 0.12617 0.(is my belief that efficiency under normal operation is by far more important than)awidthshow
261 90 gm
-0.04951 0.(efficiency in the rather rare case of retransmission at the transport layer. Obviously this)ashow
277 90 gm
-0.07482 0.(also depends on the quality of the underlying network service.)ashow
309 90 gm
0.70312 0. 32 0.07031 0.(We can determine that, with some restrictions, a reliable )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.10839 0. 32 0.11083 0.(weak integrity mechanism)awidthshow
325 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.03276 0.(when used on top of a reliable )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.03475 0.(confidentiality mechanism)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.03392 0.( provides us with the function)ashow
341 90 gm
-0.04440 0.(of )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.04763 0.(strong integrity)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.05302 0.(. The problem of which encryption mechanisms are "acceptable" and)ashow
357 90 gm
0.40832 0. 32 0.04083 0.(which weak integrity mechanisms they should be combined with in order to produce)awidthshow
373 90 gm
1.01699 0. 32 0.10169 0.(strong integrity is a current research topic of cryptography. One basic requirement)awidthshow
389 90 gm
-0.04968 0.(appears to be that the integrity check value employed by the weak integrity mechanism)ashow
405 90 gm
0.59371 0. 32 0.05937 0.(should be non-linear. It is generally known that block cipher with the OFB mode of)awidthshow
421 90 gm
0.23559 0. 32 0.02355 0.(operation together with linear redundancy in the cleartext message \(for example DES)awidthshow
437 90 gm
1.62796 0. 32 0.16279 0.(with the OFB mode of operation in connection with Hamming coding\) does not)awidthshow
453 90 gm
0.85540 0. 32 0.08554 0.(produce strong integrity. Integrity mechanisms are also being standardized by ISO.)awidthshow
469 90 gm
-0.07653 0.([IS9797] is an example of a standardized strong integrity mechanism which is currently)ashow
485 90 gm
-0.01829 0.(a draft proposal.)ashow
520 90 gm
1 fs
14 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.46440 0.(A1.4)ashow
520 135 gm
0.58303 0.(Authentication)ashow
552 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.13381 0.(Authentication is divided into two classes:)ashow
582 90 gm
(-)show
582 126 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.06201 0.(Weak)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.07446 0. 32 0.00744 0.( \(or )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.04859 0.(simple)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.05432 0. 32 0.00543 0.(\) )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.04609 0.(authentication)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.16662 0. 32 0.01666 0.(, where a password but no encryption may \(or)awidthshow
598 126 gm
-0.03167 0.(may not\) be used, and)ashow
628 90 gm
(-)show
628 126 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.09930 0.(Strong authentication)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.10009 0.(, based on cryptographic techniques.)ashow
660 90 gm
-0.09841 0.(Weak authentication offers no protection \(if not even passwords are used\) or inadequate)ashow
676 90 gm
0.90515 0. 32 0.09051 0.(protection against malicious attacks. Weak authentication is currently used in most)awidthshow
692 90 gm
0.85632 0. 32 0.08563 0.(systems \(e.g. practically all operating systems\) but, even with passwords, it is very)awidthshow
708 90 gm
1.46118 0. 32 0.14611 0.(vulnerable to replay. In strong authentication, the user \(or service\) can prove his)awidthshow
724 90 gm
0.44723 0. 32 0.04472 0.(identity without revealing his secret piece of information. The need to authenticate a)awidthshow
740 90 gm
0.26611 0. 32 0.02661 0.(user without him having to reveal his secret authentication information is pointed out)awidthshow
F T cp
%%Page: ? 11
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(94)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 466 gm
-0.20510 0.(Appendix)ashow
85 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.03698 0. 32 0.10369 0.(e.g. in [Sim89] where a simple identity verification scheme is presented providing)awidthshow
101 90 gm
-0.12077 0.(unforgeable transaction receipts for later arbitration.)ashow
133 90 gm
0.83709 0. 32 0.08370 0.(A requirement for any type of trust in a verifier by a claimant should not be a pre-)awidthshow
149 90 gm
0.35415 0. 32 0.03541 0.(requisite for the correct operation of any authentication mechanism. If passwords are)awidthshow
165 90 gm
0.23605 0. 32 0.02360 0.(used, then the claimant always has to trust the verifier not to keep and reuse his pass-)awidthshow
181 90 gm
0.55084 0. 32 0.05508 0.(word to impersonate as him to another entity [IS10181-2]. This observation alone is)awidthshow
197 90 gm
1.21841 0. 32 0.12184 0.(sufficient for ruling out the use of passwords as an acceptable general solution to)awidthshow
213 90 gm
0.18020 0. 32 0.01802 0.(authentication. It has also been shown \(e.g. in [MT79]\) that password-based authenti-)awidthshow
229 90 gm
0.38619 0. 32 0.03861 0.(cation schemes can never be made completely reliable. Therefore, in this study, only)awidthshow
245 90 gm
0.97412 0. 32 0.09741 0.(strong authentication is discussed, since weak authentication clearly does not offer)awidthshow
261 90 gm
-0.06187 0.(adequate security for our needs.)ashow
293 90 gm
0.78323 0. 32 0.07832 0.(Strong authentication can be based on symmetric or public key cryptography. With)awidthshow
309 90 gm
1.80572 0. 32 0.18057 0.(symmetric cryptosystems a mutually agreed-upon pairwise key belonging to the)awidthshow
325 90 gm
-0.00544 0.(appropriate security context is needed for authentication between any pair of parties A)ashow
341 90 gm
0.58944 0. 32 0.05894 0.(and B. Therefore, with n communicating parties n\(n-1\)/2 keys are needed. For large)awidthshow
357 90 gm
0.37261 0. 32 0.03726 0.(values of n this is clearly impractical. The number of keys required is too large to be)awidthshow
373 90 gm
0.56472 0. 32 0.05647 0.(securely generated, transferred and stored, every party having to be in possession of)awidthshow
389 90 gm
0.10009 0. 32 0.01000 0.(n-1 pairwise keys.)awidthshow
421 90 gm
1.14791 0. 32 0.11479 0.(Public key signature mechanisms have several advantages over symmetric crypto-)awidthshow
437 90 gm
-0.10406 0.(systems when used for authentication. Key management is greatly simplified by the fact)ashow
453 90 gm
-0.05963 0.(that only public keys of the key pairs need to be shared and only one key pair is needed)ashow
469 90 gm
1.36840 0. 32 0.13684 0.(for each party. Also, since the secret key is only known to one party, public key)awidthshow
485 90 gm
-0.05345 0.(signatures can be used for non-repudiation.)ashow
517 90 gm
-0.05096 0.(Even though symmetric encryption schemes can be used for authentication they cannot)ashow
533 90 gm
1.71157 0. 32 0.17115 0.(easily be used for the stronger service of non-repudiation. Because a symmetric)awidthshow
549 90 gm
0.17532 0. 32 0.01753 0.(communication key always has to be shared by at least two parties, it is impossible to)awidthshow
565 90 gm
0.07690 0. 32 0.00769 0.(prove to an impartial judge the origin of a message signed with an algorithm based on)awidthshow
581 90 gm
0.05096 0. 32 0.00509 0.(symmetric encryption without relying on a trusted server of some kind, such as an on-)awidthshow
597 90 gm
0.80780 0. 32 0.08078 0.(line notary. If A produces a message signed with a pairwise key between A and B,)awidthshow
613 90 gm
-0.02217 0.(claiming that this message was created by B, B can always claim that the message was)ashow
629 90 gm
-0.01399 0.(forged by A, A also being in possession of the same key. In a case such as this, only A)ashow
645 90 gm
0.99975 0. 32 0.09997 0.(and B know the truth but neither can convince the judge. Some signature schemes)awidthshow
661 90 gm
0.02426 0. 32 0.00242 0.(based on symmetric encryption are presented in e.g. [Akl83] and [Dav83] but they are)awidthshow
677 90 gm
0.19409 0. 32 0.01940 0.(rather artificial \(i.e. they "consume" keys when used\) and not very well suited for our)awidthshow
693 90 gm
0.16831 0.(purposes.)ashow
725 90 gm
0.04470 0. 32 0.00447 0.(From the authentication point-of-view we simply need a trusted certification authority)awidthshow
741 90 gm
0.13290 0. 32 0.01329 0.(whose certificates can be used to verify the integrity of other parties' public keys. The)awidthshow
757 90 gm
1.31469 0. 32 0.13146 0.(way in which these certificates are distributed is a management issue. The X.500)awidthshow
F T cp
%%Page: ? 12
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(95)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 466 gm
-0.20510 0.(Appendix)ashow
85 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.07148 0.(Directory Service \(more precisely X.509\) provides us with a natural means of distribut-)ashow
101 90 gm
-0.09136 0.(ing these certificates. It is worth pointing out \(again\) that the directory itself need not be)ashow
117 90 gm
-0.02574 0.(trusted, we only need to trust our CA.)ashow
149 90 gm
1 fs
bu fc
2 F /|______Times-Bold fnt
bn
3.75076 0. 32 0.37507 0.(Authentication Protocols)awidthshow
181 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.34323 0. 32 0.13432 0.(Authentication protocols have been widely studied \(see e.g. [NS78, DS81, NS87,)awidthshow
197 90 gm
0.68344 0. 32 0.06834 0.(DH79, Moo88, IM90]\). Often the need for three-way handshake for reliable mutual)awidthshow
213 90 gm
0.39199 0. 32 0.03919 0.(authentication has been pointed out. The main motivation for a three-way handshake)awidthshow
229 90 gm
-0.12200 0.(mechanism is the need for each party to challenge the other.)ashow
261 90 gm
0.00579 0. 32 0.00057 0.(The mechanisms included in the ACSE Security Addendum can be used to implement)awidthshow
277 90 gm
-0.05516 0.(the authentication procedure describe above. This arrangement allows the client \(initia-)ashow
293 90 gm
-0.09490 0.(tor\) to challenge the server \(responder\) by having him increment the time stamp by one.)ashow
309 90 gm
0.36270 0. 32 0.03627 0.(However, the server does not get to challenge the client. This is usually considered a)awidthshow
325 90 gm
1.00296 0. 32 0.10029 0.(shortcoming in ACSE's authentication mechanism, since three-way handshake was)awidthshow
341 90 gm
-0.05455 0.(ruled out of ACSE in ISO.)ashow
373 90 gm
-0.03663 0.(The idea of exchanging challenges is that in this way each party can make sure that the)ashow
389 90 gm
0.21133 0. 32 0.02113 0.(authentication message received from the other party was not a replay. However, it is)awidthshow
405 90 gm
0.96511 0. 32 0.09651 0.(not the exchange of challenges per se but rather the )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.29397 0.(freshness)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.80932 0. 32 0.08093 0.( of the tokens that is)awidthshow
421 90 gm
0.06484 0. 32 0.00648 0.(required. With the freshness of a token we mean that it was generated for this purpose)awidthshow
437 90 gm
0.35385 0. 32 0.03538 0.(and has not been used before. It is shown below that two-way handshake is adequate)awidthshow
453 90 gm
0.71273 0. 32 0.07127 0.(for reliable mutual authentication when used with a time stamping mechanism. The)awidthshow
469 90 gm
1.03500 0. 32 0.10350 0.(principles presented here are nowadays widely known and accepted, the interested)awidthshow
485 90 gm
0.60455 0. 32 0.06045 0.(reader is referred to e.g. [IS9798-1,2,3] and [IS9799]. However, a brief summary of)awidthshow
501 90 gm
-0.08940 0.(the principles of authentication based on a two-way handshake protocol is given here.)ashow
533 90 gm
-0.18051 0.(Assume that:)ashow
565 90 gm
(1\))show
565 126 gm
1.88140 0. 32 0.18814 0.(Each authentication message from A to B includes S)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.69905 0.(A)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.74758 0. 32 0.17475 0.({A, B, t} \(sender,)awidthshow
581 126 gm
-0.07624 0.(recipient and time stamp, signed by the sender\).)ashow
613 90 gm
(2\))show
613 126 gm
-0.03977 0.(B is responsible for storing all authentication messages still valid \(those, whose)ashow
629 126 gm
-0.13871 0.(time stamps have not yet expired\) and detecting attempted replay.)ashow
661 90 gm
(3\))show
661 126 gm
0.57510 0. 32 0.05751 0.(The signature scheme is reliable \(only A can produce an acceptable message)awidthshow
677 126 gm
(signed by A\).)show
709 90 gm
-0.10723 0.(Conclusion: two-way authentication is adequate, because:)ashow
741 90 gm
(1\))show
741 126 gm
-0.09230 0.(Message S)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.11610 0.(A)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.07629 0.({A, B, t} is only accepted by B \(the indicated recipient\).)ashow
F T cp
%%Page: ? 13
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(96)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 466 gm
-0.20510 0.(Appendix)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(2\))show
101 126 gm
0.29571 0. 32 0.02957 0.(It is only accepted if it is fresh \(generated by A for this purpose\), i.e. the time)awidthshow
117 126 gm
-0.09771 0.(stamp is still valid and B has not received the same message before.)ashow
149 90 gm
(3\))show
149 126 gm
-0.00833 0.(B knows that the message was )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.00808 0.(for him)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(, )show
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.00889 0.(from A)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.00758 0.( wishing to authenticate )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
(now)show
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(.)show
181 90 gm
(4\))show
181 126 gm
1.31057 0. 32 0.13105 0.(Likewise, A knows that the response from B: S)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.48149 0.(B)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.04339 0. 32 0.10433 0.({A, B, t+1} was )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.48620 0. 32 0.14862 0.(for him)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(,)show
197 126 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.00973 0.(from B)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.00828 0.( and a reply to his request.)ashow
229 90 gm
-0.05552 0.(The fields for sender and recipient \(A and B\) included in the signed portion prevent the)ashow
245 90 gm
-0.07077 0.(use of a captured message anywhere except between A and B. The time stamp values \(t)ashow
261 90 gm
0.46981 0. 32 0.04698 0.(and t+1, where the time unit is the resolution of the time stamp used, i.e. one "tick"\))awidthshow
277 90 gm
-0.01464 0.(link the two authentication messages together and, when combined with the obligation)ashow
293 90 gm
-0.02931 0.(of B to detect replay, make up for the lack of challenges chosen by A and B. The order)ashow
309 90 gm
0.09658 0. 32 0.00965 0.(of A and B \(not implied with this notation\) prevents the use of a response as a request)awidthshow
325 90 gm
1.99432 0. 32 0.19943 0.(later. These conditions appear to be sufficient for the conclusion that A and B)awidthshow
341 90 gm
-0.13340 0.(unquestionably have mutually authenticated.)ashow
373 90 gm
2.40737 0. 32 0.24073 0.(These conditions are thought to be sufficient but not necessarily minimal. As)awidthshow
389 90 gm
0.04013 0. 32 0.00401 0.(demonstrated by the error in X.509 [BAN89, IM90] the strive towards minimality can)awidthshow
405 90 gm
0.54931 0. 32 0.05493 0.(be dangerous, and it is by no means very useful. The conditions stated above are, in)awidthshow
421 90 gm
-0.08447 0.(any case, reasonable and can be fulfilled without excessive over-head.)ashow
453 90 gm
-0.09193 0.(In case public key signature mechanisms are used for purposes of authentication \(which)ashow
469 90 gm
0.20675 0. 32 0.02067 0.(most often is the case\), it is necessary to include the recipient in the signed portion of)awidthshow
485 90 gm
-0.03683 0.(the message to avoid the same message being used for another purpose later \(referring,)ashow
501 90 gm
0.07354 0. 32 0.00735 0.(again, e.g. to the X.509 attack in [BAN89]\). However, if symmetric cryptosystem and)awidthshow
517 90 gm
0.46524 0. 32 0.04652 0.(pairwise keys are used for authentication, it is possible to do without the Sender and)awidthshow
533 90 gm
2.13180 0. 32 0.21318 0.(Recipient fields in the signed portion of the message. That is because a given)awidthshow
549 90 gm
0.00793 0. 32 0.00079 0.(authentication key is only valid between a certain pair of communicating parties \(such)awidthshow
565 90 gm
-0.06015 0.(as A and B\) and replay is impossible outside this Security Context. Here too, it must be)ashow
581 90 gm
0.37948 0. 32 0.03794 0.(assured that a reply cannot be used as a request later. With public key cryptosystems)awidthshow
597 90 gm
0.24703 0. 32 0.02470 0.(authentication message originally sent from A to B could later be used by B trying to)awidthshow
613 90 gm
0.57907 0. 32 0.05790 0.(impersonate as A to C if the recipient was not included. The necessity of the sender)awidthshow
629 90 gm
-0.08021 0.(field can always be argued, it is included mainly for consistency.)ashow
661 90 gm
-0.06800 0.(The only question left open is whether, after the authentication exchange, both A and B)ashow
677 90 gm
0.47088 0. 32 0.04708 0.(know that a connection has been opened and a session key \(completing the common)awidthshow
693 90 gm
1.46636 0. 32 0.14663 0.(Security Context\) has been agreed upon. Obviously, after two-way handshake, B)awidthshow
709 90 gm
1.59347 0. 32 0.15934 0.(cannot know that A has received and accepted his last message. The problem is)awidthshow
725 90 gm
0.09643 0. 32 0.00964 0.(analogous to that found in establishing a transport connection. Also the solution is the)awidthshow
741 90 gm
0.08671 0.(same.)ashow
F T cp
%%Page: ? 14
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(97)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 466 gm
-0.20510 0.(Appendix)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.71990 0. 32 0.07199 0.(We can require that A sends the first \(encrypted\) message on the newly established)awidthshow
117 90 gm
2.30224 0. 32 0.23022 0.(connection as soon as it receives the response from B. Authentication is only)awidthshow
133 90 gm
1.56051 0. 32 0.15605 0.(considered completed after one more message is passed from A to B. This third)awidthshow
149 90 gm
-0.07752 0.(message, after the two previously mentioned authentication messages, concludes a kind)ashow
165 90 gm
-0.02915 0.(of three-way handshake. If B does not receive this message within a reasonable time, a)ashow
181 90 gm
-0.10180 0.(time-out occurs and the connection is aborted.)ashow
213 90 gm
-0.01802 0.(A more formal proof of the adequacy of this two-way authentication protocol could be)ashow
229 90 gm
0.56167 0. 32 0.05616 0.(given by using the "Logic for Authentication" presented in [BAN89]. However, this)awidthshow
245 90 gm
0.19622 0. 32 0.01962 0.(logic is still at its early stage \(as pointed out e.g. in [Nes90]\) and does not \(yet\) fulfill)awidthshow
261 90 gm
0.72250 0. 32 0.07225 0.(the requirements for a serious mathematical formalism. Substantial extension to the)awidthshow
277 90 gm
0.79315 0. 32 0.07931 0.(BAN logic are proposed in [GNY90]. It is also used in [CG90] to analyze a secure)awidthshow
293 90 gm
-0.06996 0.(multi-party session protocol. While it is evident that this kind of formalism is needed in)ashow
309 90 gm
0.54016 0. 32 0.05401 0.(developing and analyzing security protocols, a ready-to-use formalism does not cur-)awidthshow
325 90 gm
-0.02960 0.(rently exist and developing one is a major undertaking and clearly beyond the scope of)ashow
341 90 gm
0.33203 0. 32 0.03320 0.(this study.)awidthshow
373 90 gm
-0.08543 0.(The authentication function per se does not protect against an untrusted party within the)ashow
389 90 gm
-0.02117 0.(network intercepting the connection later, after authentication, and impersonating as A)ashow
405 90 gm
1.99813 0. 32 0.19981 0.(to B and vice versa. However, if a pairwise symmetric session key is securely)awidthshow
421 90 gm
-0.10386 0.(exchanged between A and B during the authentication exchange and used in subsequent)ashow
437 90 gm
0.74310 0. 32 0.07431 0.(communication, e.g. in the way presented in figure 4-3, this threat can be protected)awidthshow
453 90 gm
-0.06283 0.(against \(an authentication protocol that enables us to securely exchange secret informa-)ashow
469 90 gm
-0.12071 0.(tion in connection with the authentication exchange is called a )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.13029 0.(subliminal channel)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.13359 0.(\). This)ashow
485 90 gm
0.97579 0. 32 0.09757 0.(session key can be generated by either of the communicating parties alone or both)awidthshow
501 90 gm
-0.03923 0.(together.)ashow
533 90 gm
-0.13354 0.(The communicating parties can authenticate each other \(both at the end system level and)ashow
549 90 gm
-0.03253 0.(at the user level\) in the following manner. The process is initiated by user U logging in)ashow
565 90 gm
-0.00596 0.(a service. The initial log-in is omitted in the following description, which concentrates)ashow
581 90 gm
-0.11079 0.(on the security related aspects of the communications sequence.)ashow
613 90 gm
1.16363 0. 32 0.11636 0.(The application entity A)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.38786 0.(U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.86898 0. 32 0.08689 0.( serving user U forms token T)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.43518 0. 32 0.04351 0.(U )awidthshow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.20391 0. 32 0.12039 0.(= {U,A)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.38786 0.(U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.28654 0.(,S,A)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.29867 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.42471 0. 32 0.14247 0.(,TD} and)awidthshow
629 90 gm
0.83877 0. 32 0.08387 0.(signs it with its public key. If authentication of the user is required, the message is)awidthshow
645 90 gm
-0.01884 0.(handed over to be signed by U. A)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(U)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01803 0.( then sends the signed token over to A)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(S)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01826 0.(. A)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(S)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.02027 0.( \(and S\))ashow
661 90 gm
0.02700 0. 32 0.00270 0.(can now authenticate both U and A)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(U)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.02502 0. 32 0.00250 0.( by checking that the signatures are intact and the)awidthshow
677 90 gm
-0.06031 0.(time stamp is valid. This procedure can be performed without U giving its secret key to)ashow
693 90 gm
-0.12226 0.(A)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.10189 0.(U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.06784 0.( or vice versa.)ashow
725 90 gm
-0.09477 0.(In a similar fashion, the server S and its application entity A)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.11502 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.10235 0.( can identify themselves to)ashow
741 90 gm
0.13092 0. 32 0.01309 0.(U and A)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.06278 0.(U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.15228 0. 32 0.01522 0.( without trusting each other with their secret keys. This makes it possible to)awidthshow
757 90 gm
-0.06315 0.(use, for example, a smart card for authentication of the user.)ashow
F T cp
%%Page: ? 15
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(98)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 466 gm
-0.20510 0.(Appendix)ashow
0 0 gm
(nc 99 132 273 460 6 rc)kp
64 gr
193 167 250 253 1 rc
0 gr
193.5 167.5 249.5 252.5 0 rc
64 gr
102 190 143 230 1 ov
0 gr
102.5 190.5 142.5 229.5 0 ov
122.5 198.5 133.5 221.5 0 90 0 ar
122.5 198.5 133.5 223.5 90 180 0 ar
nc ct 39 0 put
116 210 gm
pt
127 207 pl
127 212 pl
116 210 pl
ef
eu
(nc 99 132 273 460 6 rc)kp
64 gr
116 215 120 219 1 ov
0 gr
116.5 215.5 119.5 218.5 0 ov
64 gr
116 201 120 205 1 ov
0 gr
116.5 201.5 119.5 204.5 0 ov
64 gr
193 317 250 403 1 rc
0 gr
193.5 317.5 249.5 402.5 0 rc
64 gr
107 132 137 174 1 rc
2 2 pen
0 gr
108 133 136 173 0 rc
0 0 pen
120 148 132 164 0 rc
129 149 gm
0.36083 0 rmoveto
1 setTxMode
bu fc
2 F /|______Times-Roman fnt
bn
(S,U)show
(nc 99 132 273 358 6 rc)kp
0 gr
114 139 126 148 0 rc
123 140 gm
0.16845 0 rmoveto
1 setTxMode
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(K)show
(nc 99 132 273 421 6 rc)kp
0 gr
253 202 265 211 0 rc
262 203 gm
1 setTxMode
(A)show
(nc 99 132 273 460 6 rc)kp
0 gr
260 212 272 220 0 rc
269 213 gm
1 setTxMode
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(U)show
64 gr
197 172 228 213 1 rc
2 2 pen
0 gr
198 173 227 212 0 rc
0 0 pen
211 185 223 201 0 rc
220 186 gm
0.36083 0 rmoveto
1 setTxMode
(S,A)show
(nc 99 132 273 395 6 rc)kp
0 gr
202 176 214 185 0 rc
211 177 gm
0.16845 0 rmoveto
1 setTxMode
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(K)show
(nc 99 132 273 420 6 rc)kp
0 gr
215 203 226 210 0 rc
223 204 gm
1 setTxMode
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
(U)show
(nc 99 132 273 460 6 rc)kp
0 gr
113 241 125 250 0 rc
122 242 gm
0.16845 0 rmoveto
1 setTxMode
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(U)show
64 gr
99 317 145 403 1 ov
1 1 pen
0 gr
99.5 317.5 144.5 402.5 0 ov
0 0 pen
(nc 99 155 273 460 6 rc)kp
116 355 128 364 0 rc
125 357 gm
0.16455 0 rmoveto
1 setTxMode
(S)show
(nc 99 132 273 460 6 rc)kp
64 gr
107 418 137 460 1 rc
2 2 pen
0 gr
108 419 136 459 0 rc
0 0 pen
120 435 132 449 0 rc
129 436 gm
0.69091 0 rmoveto
1 setTxMode
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(S,S)show
(nc 99 225 273 460 6 rc)kp
0 gr
114 425 126 434 0 rc
123 426 gm
0.16845 0 rmoveto
1 setTxMode
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(K)show
(nc 99 132 273 460 6 rc)kp
64 gr
197 323 228 364 1 rc
2 2 pen
0 gr
198 324 227 363 0 rc
0 0 pen
211 336 223 352 0 rc
220 337 gm
0.36083 0 rmoveto
1 setTxMode
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(S,A)show
0 gr
202 327 214 336 0 rc
211 328 gm
0.16845 0 rmoveto
1 setTxMode
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(K)show
(nc 99 155 273 460 6 rc)kp
0 gr
215 355 226 361 0 rc
223 356 gm
1 setTxMode
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
(S)show
(nc 99 150 273 460 6 rc)kp
0 gr
252 350 264 359 0 rc
261 351 gm
1 setTxMode
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(A)show
(nc 99 132 273 460 6 rc)kp
0 gr
259 360 271 366 0 rc
268 361 gm
0.22045 0 rmoveto
1 setTxMode
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(S)show
1 1 pen
122 173 gm
0 gr
122 190 lin
122 419 gm
122 402 lin
0 0 pen
(nc 99 132 273 409 6 rc)kp
158 190 170 199 0 rc
167 191 gm
1 setTxMode
-0.32759 0.(1\))ashow
(nc 99 132 273 419 6 rc)kp
0 gr
158 200 170 209 0 rc
167 201 gm
1 setTxMode
-0.32759 0.(2\))ashow
(nc 99 132 273 460 6 rc)kp
0 gr
202 283 214 292 0 rc
211 284 gm
1 setTxMode
-0.32759 0.(3\))ashow
0 gr
231 284 243 293 0 rc
240 285 gm
1 setTxMode
-0.32759 0.(6\))ashow
(nc 99 147 273 460 6 rc)kp
0 gr
164 347 176 356 0 rc
173 348 gm
1 setTxMode
-0.32759 0.(4\))ashow
(nc 99 166 273 460 6 rc)kp
0 gr
164 366 176 375 0 rc
173 367 gm
1 setTxMode
-0.32759 0.(5\))ashow
(nc 99 132 273 460 6 rc)kp
0 gr
181 197 205 221 250 290 1 ar
1 1 pen
142 209 gm
182 209 lin
129 187 153 211 70 110 1 ar
152 199 gm
192 199 lin
182 352 206 376 250 290 1 ar
144 364 gm
183 364 lin
131 345 155 369 70 110 1 ar
154 357 gm
193 357 lin
205 305 229 329 160 200 1 ar
217 306 gm
217 252 lin
215 240 239 264 340 380 1 ar
227 317 gm
227 263 lin
130 207 154 231 70 110 1 ar
153 219 gm
193 219 lin
0 0 pen
(nc 99 132 273 429 6 rc)kp
158 210 170 219 0 rc
167 211 gm
1 setTxMode
-0.32759 0.(7\))ashow
1 1 pen
305 90 gm
(nc 30 28 811 566 6 rc)kp
2 fs
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
-0.26438 0.(Figure 4-4:)ashow
305 162 gm
-0.06840 0.(Strong two-way authentication.)ashow
337 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.07252 0.(Strong two-way authentication goes as follows:)ashow
369 90 gm
(A)show
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(U)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.00440 0.( generates token T)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(U)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(={U,A)show
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(U)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(,S,A)show
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(S)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.00451 0.(,TD}, where TD is a time stamp, and passes it on)ashow
385 90 gm
-0.08279 0.(to U:)ashow
417 90 gm
(1\))show
417 126 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.05273 0.(T)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
(U)show
449 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.02697 0.(U signs T)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(U)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.02389 0.( \(with its secret key K)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.02650 0.(S,U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.02673 0.(\) and responds with:)ashow
481 90 gm
(2\))show
481 126 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.53823 0.(S)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.64761 0.(U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.51446 0.({T)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.64761 0.(U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
(})show
512 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.12068 0.(A)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.10057 0.(U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.06347 0.( co-signs the result \(with its secret key K)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.07095 0.(S,A)ashow
0 1 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.09051 0.(U)ashow
0 -3 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.07012 0.(\) and sends the signed message over to)ashow
529 90 gm
-0.27442 0.(A)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.17610 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(:)show
560 90 gm
(3\))show
560 126 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.65533 0.(S)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.66717 0.(A)ashow
0 1 rm
9 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.70965 0.(U)ashow
0 -3 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.58973 0.({S)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.78849 0.(U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.62637 0.({T)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.78849 0.(U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
1.04827 0.(}})ashow
593 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.64785 0.(A)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.41572 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.22940 0. 32 0.12294 0.( checks the signature of A)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.53987 0.(U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.38671 0. 32 0.13867 0.(, thereby verifying its identity. A)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.41572 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.25686 0. 32 0.12568 0.( also checks the)awidthshow
609 90 gm
0.36422 0. 32 0.03642 0.(freshness of T)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.14755 0. 32 0.01475 0.(U )awidthshow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.26992 0. 32 0.02699 0.(by checking that the time stamp TD is still valid and \(if it is\) that the)awidthshow
625 90 gm
5.50720 0. 32 0.55072 0.(same token has not been received before. A)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.63880 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
6.18820 0. 32 0.61882 0.( now generates token:)awidthshow
641 90 gm
(T)show
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(S)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(={S,A)show
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(S)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(,U,A)show
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(U)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.01983 0. 32 0.00198 0.(,TD+1} and passes it on to S together with T)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(U)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.01892 0. 32 0.00189 0.( signed by U:)awidthshow
673 90 gm
(4\))show
673 126 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.73077 0.({T)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.98022 0. 32 0.09802 0.(S, )awidthshow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.76455 0.(S)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.91992 0.(U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.73077 0.({T)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.91992 0.(U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
1.22299 0.(}})ashow
705 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.23910 0. 32 0.02391 0.(S checks the signature of U, signs T)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.08160 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.21240 0. 32 0.02124 0.( \(with its secret key K)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.06663 0.(S,S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.22247 0. 32 0.02224 0.(\). S can also generate a)awidthshow
721 90 gm
0.61431 0. 32 0.06143 0.(pair-wise fresh session key, encrypt it with the secret key of U, and include it in T)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(S)show
737 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
2.13043 0. 32 0.21304 0.(before signing, yielding: T)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.52752 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.58570 0.(={S,A)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.52752 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.55337 0.(,U,A)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.68505 0.(U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.57826 0.(,TD+1,eK)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.48327 0.(P,U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.60050 0.(\(K)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.65901 0.(AB)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.72103 0. 32 0.17210 0.(\)}, as described in)awidthshow
753 90 gm
0.04470 0. 32 0.00447 0.(appendix 3. S now responds with:)awidthshow
F T cp
%%Page: ? 16
op
30 28 xl
1 1 pen
45 291 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(99)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 466 gm
-0.20510 0.(Appendix)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(5\))show
101 126 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.06567 0.(S)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.88806 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
1.01858 0.({T)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.88806 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
(})show
132 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.05604 0.(A)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(S)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.02947 0.( co-signs the result \(with its secret key K)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.03294 0.(S,A)ashow
0 1 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
(S)show
0 -3 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.03257 0.(\) and sends the signed message over to)ashow
149 90 gm
-0.54830 0.(A)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.45692 0.(U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(:)show
180 90 gm
(6\))show
180 126 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.07995 0.(S)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
1.09947 0.(A)ashow
0 1 rm
9 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.80996 0.(S)ashow
0 -3 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.97186 0.({S)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.89996 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
1.03224 0.({T)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.89996 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
1.72750 0.(}})ashow
213 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.13059 0.(A)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.10884 0.(U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.24780 0. 32 0.02478 0.( checks the signature of A)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.08380 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.27954 0. 32 0.02795 0.(, thereby verifying its identity. A)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.10884 0.(U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.24276 0. 32 0.02427 0.( also checks that the)awidthshow
229 90 gm
2.59506 0. 32 0.25950 0.(value of the time stamp in T)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.93833 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
2.53616 0. 32 0.25361 0.( is TD+1 \(where TD is the time stamp of the)awidthshow
245 90 gm
-0.12130 0.(corresponding T)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.16633 0.(U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.10803 0.(\) and that the time stamp is still valid \(not too much time has elapsed\).)ashow
261 90 gm
-0.13391 0.(A)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.11158 0.(U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.07469 0.( then passes T)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.08592 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.07293 0.( signed by S on to U for it to check the signature:)ashow
293 90 gm
(7\))show
293 126 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.06567 0.(S)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.88806 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
1.01858 0.({T)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.88806 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
(})show
325 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.83404 0. 32 0.08340 0.(U checks the signature of S completing the authentication cycle. If T)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.25158 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.85769 0. 32 0.08576 0.( includes the)awidthshow
341 90 gm
-0.01602 0.(encrypted pair-wise session key eK)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(P,U)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(\(K)show
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(AB)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01553 0.(\), U recovers the key by decrypting it with)ashow
357 90 gm
0.07415 0. 32 0.00741 0.(its secret key K)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.02339 0.(S,U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(.)show
389 90 gm
1.50588 0. 32 0.15058 0.(Confidential encrypted information can be included in the signed portions of the)awidthshow
405 90 gm
0.10086 0. 32 0.01008 0.(authentication messages. One way of doing this is by using a PKC and the key pair of)awidthshow
421 90 gm
0.33340 0. 32 0.03334 0.(U \(the calling party\) in message 6\), as describe above and in appendix 3. In this case)awidthshow
437 90 gm
0.05157 0. 32 0.00515 0.(the pairwise session key is generated by the service, which usually is a good approach)awidthshow
453 90 gm
-0.04214 0.(when using a smart card with limited memory and processing capacity for user authen-)ashow
469 90 gm
-0.12351 0.(tication.)ashow
501 90 gm
0.13473 0. 32 0.01347 0.(It is also possible to have the calling party U generate the session key. In this case the)awidthshow
517 90 gm
-0.01774 0.(PKC key pair of S \(the called party\) is used in message 3\). In message 6\) either a PKC)ashow
533 90 gm
0.77377 0. 32 0.07737 0.(and the key pair of U or a symmetric cryptosystem and the session key included in)awidthshow
549 90 gm
-0.10192 0.(message 3\) can be used for confidentiality. The latter approach has two benefits:)ashow
581 90 gm
(-)show
581 126 gm
0.07369 0. 32 0.00736 0.(By using the pairwise key included in message 3\) S acknowledges this session)awidthshow
597 126 gm
-0.04118 0.(key and U can now be sure that S agrees on the use of this key.)ashow
629 90 gm
(-)show
629 126 gm
-0.04225 0.(Using a symmetric cryptosystem is computationally more efficient than using a)ashow
645 126 gm
0.55406 0.(PKC.)ashow
677 90 gm
2.44018 0. 32 0.24401 0.(If a fresh, pairwise session key is securely exchanged in connection with the)awidthshow
693 90 gm
-0.04515 0.(authentication procedure, we can be confident that only the two mutually authenticated)ashow
709 90 gm
1.66519 0. 32 0.16651 0.(parties are in possession of this key. This key can then be used for purposes of)awidthshow
725 90 gm
-0.03230 0.(continued authentication, integrity and confidentiality over this session, e.g. in the way)ashow
741 90 gm
-0.07824 0.(illustrated in figure 4-3.)ashow
F T cp
%%Page: ? 17
op
30 28 xl
1 1 pen
45 288 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(100)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 466 gm
-0.20510 0.(Appendix)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.30532 0. 32 0.03053 0.(Two considerations regarding the exchange of a fresh session key in connection with)awidthshow
117 90 gm
-0.14486 0.(the authentication exchange are worth pointing out:)ashow
149 90 gm
(-)show
149 126 gm
-0.00306 0.(The session key must be signed by the sender, that is it must be included in the)ashow
165 126 gm
-0.09957 0.(portion of the message affecting the value of the signature.)ashow
197 90 gm
(-)show
197 126 gm
0.03814 0. 32 0.00381 0.(Even though the session key is always sent in an encrypted form, the signature)awidthshow
213 126 gm
-0.05836 0.(function should preferably be performed before the encryption, because signing)ashow
229 126 gm
0.18005 0. 32 0.01800 0.(encrypted data is always considered a bad practise as shown e.g. in [MWR89])awidthshow
245 126 gm
0.59280 0. 32 0.05928 0.(or [IS9798-3].)awidthshow
277 90 gm
-0.11557 0.(The authentication protocol described above can be realized by using a symmetric block)ashow
293 90 gm
-0.05990 0.(cipher \(such as DES\) and a PKC \(such as RSA\) in the following way:)ashow
325 90 gm
(-)show
325 126 gm
0.07400 0. 32 0.00740 0.(The symmetric cryptosystem is used to calculate the hash function h \(e.g. with)awidthshow
341 126 gm
-0.08198 0.(Cipher Block Chaining mode of operation\).)ashow
373 90 gm
(-)show
373 126 gm
0.54183 0. 32 0.05418 0.(The PKC is used for encrypting and decrypting the hash values. For this, the)awidthshow
389 126 gm
-0.10452 0.(encryption key is kept secret while the decryption key is made public.)ashow
421 90 gm
1.00997 0. 32 0.10099 0.(The application entity A)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.33663 0.(U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.76812 0. 32 0.07681 0.( serving User U forms token T)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.37765 0. 32 0.03776 0.(U )awidthshow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.04492 0. 32 0.10449 0.(= {U,A)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.33663 0.(U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.24870 0.(,S,A)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.25923 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.23657 0. 32 0.12365 0.(,TD} and)awidthshow
437 90 gm
0.26260 0. 32 0.02626 0.(signs it. A)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.11996 0.(U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.25650 0. 32 0.02565 0.( then sends the signed token to A)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.09237 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.18737 0. 32 0.01873 0.(. A)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.09237 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.27084 0. 32 0.02708 0.( and S can now authenticate U and)awidthshow
453 90 gm
-0.06398 0.(A)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.05331 0.(U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.03613 0.(, respectively, by checking that both of the signatures match and the time stamp TD)ashow
469 90 gm
-0.00117 0.(is valid. Mutual authentication is achieved by having A)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(S)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
( and S perform the symmetric)show
485 90 gm
-0.03480 0.(operation.)ashow
517 90 gm
-0.07931 0.(Mutual strong two-way authentication now proceeds as follows \(see also figure 4-3\):)ashow
549 90 gm
(A)show
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(U)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.00912 0.( generates token T)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(U )show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01112 0.(= {U,A)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(U)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(,S,A)show
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(S)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.00935 0.(,TD} and passes it on to U:)ashow
581 90 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
(1\))show
581 126 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.27671 0.(T)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(U)show
613 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.58203 0. 32 0.15820 0.(U signs T)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.70985 0.(U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.84783 0. 32 0.18478 0.(, by calculating h\(T)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.70985 0.(U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.63818 0. 32 0.16381 0.(\), encrypting this with its secret key K)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.50076 0.(S,U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.63833 0. 32 0.16383 0.(, and)awidthshow
629 90 gm
-0.08056 0.(appending this signature to T)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.12051 0.(U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.07882 0.(, and returns the signed token to A)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.09280 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(:)show
661 90 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
(2\))show
661 126 gm
0.34757 0.({T)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.56961 0. 32 0.05696 0.(U, )awidthshow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.40396 0.(eK)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.29736 0.(S,U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.31300 0.(\(h\(T)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.43754 0.(U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.38745 0.(\)\)})ashow
692 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.53509 0.(A)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.44590 0.(U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.06231 0. 32 0.10623 0.( co-signs T)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.44590 0.(U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.97427 0. 32 0.09742 0.( by encrypting the signature of U with its secret key K)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.31457 0.(S,A)ashow
0 1 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.40132 0.(U)ashow
0 -3 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.71258 0. 32 0.07125 0.(: X)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.50033 0. 32 0.05003 0.(U )awidthshow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(=)show
708 90 gm
(eK)show
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01678 0.(S,A)ashow
0 1 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
(U)show
0 -3 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01976 0.(\(eK)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01678 0.(S,U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01756 0.(\(h\(T)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(U)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01548 0.(\)\)\) and sends this signature X)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(U)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01550 0.(, together with T)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(U)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01538 0.(, over to A)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(S.)show
741 90 gm
2 fs
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
(3\))show
741 126 gm
0.66130 0.({T)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
1.08383 0. 32 0.10838 0.(U, )awidthshow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.84523 0.(X)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.83245 0.(U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
(})show
F T cp
%%Page: ? 18
op
30 28 xl
1 1 pen
45 288 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(101)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 466 gm
-0.20510 0.(Appendix)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(A)show
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(S)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.01937 0. 32 0.00193 0.( decrypts the signature with the public key of A)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(U)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.01998 0. 32 0.00199 0.( recovering the signature of U. A)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(S)show
117 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.06172 0.(also checks the freshness of T)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.09307 0.(U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.06076 0.( by checking that the time stamp TD is still valid and \(if)ashow
133 90 gm
0.10421 0. 32 0.01042 0.(it is\) that the same token has not been received before.  A)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(S)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.12390 0. 32 0.01239 0.( now generates token: T)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.04547 0. 32 0.00454 0.(S )awidthshow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(=)show
149 90 gm
-0.02316 0.({S,A)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(S)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.02243 0.(,U,A)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(U)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01879 0.(,TD+1} and passes it on to S together with T)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(U)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01889 0.( and the signature of U:)ashow
181 90 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
(4\))show
181 126 gm
0.49827 0.({T)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.66833 0. 32 0.06683 0.(S, )awidthshow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.57958 0.(T)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.81665 0. 32 0.08166 0.(U, )awidthshow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.60835 0.(dK)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.45838 0.(P,U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.49191 0.(\(X)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.62722 0.(U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.76388 0.(\)})ashow
213 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.80078 0. 32 0.08007 0.(S checks the signature of U by decrypting dK)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.23133 0.(P,U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.28746 0.(\(X)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.32794 0.(U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.65277 0. 32 0.06527 0.(\) with the secret key of U and)awidthshow
229 90 gm
0.55541 0. 32 0.05554 0.(comparing the result with h\(T)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.19309 0.(U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.37414 0. 32 0.03741 0.(\). S now signs T)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.14869 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.49957 0. 32 0.04995 0.( by encrypting h\(T)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.14869 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.42816 0. 32 0.04281 0.(\) with its secret)awidthshow
245 90 gm
1.74011 0. 32 0.17401 0.(key K)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.40873 0.(S,S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.54205 0. 32 0.15420 0.(, appends this signature to T)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.50054 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.42456 0. 32 0.14245 0.(, and passes the signed token back to A)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.72566 0.(S.)ashow
261 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.15136 0. 32 0.01513 0.(Optionally S can generate a pair-wise session key K)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.05509 0.(AB)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.12817 0. 32 0.01281 0.(, encrypt it with the public key)awidthshow
277 90 gm
0.06500 0. 32 0.00650 0.(of U, and append it to T)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(S)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.07644 0. 32 0.00764 0.( before signing \(this seems to be one of the rare cases, where)awidthshow
293 90 gm
-0.02676 0.(signing encrypted data is justified\). This means substituting T)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(S)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.02876 0.( with {T)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(S)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.03222 0.(,eK)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.02899 0.(P,U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.03602 0.(\(K)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.03953 0.(AB)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.05551 0.(\)})ashow
309 90 gm
-0.11553 0.(in the message below \(the optional part is denoted with angle brackets\):)ashow
341 90 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
(5\))show
341 126 gm
0.42945 0.({{T)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.39596 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
1.26693 0. 32 0.12669 0.( [,eK)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.41781 0.(P,U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.47505 0.(\(K)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.48374 0.(AB)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.35528 0.(\)]})ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.33004 0. 32 0.03300 0.(, )awidthshow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.52783 0.(eK)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.32997 0.(S,S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.42492 0.({h\(T)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.49499 0. 32 0.04949 0.(S )awidthshow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.41571 0.([,eK)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.41781 0.(P,U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.47505 0.(\(K)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.48374 0.(AB)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.44053 0.(\)]\)}})ashow
372 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.13919 0.(A)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.08932 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.27633 0. 32 0.02763 0.( co-signs T)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.08932 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.29510 0. 32 0.02951 0.( by encrypting eK)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.07293 0.(S,S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.09272 0.(\(h{T)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.08932 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.08428 0.([,eK)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.08183 0.(P,U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.10168 0.(\(K)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.11158 0.(AB)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.25238 0. 32 0.02523 0.(\)]}\) with its secret key K)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.08183 0.(S,A)ashow
0 1 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.08038 0.(S)ashow
0 -3 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(:)show
388 90 gm
0.77806 0.(X)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.49928 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.62141 0.(=eK)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.45739 0.(S,A)ashow
0 1 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.44935 0.(S)ashow
0 -3 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.53836 0.(\(eK)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.40769 0.(S,S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.51829 0.(\(h{T)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.49928 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.47113 0.([,eK)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.45739 0.(P,U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.56835 0.(\(K)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.62371 0.(AB)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.71630 0. 32 0.17163 0.(\)]}\)\) and sends the resulting signature X)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.49928 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(,)show
405 90 gm
-0.08383 0.(together with T)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.09449 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.07929 0.(, over to A)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.12271 0.(U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(:)show
437 90 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
(6\))show
437 126 gm
0.54298 0.({{T)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.50064 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
1.60186 0. 32 0.16018 0.( [,eK)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.52825 0.(P,U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.60063 0.(\(K)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.61163 0.(AB)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.44920 0.(\)]})ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.41717 0. 32 0.04171 0.(, )awidthshow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.73394 0.(X)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.50064 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
(})show
469 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.73126 0.(A)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.60939 0.(U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.38763 0. 32 0.13876 0.( checks the signature of A)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.46925 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.50817 0. 32 0.15081 0.(, by decrypting X)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.46925 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.19140 0. 32 0.11914 0.( with the public key of A)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.46925 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.31988 0. 32 0.13198 0.( and)awidthshow
485 90 gm
0.74066 0. 32 0.07406 0.(recovering the signature of S: eK)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.17558 0.(S,S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.22322 0.(\(h{T)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.21502 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.20291 0.([,eK)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.19699 0.(P,U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.24478 0.(\(K)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.26863 0.(AB)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.73730 0. 32 0.07373 0.(\)]}\). A)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.21502 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.62286 0. 32 0.06228 0.( also checks that the)awidthshow
501 90 gm
0.22628 0. 32 0.02262 0.(value of time stamp in T)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.07914 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.24444 0. 32 0.02444 0.( is TD+1 \(where TD is the time stamp of the corresponding)awidthshow
517 90 gm
0.39146 0.(T)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.38554 0.(U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.82901 0. 32 0.08290 0.(\) and that the time stamp is still valid \(not too much time has elapsed\). A)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.29689 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.97213 0. 32 0.09721 0.( now)awidthshow
533 90 gm
2.36282 0. 32 0.23628 0.(passes T)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.57688 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
2.02941 0. 32 0.20294 0.( \(together with the optional encrypted pair-wise session key\) and the)awidthshow
549 90 gm
-0.04823 0.(signature of S  and on to U:)ashow
580 90 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
(7\))show
580 126 gm
0.49838 0.({{T)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.45951 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
1.47033 0. 32 0.14703 0.( [,eK)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.48487 0.(P,U)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.55128 0.(\(K)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.56138 0.(AB)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.41230 0.(\)]})ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.38299 0. 32 0.03829 0.(, )awidthshow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.64350 0.(dK)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.45083 0.(P,A)ashow
0 1 rm
9 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.41357 0.(S)ashow
0 -3 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.52032 0.(\(X)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.45951 0.(S)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Italic fnt
bn
0.80801 0.(\)})ashow
613 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.03297 0.(U checks the signature of S by decrypting it with the public key of S and verifying that)ashow
628 90 gm
(h\(T)show
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(S)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
([,eK)show
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(P,U)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(\(K)show
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(AB)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(\)]\) = dK)show
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(P,S)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(\(dK)show
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(P,A)show
0 1 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
(S)show
0 -3 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(\(X)show
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(S)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.01312 0. 32 0.00131 0.(\)\), completing the authentication cycle.)awidthshow
661 90 gm
0.92880 0. 32 0.09288 0.(The key exchange scheme presented here is by no means the only possible way of)awidthshow
677 90 gm
0.28427 0. 32 0.02842 0.(securely exchanging a fresh, pair-wise session key in connection with the authentica-)awidthshow
693 90 gm
0.07461 0. 32 0.00746 0.(tion exchange. It is, for example, possible to have U \(instead of S\) generate the key or)awidthshow
709 90 gm
-0.11662 0.(exchange the key on application \(rather than user\) level.)ashow
741 90 gm
0.45333 0. 32 0.04533 0.(However, the scheme presented here appears to be well suited for user identification)awidthshow
757 90 gm
0.12969 0. 32 0.01296 0.(based on a smart card. Here the burden of key generation is left entirely to the service)awidthshow
F T cp
%%Page: ? 19
op
30 28 xl
1 1 pen
45 288 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(102)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 466 gm
-0.20510 0.(Appendix)ashow
85 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.68634 0. 32 0.06863 0.(which has better facilities for this purpose. Also, if the smart card has an integrated)awidthshow
101 90 gm
-0.06227 0.(symmetric encryption mechanism, the key can easily be loaded onto the smart card and)ashow
117 90 gm
-0.13189 0.(decrypted there without it ever leaving the card in clear-text form.)ashow
152 90 gm
1 fs
14 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.46440 0.(A1.5)ashow
152 135 gm
4.92645 0. 32 0.49264 0.(Zero-Knowledge Techniques)awidthshow
184 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.20477 0. 32 0.02047 0.(A rapidly growing area is that of zero-knowledge techniques. In these techniques, the)awidthshow
200 90 gm
0.46264 0. 32 0.04626 0.(secret authentication information of each party plays very much the same role as the)awidthshow
216 90 gm
0.46752 0. 32 0.04675 0.(secret key in PKCs but it cannot be used for data encryption, only for authentication)awidthshow
232 90 gm
0.54077 0. 32 0.05407 0.(\(and possibly digital signatures\). In some zero-knowledge schemes, unlike in PKCs,)awidthshow
248 90 gm
-0.01866 0.(the "public key" needed to verify an entity can be the same for all entities belonging to)ashow
264 90 gm
0.21881 0. 32 0.02188 0.(the domain of the same CA. Another typical characteristic of current zero-knowledge)awidthshow
280 90 gm
-0.06907 0.(schemes is, that they often use several iteration cycles of challenges and replies to them)ashow
296 90 gm
-0.13037 0.(to achieve the required level of confidence in the identity of the other party.)ashow
328 90 gm
-0.00985 0.(A class of authentication schemes, where the the )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.01072 0.(claimant)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.00962 0.( can prove his identity to the)ashow
344 90 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.05819 0.(verifier)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.06253 0.( without revealing a single bit of his secret authentication information, is known)ashow
360 90 gm
0.52108 0. 32 0.05210 0.(as Zero-knowledge techniques. Perhaps the nicest property of Zero-knowledge tech-)awidthshow
376 90 gm
-0.08149 0.(niques is that they eliminate the need to periodically change the authentication informa-)ashow
392 90 gm
0.50140 0. 32 0.05014 0.(tion in order to protect against cryptanalysis, because the verifier \(or a casual eaves-)awidthshow
408 90 gm
0.30624 0. 32 0.03062 0.(dropper\) cannot learn anything in the process that would help him masquerade as the)awidthshow
424 90 gm
0.56991 0. 32 0.05699 0.(claimant later. The first zero-knowledge technique was proposed by Shamir in 1984)awidthshow
440 90 gm
-0.01034 0.([Sha85]. Another important scheme is presented in [FFS88]. [QG90] gives an easy-to-)ashow
456 90 gm
-0.07946 0.(read introduction to zero-knowledge protocols.)ashow
488 90 gm
0.72402 0. 32 0.07240 0.(In [IS10181-2] zero-knowledge techniques are \(falsely\) defined as a class of proce-)awidthshow
504 90 gm
0.73974 0. 32 0.07397 0.(dures adequate for authentication of single principal or for signature, using a single)awidthshow
520 90 gm
-0.03172 0.(value of verification authentication information for a set of principals. This property of)ashow
536 90 gm
-0.11325 0.(zero-knowledge techniques makes key distribution much easier than with authentication)ashow
552 90 gm
1.36962 0. 32 0.13696 0.(based on PKCs, where a separate piece of verification authentication information)awidthshow
568 90 gm
0.04135 0. 32 0.00413 0.(\(namely the public key\) is needed for each principal. Unfortunately, this nice property)awidthshow
584 90 gm
-0.05990 0.(is not shared by all zero-knowledge schemes.)ashow
616 90 gm
2.10449 0. 32 0.21044 0.(Zero-knowledge techniques can be used for purposes of authentication or non-)awidthshow
632 90 gm
0.39291 0. 32 0.03929 0.(repudiation but usually not for data encryption. Zero-knowledge techniques are most)awidthshow
648 90 gm
0.41107 0. 32 0.04110 0.(often computationally less complex than PKCs which makes them attractive for user)awidthshow
664 90 gm
0.92697 0. 32 0.09269 0.(authentication with a smart card. Typical properties of zero-knowledge techniques,)awidthshow
680 90 gm
-0.05963 0.(according to [FP90], are the following:)ashow
712 90 gm
(-)show
712 126 gm
0.31280 0. 32 0.03128 0.(The security level of the verifier depends on the number of iteration cycles of)awidthshow
728 126 gm
-0.07223 0.(the basic protocol.)ashow
F T cp
%%Page: ? 20
op
30 28 xl
1 1 pen
45 288 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(103)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 466 gm
-0.20510 0.(Appendix)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(-)show
101 126 gm
-0.13825 0.(The claimant protects his secret key by giving the verifier at every iteration cycle)ashow
117 126 gm
-0.09788 0.(access only to a randomly selected part of the key.)ashow
149 90 gm
(-)show
149 126 gm
-0.10104 0.(One-way functions are used to minimize information flow.)ashow
181 90 gm
(-)show
181 126 gm
1.31072 0. 32 0.13107 0.(The verifier does not learn anything during the authentication process that)awidthshow
197 126 gm
-0.13650 0.(would enable him to impersonate as the claimant later.)ashow
229 90 gm
1.41967 0. 32 0.14196 0.(Some existing zero-knowledge techniques make key management very simple by)awidthshow
245 90 gm
-0.06924 0.(completely abolishing the need for user-dependent public keys. The draw-back of these)ashow
261 90 gm
1.53747 0. 32 0.15374 0.(techniques \(in comparison with PKCs\) is, that they require the secret keys to be)awidthshow
277 90 gm
0.10742 0. 32 0.01074 0.(generated by a trusted third party \(the CA\) and they cannot be used for data confiden-)awidthshow
293 90 gm
-0.13693 0.(tiality. An example of such an authentication technique is the Fiat-Shamir technique first)ashow
309 90 gm
0.06759 0. 32 0.00675 0.(presented in 1986 [FS87].)awidthshow
344 90 gm
1 fs
14 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.46440 0.(A1.6)ashow
344 135 gm
3.60122 0. 32 0.36012 0.(Physical Mechanisms)awidthshow
376 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.10911 0.(In the case of cryptography, the physical mechanisms at the bottom of the hierarchy that)ashow
392 90 gm
0.10864 0. 32 0.01086 0.(are needed to actually perform the cryptographic functions employed can be pieces of)awidthshow
408 90 gm
-0.04708 0.(software \(running on a piece of hardware\) or hardware.)ashow
440 90 gm
0.05523 0. 32 0.00552 0.(Usually the two lowest layers of OSI are implemented in hardware \(the Physical layer)awidthshow
456 90 gm
0.56671 0. 32 0.05667 0.(and the Medium Access Control sublayer of the Data Link layer\) whereas the upper)awidthshow
472 90 gm
2.09548 0. 32 0.20954 0.(layers \(from the Logical Link Control sublayer of the Data Link layer up\) are)awidthshow
488 90 gm
-0.04151 0.(implemented in software. However, dedicated hardware can be used at any layer of the)ashow
504 90 gm
-0.07040 0.(OSI model to perform computation-intensive functions, such as cryptography.)ashow
536 90 gm
0.40237 0. 32 0.04023 0.(The physical mechanisms used have an impact on the over-all security of the system)awidthshow
552 90 gm
-0.00195 0.(because an implementation of an open system cannot be more secure than the weakest)ashow
568 90 gm
1.42364 0. 32 0.14236 0.(physical mechanism, or the weakest path between these mechanisms, used in the)awidthshow
584 90 gm
1.68960 0. 32 0.16896 0.(trusted parts of the system. A more detailed analysis of the security of physical)awidthshow
600 90 gm
0.24749 0. 32 0.02474 0.(mechanisms falls in the area of local systems security and is beyond the scope of this)awidthshow
616 90 gm
0.19984 0.(study.)ashow
648 90 gm
0.58395 0. 32 0.05839 0.(With the transmission speeds offered by current data networks, the efficiency of the)awidthshow
664 90 gm
0.66421 0. 32 0.06642 0.(physical mechanisms used can become a major issue of systems design. The choice)awidthshow
680 90 gm
-0.00595 0.(between various physical mechanisms is a trade-off between economy, flexibility, and)ashow
696 90 gm
0.17227 0. 32 0.01722 0.(performance. Therefore, different solutions will be used in different applications. The)awidthshow
712 90 gm
-0.03321 0.(choice of these mechanisms does usually not affect the external behavior of the system)ashow
728 90 gm
-0.08319 0.(except performance-wise.)ashow
F T cp
%%Page: ? 21
op
30 28 xl
1 1 pen
45 288 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(104)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 466 gm
-0.20510 0.(Appendix)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.52291 0. 32 0.05229 0.(However, new portable trusted pieces of software open up new opportunities for the)awidthshow
117 90 gm
0.07400 0. 32 0.00740 0.(application of secure open systems. The smart card, or its less compact calculator-like)awidthshow
133 90 gm
0.72662 0. 32 0.07266 0.(version with an integrated keyboard and display, is the only reliable way for strong)awidthshow
149 90 gm
-0.08973 0.(authentication of the user. There is a very large potential for the use of such devices.)ashow
F T cp
%%Page: ? 22
op
30 28 xl
1 1 pen
45 288 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(105)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 466 gm
-0.20510 0.(Appendix)ashow
110 90 gm
1 fs
18 fz
bu fc
2 F /|______Times-Bold fnt
bn
2.00527 0.(A2)ashow
110 135 gm
3.37554 0. 32 0.33755 0.(Some Commonly Used Cryptosystems)awidthshow
143 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.44357 0. 32 0.04435 0.(This work is independent of any individual cryptosystems or other low-level mecha-)awidthshow
159 90 gm
-0.00221 0.(nisms. In the preceding chapters we have simply assumed that we have at our disposal)ashow
175 90 gm
-0.08830 0.(symmetric and asymmetric cryptosystems with certain properties. In a constant struggle)ashow
191 90 gm
1.60614 0. 32 0.16061 0.(between cryptographers and cryptanalysts to make and break new cryptosystems)awidthshow
207 90 gm
0.14526 0. 32 0.01452 0.(existing systems will die and new systems be born. It is important that this work shall)awidthshow
223 90 gm
-0.09474 0.(not be tied to any currently existing schemes.)ashow
255 90 gm
-0.07542 0.(However, since we are interested in actual implementations of secure open systems it is)ashow
271 90 gm
0.04074 0. 32 0.00407 0.(important that we be able to specify some current cryptosystems fulfilling the require-)awidthshow
287 90 gm
1.20407 0. 32 0.12040 0.(ments set before. In this chapter we will have a brief look at some cryptosystems)awidthshow
303 90 gm
-0.03778 0.(which, for the time being, are considered suitable for our purposes.)ashow
335 90 gm
0.24108 0. 32 0.02410 0.(Here we shall not present the details of these cryptosystems but rather concentrate on)awidthshow
351 90 gm
0.31585 0. 32 0.03158 0.(their applicability to our purposes. Any good tutorial on cryptology, such as [DH79],)awidthshow
367 90 gm
-0.03834 0.([DP84], [Mas88] or [Pat87], will discuss these algorithms in detail.)ashow
399 90 gm
0.73898 0. 32 0.07389 0.(The schemes presented here are all well known and well established. They have all)awidthshow
415 90 gm
0.01037 0. 32 0.00103 0.(resisted cryptanalytic attacks for a number of years and are still considered reasonably)awidthshow
431 90 gm
0.25955 0. 32 0.02595 0.(safe although many of the later cryptosystems have been broken. See e.g. [BO88] for)awidthshow
447 90 gm
-0.01348 0.(an overview of cryptanalytic attacks against these three cryptosystems as well as some)ashow
463 90 gm
0.11326 0.(others.)ashow
498 90 gm
1 fs
14 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.46440 0.(A2.1)ashow
498 135 gm
0.88618 0.(DES)ashow
530 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.05187 0. 32 0.00518 0.(Those interested in the history, current use and future prospects of DES are advised to)awidthshow
546 90 gm
-0.04771 0.(read [SB88] for an overview of the topic.)ashow
578 90 gm
0.27450 0. 32 0.02745 0.(In 1973 the US National Bureau of Standards \(NBS\) initiated the development of the)awidthshow
594 90 gm
-0.03819 0.(Data Encryption Standard \(DES\) by publishing a solicitation for encryption algorithms)ashow
610 90 gm
0.04440 0. 32 0.00444 0.(for computer data protection. The US National Security Agency \(NSA\) was requested)awidthshow
626 90 gm
-0.07313 0.(to assist in the evaluation of proposed encryption schemes.)ashow
658 90 gm
0.10879 0. 32 0.01087 0.(IBM had started work on developing cryptosystems in the late 60's which had already)awidthshow
674 90 gm
-0.04981 0.(resulted in commercial applications. In the early 70's the work was continued and it led)ashow
690 90 gm
-0.03929 0.(to a number of patents and products. IBM submitted a cryptographic algorithm to NBS)ashow
706 90 gm
-0.10168 0.(in response to the solicitation and this algorithm was to become DES.)ashow
738 90 gm
0.73120 0. 32 0.07312 0.(From the very beginning there was a lot of concern about the security of DES. The)awidthshow
754 90 gm
-0.10189 0.(main grounds for criticism were the following:)ashow
F T cp
%%Page: ? 23
op
30 28 xl
1 1 pen
45 288 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(106)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 466 gm
-0.20510 0.(Appendix)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.38818 0. 32 0.03881 0.(Firstly, the 56-bit key-length of DES was not considered adequate by everybody and)awidthshow
117 90 gm
0.12191 0. 32 0.01219 0.(for all kinds of use. In 1975 Diffie and Hellman proposed a scheme for breaking DES)awidthshow
133 90 gm
-0.06655 0.(by using massive parallelism and exhaustive search of keys. This would make breaking)ashow
149 90 gm
1.11770 0. 32 0.11177 0.(DES quite costly but possible for organizations such as intelligence services. This)awidthshow
165 90 gm
-0.05519 0.(scheme is presented in [DH77].)ashow
197 90 gm
0.06454 0. 32 0.00645 0.(Secondly, the design criteria of the eight substitution tables \(called "S-boxes"\) used in)awidthshow
213 90 gm
0.47470 0. 32 0.04747 0.(DES were never made public. This led many to believe that there was an intentional)awidthshow
229 90 gm
-0.05883 0.(trapdoor in DES making it very easy break for NBS and NSA, and very hard for every-)ashow
245 90 gm
0.18249 0. 32 0.01824 0.(body else.)awidthshow
277 90 gm
0.79421 0. 32 0.07942 0.(Before accepting the standard, NBS organized two workshops in order to study the)awidthshow
293 90 gm
1.16058 0. 32 0.11605 0.(security of the proposed algorithm. One was on mathematics and the other on the)awidthshow
309 90 gm
0.28701 0. 32 0.02870 0.(economic trade-offs of increasing the key-length. Based on the results of these work-)awidthshow
325 90 gm
1.67877 0. 32 0.16787 0.(shops, NBS decided to pass the standard without modifications but it was to be)awidthshow
341 90 gm
1.06216 0. 32 0.10621 0.(reviewed every five years. The standard was last reviewed in 1988 and passed for)awidthshow
357 90 gm
-0.06472 0.(another five years. The next revision process will start in early 1992.)ashow
389 90 gm
0.23132 0. 32 0.02313 0.(Despite extensive cryptanalysis during the past fifteen years and the proposed attacks)awidthshow
405 90 gm
0.37216 0. 32 0.03721 0.(nobody has to date been able to show a flaw in the design of DES. All of the serious)awidthshow
421 90 gm
0.22125 0. 32 0.02212 0.(attacks are based on exhaustive search. DES is therefore still considered a reasonably)awidthshow
437 90 gm
-0.08596 0.(safe algorithm for commercial \(but not for military\) use. Some of the most recent crypt-)ashow
453 90 gm
-0.01748 0.(analytic studies \(see e.g. [BS90]\) seem to indicate that the standard 16-round DES still)ashow
469 90 gm
0.05950 0. 32 0.00595 0.(is reasonably safe \320 in fact much safer than many of its more recent rivals, such as the)awidthshow
485 90 gm
-0.08705 0.(Japanese FEAL algorithm [SM87].)ashow
517 90 gm
-0.07588 0.(DES is a symmetric block cipher with a block length of 64 bits and effective key length)ashow
533 90 gm
0.40313 0. 32 0.04031 0.(of 56 bits. The DES standards [ANS81, ANS83] define the basic 64-bit block cipher)awidthshow
549 90 gm
0.96466 0. 32 0.09646 0.(and four modes of operation for it. These modes are called: Electronic Code Book)awidthshow
565 90 gm
0.19470 0. 32 0.01947 0.(\(ECB\), Cipher Block Chaining \(CBC\), Cipher Feedback \(CFB\) and Output Feedback)awidthshow
581 90 gm
0.19592 0. 32 0.01959 0.(\(OFB\). Of these modes, the first one is the basic block cipher and the latter three turn)awidthshow
597 90 gm
0.36270 0. 32 0.03627 0.(DES into a chained "stream cipher". CBC and OFB are well suited for calculation of)awidthshow
613 90 gm
0.79132 0. 32 0.07913 0.(cryptosums \(e.g. integrity check values\) and CFB is good for encrypting individual)awidthshow
629 90 gm
0.75119 0. 32 0.07511 0.(characters. These modes of operation can also be used with any other block cipher,)awidthshow
645 90 gm
0.26397 0. 32 0.02639 0.(such as FEAL. Similar definitions now also exist as international standards, [IS8372])awidthshow
661 90 gm
-0.05290 0.(defines the modes of operation for 64-bit and [IS10116] for N-bit block ciphers.)ashow
693 90 gm
1.81365 0. 32 0.18136 0.(As a summary, it can be stated that among the good properties of DES are the)awidthshow
709 90 gm
-0.02172 0.(following: it is a commonly accepted standard encryption scheme with lots of efficient)ashow
725 90 gm
1.39129 0. 32 0.13912 0.(hardware implementations available, it is computationally reasonably light, it has)awidthshow
741 90 gm
0.38208 0. 32 0.03820 0.(several standardized modes of operation suited for various purposes, and its safety is)awidthshow
757 90 gm
-0.08346 0.(still believed to be adequate for most purposes.)ashow
F T cp
%%Page: ? 24
op
30 28 xl
1 1 pen
45 288 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(107)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 466 gm
-0.20510 0.(Appendix)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.52642 0. 32 0.05264 0.(Among the shortcomings of DES are the following: the key length is insufficient by)awidthshow
117 90 gm
0.16708 0. 32 0.01670 0.(today's standards, it is still rumored to contain trapdoors, even though the most recent)awidthshow
133 90 gm
0.18157 0. 32 0.01815 0.(studies [BS90] don't seem to support this belief, and the initial and final permutations)awidthshow
149 90 gm
-0.11581 0.(of DES decrease the efficiency of its software implementations.)ashow
181 90 gm
-0.11192 0.(It is expected that DES will survive yet for a long time in commercial applications, even)ashow
197 90 gm
1.28173 0. 32 0.12817 0.(though in has already been replaced by later, more secure cryptosystems, such as)awidthshow
213 90 gm
-0.06791 0.(CCEP, in the most critical \(e.g. defense-related\) applications.)ashow
248 90 gm
1 fs
14 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.46440 0.(A2.2)ashow
248 135 gm
0.50173 0.(RSA)ashow
280 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.34210 0. 32 0.03421 0.(The Rivest-Shamir-Adleman \(RSA\) algorithm first presented in [RSA78] is the most)awidthshow
296 90 gm
0.83236 0. 32 0.08323 0.(commonly used and probably most usable Public Key Cryptosystem today. RSA is)awidthshow
312 90 gm
0.01953 0. 32 0.00195 0.(based on the exponentiation of primes \(modulo n\) and breaking it is as hard as finding)awidthshow
328 90 gm
0.31951 0. 32 0.03195 0.(the logarithm \(modulo n\) of an integer, which is believed to be as hard as factoring a)awidthshow
344 90 gm
-0.09858 0.(large integer. With key lengths of at least 500 bits RSA is still believed to be reasonably)ashow
360 90 gm
-0.05596 0.(and with about 1000 bits quite safe.)ashow
392 90 gm
2.71697 0. 32 0.27169 0.(RSA is fairly simple, safe, and adaptive to various kinds of use. Among its)awidthshow
408 90 gm
0.83648 0. 32 0.08364 0.(shortcomings are its large \(and variable\) block length and heaviness \(RSA is about)awidthshow
424 90 gm
-0.10897 0.(three orders of magnitude heavier to compute than DES\).)ashow
456 90 gm
-0.00187 0.(As we can see, RSA can easily be used for generating digital signatures. However, the)ashow
472 90 gm
-0.09521 0.(group of possible future algorithms meeting one of the two requirements stated above is)ashow
488 90 gm
-0.08830 0.(presumably much larger than just RSA and we can feel confident that generating digital)ashow
504 90 gm
-0.04922 0.(signatures using a PKC as described here does not limit us into using RSA.)ashow
536 90 gm
0.99304 0. 32 0.09930 0.(Because breaking RSA is at most as hard as factoring a large integer, some recent)awidthshow
552 90 gm
0.30883 0. 32 0.03088 0.(advances in the factoring of large integers have made the use of RSA less secure and)awidthshow
568 90 gm
-0.04811 0.(increased the needed key length. Considering the possibility of a final break-through in)ashow
584 90 gm
-0.02532 0.(factoring, we cannot base everything \(authentication, non-repudiation, key distribution)ashow
600 90 gm
1.15707 0. 32 0.11570 0.(etc.\) on RSA but have to be ready to quickly adopt new PKCs and authentication)awidthshow
616 90 gm
-0.03027 0.(schemes if necessary.)ashow
F T cp
%%Page: ? 25
op
30 28 xl
1 1 pen
45 288 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(108)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 466 gm
-0.20510 0.(Appendix)ashow
104 90 gm
1 fs
14 fz
bu fc
2 F /|______Times-Bold fnt
bn
1.46440 0.(A2.3)ashow
104 135 gm
4.26925 0. 32 0.42692 0.(The Diffie-Hellman Algorithm)awidthshow
136 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.51757 0. 32 0.05175 0.(The Diffie-Hellman scheme, first proposed in [DH76] as the first published "public-)awidthshow
152 90 gm
-0.04632 0.(key" algorithm, is still considered one of the best methods for secretly sharing pairwise)ashow
168 90 gm
1.72988 0. 32 0.17298 0.(symmetric keys. The algorithm is based on public "half-keys" and secret values)awidthshow
184 90 gm
1.20925 0. 32 0.12092 0.(associated with them. From their public half-keys K)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.42266 0.(A)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.72036 0. 32 0.07203 0.( and K)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.39050 0.(B)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
1.50817 0. 32 0.15081 0.( the communicating)awidthshow
200 90 gm
-0.00845 0.(parties A and B can determine a pairwise session key K)ashow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
(AB)show
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.00878 0.(, which remains secret from)ashow
216 90 gm
0.38284 0. 32 0.03828 0.(other parties. This key can then be used for mutual authentication and or exchanging)awidthshow
232 90 gm
-0.03932 0.(secret information \(such as a fresh session key\).)ashow
264 90 gm
0.39916 0. 32 0.03991 0.(In fact this algorithm is not a data encryption scheme but a key management scheme)awidthshow
280 90 gm
0.25878 0. 32 0.02587 0.(where n parties can secretly agree on n)awidthshow
0 -3 rm
(.)show
0 3 rm
0.31845 0. 32 0.03184 0.(\(n-1\)/2 pairwise encryption keys using only n)awidthshow
296 90 gm
0.65704 0. 32 0.06570 0.(public "half-keys". Normally n)awidthshow
0 -3 rm
0.07969 0.(.)ashow
0 3 rm
0.51467 0. 32 0.05146 0.(\(n-1\)/2 pairwise keys would have be created and n-1)awidthshow
312 90 gm
-0.04403 0.(keys securely delivered and stored at each site in order to allow for secure communica-)ashow
328 90 gm
0.21530 0. 32 0.02153 0.(tions between any two sites. When using the Diffie-Hellman algorithm only authenti-)awidthshow
344 90 gm
0.12557 0. 32 0.01255 0.(cated and integral \(not confidential\) copies of n-1 public "half-keys" have to be deliv-)awidthshow
360 90 gm
-0.12597 0.(ered to and a site-specific \(locally created\) secret number securely stored at each site.)ashow
392 90 gm
0.13214 0. 32 0.01321 0.(One of the problems associated with the Diffie-Hellman scheme is, that all the parties)awidthshow
408 90 gm
1.06018 0. 32 0.10601 0.(wishing to communicate with one-another have to use the same parameters values)awidthshow
424 90 gm
-0.06536 0.(\(namely the generator and modulus\) of the cryptosystem. Obviously this is not possible)ashow
440 90 gm
-0.04081 0.(on a global scale. Another problem with the Diffie-Hellman algorithm is that, since the)ashow
456 90 gm
0.93856 0. 32 0.09385 0.(master key K)awidthshow
0 2 rm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.32606 0.(AB)ashow
0 -2 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.80596 0. 32 0.08059 0.( between A and B is shared by both parties, non-repudiation is not)awidthshow
472 90 gm
-0.07518 0.(possible without employing a trusted third-party.)ashow
504 90 gm
-0.00997 0.(Furthermore, with this algorithm each user in the group needs to have an integral copy)ashow
520 90 gm
1.12289 0. 32 0.11228 0.(of every other user's public authentication information in order to establish secure)awidthshow
536 90 gm
1.48544 0. 32 0.14854 0.(communication with him. This public authentication information either has to be)awidthshow
552 90 gm
0.26977 0. 32 0.02697 0.(distributed through an authenticated and integral channel or certified by a CA \(which)awidthshow
568 90 gm
-0.07768 0.(requires the use of a public key signature scheme\).)ashow
600 90 gm
-0.02127 0.(These restrictions together make the Diffie-Hellman algorithm only suitable for secure)ashow
616 90 gm
1.23489 0. 32 0.12348 0.(communications in a closed, reasonably sized, fairly stable user group where it is)awidthshow
632 90 gm
-0.10137 0.(possible to agree on the common parameters and for all users to keep the integral copies)ashow
648 90 gm
0.05172 0. 32 0.00517 0.(of the public authentication information of all the users. Despite its shortcomings,  the)awidthshow
664 90 gm
-0.06144 0.(Diffie-Hellman algorithm is the basis of public key cryptography and even some recent)ashow
680 90 gm
0.29739 0. 32 0.02973 0.(publications, such as [OT89], do propose authentication and key distribution systems)awidthshow
696 90 gm
(based on it.)show
F T cp
%%Page: ? 26
op
30 28 xl
1 1 pen
45 288 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(109)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 466 gm
-0.20510 0.(Appendix)ashow
110 90 gm
1 fs
18 fz
bu fc
2 F /|______Times-Bold fnt
bn
2.00527 0.(A3)ashow
110 135 gm
2.47604 0. 32 0.24760 0.(The Kerberos Authentication Server)awidthshow
143 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.81604 0. 32 0.08160 0.(Authentication protocols have been widely studied for a long time and it is not our)awidthshow
159 90 gm
1.09573 0. 32 0.10957 0.(purpose to present a tutorial here. The interested reader is referred to the classical)awidthshow
175 90 gm
0.06439 0. 32 0.00643 0.(papers [NS78, DS81, NS87, OR87] or any good tutorial on cryptology.)awidthshow
207 90 gm
1.13922 0. 32 0.11392 0.(Perhaps the most prominent strong authentication service in wide use today is the)awidthshow
223 90 gm
1.93405 0. 32 0.19340 0.(Kerberos Authentication Server created in the Athena project at MIT [SNC88].)awidthshow
239 90 gm
-0.06843 0.(Kerberos is in everyday use in several major universities \(including MIT and Carnegie-)ashow
255 90 gm
-0.05413 0.(Mellon University\) and obviously has solved a number of security problems in them. It)ashow
271 90 gm
0.69427 0. 32 0.06942 0.(has also recently been adopted as a standard part of distributions of the DEC Ultrix)awidthshow
287 90 gm
0.22171 0. 32 0.02217 0.(operating system. Therefore, its significance should not be underestimated. However,)awidthshow
303 90 gm
0.01998 0. 32 0.00199 0.(it deserves to be pointed out that the approach taken in this work is fundamentally dif-)awidthshow
319 90 gm
1.52420 0. 32 0.15242 0.(ferent from that of Kerberos in several respects and is assumed to supersede the)awidthshow
335 90 gm
-0.12008 0.(currently existing authentication schemes.)ashow
367 90 gm
1.28234 0. 32 0.12823 0.(In Kerberos authentication is based on symmetric encryption which precludes the)awidthshow
383 90 gm
1.16088 0. 32 0.11608 0.(stronger service of non-repudiation and leads to the problems of key management)awidthshow
399 90 gm
0.14419 0. 32 0.01441 0.(described in chapter 4.1.3. Obviously, in an academic environment, repudiation is not)awidthshow
415 90 gm
0.87295 0. 32 0.08729 0.(considered a serious threat. The way in which key management has been solved in)awidthshow
431 90 gm
-0.05531 0.(Kerberos is interesting and deserves a brief summary.)ashow
463 90 gm
0.44128 0. 32 0.04412 0.(To avoid the need for O\(n)awidthshow
0 -3 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.11920 0.(2)ashow
0 3 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.58502 0. 32 0.05850 0.(\) pairwise master keys, each communicating party shares)awidthshow
479 90 gm
0.44479 0. 32 0.04447 0.(one master key with Kerberos. Kerberos, therefore, is in possession of all the master)awidthshow
495 90 gm
-0.04362 0.(keys. When using Kerberos, the authentication process proceeds as follows:)ashow
527 90 gm
(1\))show
527 126 gm
-0.02375 0.(Client C first asks for a certificate \(called "ticket"\) from Kerberos by sending it)ashow
543 126 gm
-0.00500 0.(the message: "C, TGS")ashow
575 90 gm
(2\))show
575 126 gm
-0.00660 0.(Kerberos authenticates the user by his master key and prevents replay by using)ashow
591 126 gm
0.92712 0. 32 0.09271 0.(time-stamps. Kerberos now passes the ticket for a "Ticket Granting Server")awidthshow
607 126 gm
1.76361 0. 32 0.17636 0.(\(TGS\) to C. This ticket includes a pairwise fresh session key to be used)awidthshow
623 126 gm
-0.09352 0.(between the C and TGS:)ashow
638 126 gm
(T)show
0 3 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
(C,TGS)show
0 -3 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.00923 0.(: TGS, C, Addr, TimeStamp, LifeTime, K)ashow
0 3 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
(C,TGS)show
654 126 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
("eK)show
0 3 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
(C)show
0 -3 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(\(K)show
0 3 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
(C,TGS)show
0 -3 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(, eK)show
0 3 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
(TGS)show
0 -3 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(\(T)show
0 3 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
(C,TGS)show
0 -3 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(\)\)")show
687 90 gm
(3\))show
687 126 gm
-0.03710 0.(User C now identifies himself to the TGS by presenting his ticket together with)ashow
702 126 gm
-0.12216 0.(an "authenticator" A)ashow
0 3 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.14903 0.(C)ashow
0 -3 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.11718 0.( and asks for another ticket to the actual service S he wants)ashow
719 126 gm
(to access.)show
734 126 gm
-0.11750 0.(A)ashow
0 3 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.08143 0.(C)ashow
0 -3 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.07638 0.(: C, Addr, TimeStamp)ashow
750 126 gm
("S, eK)show
0 3 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
(TGS)show
0 -3 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(\(T)show
0 3 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
(C,TGS)show
0 -3 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(\), eK)show
0 3 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
(C,TGS)show
0 -3 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(\(A)show
0 3 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
(C)show
0 -3 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(\)")show
F T cp
%%Page: ? 27
op
30 28 xl
1 1 pen
45 288 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(110)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 466 gm
-0.20510 0.(Appendix)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(4\))show
101 126 gm
-0.11076 0.(TGS checks the validity of the ticket and uses the timestamp of the authenticator)ashow
117 126 gm
-0.05278 0.(to detect attempts of replay. TGS now gives C a ticket to S. This ticket includes)ashow
133 126 gm
-0.04237 0.(a pairwise session key to be used between the C and S.)ashow
148 126 gm
0.11856 0.(T)ashow
0 3 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.07147 0.(C,S)ashow
0 -3 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.27191 0. 32 0.02719 0.(: "eK)awidthshow
0 3 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.08168 0.(C,TGS)ashow
0 -3 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.09695 0.(\(eK)ashow
0 3 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.08091 0.(S)ashow
0 -3 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.09158 0.(\(T)ashow
0 3 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.07147 0.(C,S)ashow
0 -3 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.21560 0. 32 0.02156 0.(\), K)awidthshow
0 3 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.07147 0.(C,S)ashow
0 -3 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.14376 0.(\)")ashow
181 90 gm
(5\))show
181 126 gm
0.44479 0. 32 0.04447 0.(The user can now access the service by presenting his ticket together with an)awidthshow
197 126 gm
-0.12565 0.(authenticator.)ashow
212 126 gm
(A)show
0 3 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
(C)show
0 -3 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.03161 0.(:"eK)ashow
0 3 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
(S)show
0 -3 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.03222 0.(\(T)ashow
0 3 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.02514 0.(C,S)ashow
0 -3 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.09094 0. 32 0.00909 0.(\), eK)awidthshow
0 3 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.02514 0.(C,S)ashow
0 -3 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.03602 0.(\(A)ashow
0 3 rm
9 fz
bu fc
2 F /|______Times-Roman fnt
bn
(C)show
0 -3 rm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.05058 0.(\)")ashow
245 90 gm
1.44058 0. 32 0.14405 0.(While this approach works well in limited environments, it still has a number of)awidthshow
261 90 gm
-0.08247 0.(shortcomings:)ashow
293 90 gm
(-)show
293 126 gm
0.14389 0. 32 0.01438 0.(Kerberos is in possession of all the master keys and can therefore impersonate)awidthshow
309 126 gm
1.07574 0. 32 0.10757 0.(as any of the other parties. Placing this much trust in any one party causes)awidthshow
325 126 gm
-0.08946 0.(considerable security threats.)ashow
357 90 gm
(-)show
357 126 gm
1.74407 0. 32 0.17440 0.(As the number of users and services grows, it will become unfeasible to)awidthshow
373 126 gm
-0.08842 0.(manage the master keys.)ashow
405 90 gm
1.04965 0. 32 0.10496 0.(In our approach we only need to trust our own CA and the CAs certified by it. In)awidthshow
421 90 gm
1.19110 0. 32 0.11911 0.(particular, none of the on-line servers needs to be trusted. Certificates forming an)awidthshow
437 90 gm
1.81167 0. 32 0.18116 0.(unbroken chain of trust can be received from any untrusted source, such as the)awidthshow
453 90 gm
-0.02584 0.(Directory. As soon as we know the public keys of our peer, authentication can be done)ashow
469 90 gm
0.78811 0. 32 0.07881 0.(on a bilateral basis between the two communicating end-systems without involving)awidthshow
485 90 gm
-0.03530 0.(anybody else in the process.)ashow
0 0 gm
(nc 504 155 665 438 6 rc)kp
64 gr
607 224 665 310 1 ov
0 gr
607.5 224.5 664.5 309.5 0 ov
0 0 pen
624 235 648 297 0 rc
633 248 gm
1 setTxMode
bu fc
2 F /|______Times-Roman fnt
bn
-0.18832 0.(\(Client\))ashow
645 262 gm
(C)show
64 gr
505 166 563 252 1 ov
1 1 pen
0 gr
505.5 166.5 562.5 251.5 0 ov
0 0 pen
527 170 539 246 0 rc
536 187 gm
0.01562 0 rmoveto
1 setTxMode
(Kerberos)show
64 gr
505 299 563 385 1 ov
1 1 pen
0 gr
505.5 299.5 562.5 384.5 0 ov
0 0 pen
527 325 539 357 0 rc
536 330 gm
0.16796 0 rmoveto
1 setTxMode
(TGS)show
64 gr
607 352 665 438 1 ov
1 1 pen
0 gr
607.5 352.5 664.5 437.5 0 ov
0 0 pen
624 358 648 431 0 rc
633 375 gm
1 setTxMode
-0.04223 0.(\(Server\))ashow
645 392 gm
0.16455 0 rmoveto
(S)show
0 gr
585 218 597 229 0 rc
594 221 gm
1 setTxMode
(1)show
0 gr
573 243 585 254 0 rc
582 246 gm
1 setTxMode
(2)show
0 gr
572 289 584 300 0 rc
581 292 gm
1 setTxMode
(3)show
0 gr
586 314 598 325 0 rc
595 317 gm
1 setTxMode
(4)show
0 gr
622 322 634 333 0 rc
631 325 gm
1 setTxMode
(5)show
1 1 pen
585 156 gm
0 gr
585 156 lin
603 247 615 259 227 267 1 ar
557 231 gm
604 251 lin
555 214 567 226 47 87 1 ar
565 221 gm
613 242 lin
550 311 562 323 98 138 1 ar
610 288 gm
560 314 lin
610 291 622 303 278 318 1 ar
560 327 gm
611 299 lin
629 346 641 358 160 200 1 ar
635 347 gm
635 309 lin
694 90 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.17942 0.(Figure A3-1:)ashow
694 162 gm
-0.07704 0.(The Kerberos Authentication Server.)ashow
F T cp
%%Page: ? 28
op
30 28 xl
1 1 pen
45 288 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(111)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 466 gm
-0.20510 0.(Appendix)ashow
110 90 gm
1 fs
18 fz
bu fc
2 F /|______Times-Bold fnt
bn
2.00527 0.(A4)ashow
110 135 gm
4.39254 0. 32 0.43925 0.(Security Policy)awidthshow
143 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
2.06420 0. 32 0.20642 0.(Security policy is a statement, made with the knowledge and assistance of top)awidthshow
159 90 gm
-0.07882 0.(management, that says, in very general terms, what is and what is not to be permitted in)ashow
175 90 gm
-0.03195 0.(the area of security during the general operation of the system being secured. That is, a)ashow
191 90 gm
-0.05354 0.(security policy tells "what" rather than "how" is to be done [IS7498-2].)ashow
223 90 gm
1.64413 0. 32 0.16441 0.(Security policies are conventionally divided into )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.38310 0.(Identity-Based)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.71533 0. 32 0.07153 0.( and )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.47108 0.(Rule-Based)ashow
239 90 gm
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.20689 0.(policies:)ashow
271 90 gm
0.53588 0. 32 0.05358 0.(Identity-based security policies are based on privileges or capabilities given to users)awidthshow
287 90 gm
0.25634 0. 32 0.02563 0.(and/or Access Control Lists associated with data items and other resources. In a rule-)awidthshow
303 90 gm
1.23565 0. 32 0.12356 0.(based security policy, Security Classes are normally used for determining what is)awidthshow
319 90 gm
-0.01722 0.(authorized behavior. In identity-based systems, the user traditionally identifies himself)ashow
335 90 gm
-0.01812 0.(by presenting to the system something he knows \(e.g. a password\). This is often called)ashow
351 90 gm
-0.02070 0.("need to know" policy.)ashow
383 90 gm
1.09619 0. 32 0.10961 0.(In rule-based security policies, information and other resources are conventionally)awidthshow
399 90 gm
-0.00584 0.(divided into )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.00585 0.(security classes)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.00622 0.( and the flow of information between \(and within\) various)ashow
415 90 gm
1.39877 0. 32 0.13987 0.(classes is controlled by a set of rules. There are also rules regarding the security)awidthshow
431 90 gm
0.11184 0. 32 0.01118 0.(relations between various resources. A classical rule-based security model is the Bell-)awidthshow
447 90 gm
0.43899 0. 32 0.04389 0.(LaPadula model, based on finite state machines and security classes. The model was)awidthshow
463 90 gm
-0.05206 0.(first presented in 1973 and a refined version can be found in [BP74].)ashow
495 90 gm
0.53314 0. 32 0.05331 0.(It should be noted, that besides security classes there is the orthogonal dimension of)awidthshow
511 90 gm
0.48583 0. 32 0.04858 0.(integrity by which resources can be divided into )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.77056 0. 32 0.07705 0.(integrity classes)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.50109 0. 32 0.05010 0.( first introduced by)awidthshow
527 90 gm
0.80795 0. 32 0.08079 0.(Biba in [Bib77]. Combining the ideas of Bell, LaPadula and Biba, we can state the)awidthshow
543 90 gm
-0.09237 0.(following general rules for information flow in a rule-based secure system:)ashow
575 90 gm
(-)show
575 126 gm
0.00656 0. 32 0.00065 0.(A subject can only read an object, whose security level is the same or less than)awidthshow
591 126 gm
-0.08605 0.(that of the subject.)ashow
623 90 gm
(-)show
623 126 gm
-0.09666 0.(A subject can only write to an object, whose security level is the same or greater)ashow
639 126 gm
-0.09559 0.(than that of the subject.)ashow
671 90 gm
(-)show
671 126 gm
0.26748 0. 32 0.02674 0.(A subject can only read an object, whose integrity level is the same or greater)awidthshow
687 126 gm
-0.09559 0.(than that of the subject.)ashow
719 90 gm
(-)show
719 126 gm
0.20965 0. 32 0.02096 0.(A subject can only write to an object, whose integrity level is the same or less)awidthshow
735 126 gm
-0.09559 0.(than that of the subject.)ashow
F T cp
%%Page: ? 29
op
30 28 xl
1 1 pen
45 288 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(112)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 466 gm
-0.20510 0.(Appendix)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.21942 0. 32 0.02194 0.(A recent paper on rule-based security policies in a distributed environment is [LS90].)awidthshow
117 90 gm
0.42419 0. 32 0.04241 0.(Some classical papers on security policies are [Den76] and [Lan81]. An overview of)awidthshow
133 90 gm
0.00625 0. 32 0.00062 0.(the topic can be found e.g. in [IS7498-2].)awidthshow
165 90 gm
-0.05603 0.(In a system everything, including processes, data items and channels, are resources and)ashow
181 90 gm
0.13015 0. 32 0.01301 0.(can be labeled with attributes. Security policies indicate how these attributes are to be)awidthshow
197 90 gm
2.51998 0. 32 0.25199 0.(used to provide required level of security. The rules are stored in a Security)awidthshow
213 90 gm
-0.10562 0.(Management Information Base \(SMIB\).)ashow
245 90 gm
0.98953 0. 32 0.09895 0.(It is only after an explicit security policy has been stated that security becomes an)awidthshow
261 90 gm
-0.07179 0.(engineering problem and every organization seriously interested in security should one.)ashow
277 90 gm
-0.07763 0.(The enforcement of this security policy and monitoring of security related events lies in)ashow
293 90 gm
-0.06698 0.(the domain of engineering and means for doing this are discussed in this study.)ashow
325 90 gm
0.88058 0. 32 0.08805 0.(Security finally boils down into an economic issue. Security is on its optimal level)awidthshow
341 90 gm
1.21810 0. 32 0.12181 0.(when the sum of total losses caused by security defects and the cost of providing)awidthshow
357 90 gm
0.53527 0. 32 0.05352 0.(security is at its minimum. The losses caused by security violations are usually very)awidthshow
373 90 gm
0.85861 0. 32 0.08586 0.(difficult to quantify. However, the optimal security level always lies somewhere in)awidthshow
389 90 gm
0.21240 0. 32 0.02124 0.(between the two extremes. With no security measures losses can easily grow large. If)awidthshow
405 90 gm
0.23880 0. 32 0.02388 0.(flawless security is pursued the cost of providing security grows out of all reasonable)awidthshow
421 90 gm
-0.06115 0.(bounds. The situation is depicted in figure A4-1.)ashow
453 90 gm
0.49224 0. 32 0.04922 0.(While exactly locating the optimum is impossible, careful risk assessment should be)awidthshow
469 90 gm
0.57022 0. 32 0.05702 0.(used to approximately locate it. In drawing up a security policy and performing risk)awidthshow
485 90 gm
2.03918 0. 32 0.20391 0.(assessment also non-technical security measures should be considered. Without)awidthshow
501 90 gm
0.73059 0. 32 0.07305 0.(appropriate measures e.g. in the areas of Personnel Policy and Physical Security all)awidthshow
517 90 gm
-0.08303 0.(technical efforts to ensure security are in vain, the security chain always being as strong)ashow
533 90 gm
nc ct 39 0 put
-0.03363 0.(as its weakest link.)ashow
568 191 gm
bp
650 219 F qi
680 260 qc
686 295 qc
690 327 qc
690 360 F qq
ef
0 gr
1 ec
(nc 552 173 725 421 6 rc)kp
nc ct 39 0 put
580 350 gm
bp
633 320 F qi
666 297 qc
685 265 qc
691 237 qc
693 192 F qq
ef
0 gr
1 ec
(nc 552 173 725 421 6 rc)kp
692 200 gm
0 gr
544 179 568 203 70 110 1 ar
567 191 gm
692 191 lin
681 380 705 404 160 200 1 ar
693 191 gm
693 381 lin
psb
pse
nc ct 39 0 put
569 191 gm
bp
636 221 F qi
665 249 qc
668 274 qc
643 304 qc
610 329 qc
580 349 64 gr
F qq
qf
ef
0 gr
3 ec
(nc 552 173 725 421 6 rc)kp
664 264 gm
0 gr
668 264 lin
637 320 gm
632 335 lin
631 342 gm
0.00097 0 rmoveto
1 setTxMode
bu fc
2 F /|______Times-Roman fnt
bn
(Cost of)show
643 339 gm
-0.14059 0.(Security)ashow
561 208 gm
0.00097 0 rmoveto
(Cost of)show
573 205 gm
-0.14059 0.(Security)ashow
585 203 gm
-0.13839 0.(Breaches)ashow
620 212 gm
0 gr
587 225 lin
709 245 gm
1 setTxMode
-0.33213 0.(Optimal )ashow
721 229 gm
-0.17700 0.(Security Level)ashow
627 241 gm
-0.14770 0.(Total Cost)ashow
632 264 gm
0 gr
659 279 lin
690 374 gm
696 374 lin
690 264 gm
696 264 lin
707 359 gm
0.00341 0 rmoveto
1 setTxMode
(100 %)show
566 177 gm
($)show
682 349 gm
-0.17700 0.(Security Level)ashow
754 90 gm
(nc 30 28 811 566 6 rc)kp
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.17942 0.(Figure A4-1:)ashow
754 162 gm
-0.13429 0.(Optimal security level.)ashow
F T cp
%%Trailer
cd
end
%%Pages: 29 0

% Next: Bibliography

%!PS-Adobe-2.0
%%Title: Bibliography
%%Creator: NoWord
%%Pages: (atend)
%%BoundingBox: ? ? ? ?
%%PageBoundingBox: 28 30 566 811
%%For: AriA
%%IncludeProcSet: "(AppleDict md)" 68 0
%%EndComments
%%EndProlog
%%BeginDocumentSetup
md begin

T T -30 -28 811 566 100 72 72 3 F F F F T T T psu
(AriA; document: Bibliography)jn
0 mf
od
%%EndDocumentSetup
%%Page: ? 1
op
30 28 xl
1 1 pen
45 288 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
bu fc
{}mark T /Times-Roman /|______Times-Roman 0 rf
bn
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(113)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 452 gm
-0.07005 0.(Bibliography)ashow
110 90 gm
1 fs
bu fc
{}mark T /Times-Bold /|______Times-Bold 0 rf
bn
18 fz
bu fc
2 F /|______Times-Bold fnt
bn
0.54383 0.(Bibliography)ashow
143 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.16392 0.([Akl83])ashow
143 162 gm
1.81945 0. 32 0.18194 0.(S. Akl: )awidthshow
2 fs
bu fc
{}mark T /Times-Italic /|______Times-Italic 0 rf
bn
bu fc
2 F /|______Times-Italic fnt
bn
3.22982 0. 32 0.32298 0.(Digital Signatures: A Tutorial Survey)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
3.35998 0. 32 0.33599 0.(, IEEE Computer)awidthshow
159 162 gm
0.24719 0. 32 0.02471 0.(Magazine, Feb. 1983, pp. 15-24)awidthshow
191 90 gm
([AKS90])show
191 162 gm
0.18386 0. 32 0.01838 0.(A. Ahtiainen, J. Keskinen, J. Simolin, K. Tarpila, I. Turunen, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.06059 0.(Protocol)ashow
207 162 gm
0.37231 0. 32 0.03723 0.(Software Engineering Tools for Implementation of a General Purpose)awidthshow
223 162 gm
0.03372 0. 32 0.00337 0.(OSI Stack)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.02609 0. 32 0.00260 0.(, in Computer Networking \(L. Csaba et all., editors\), Elsevier)awidthshow
239 162 gm
0.07736 0. 32 0.00773 0.(Science Publishers, BV \(North Holland\), presented in IFIP conference,)awidthshow
255 162 gm
-0.03828 0.(Budapest, May 1990)ashow
287 90 gm
([ANS81])show
287 162 gm
-0.07322 0.(ANSI X3.92, )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.06959 0.(Data Encryption Algorithm)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.06965 0.(, American National Standards)ashow
303 162 gm
0.06851 0. 32 0.00685 0.(Institute, New York, 1981)awidthshow
335 90 gm
([ANS83])show
335 162 gm
1.79092 0. 32 0.17909 0.(ANSI X3.106, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.84646 0. 32 0.18464 0.(Data Encryption Algorithm \320 Modes of Operation)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(,)show
351 162 gm
-0.06860 0.(American National Standards Institute, New York, 1983)ashow
383 90 gm
-0.05278 0.([BAN89])ashow
383 162 gm
0.15594 0. 32 0.01559 0.(M. Burrows, M. Abadi, R. Needham: )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.18081 0. 32 0.01808 0.(A Logic of Authentication)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.19149 0. 32 0.01914 0.(, ACM)awidthshow
399 162 gm
0.14892 0. 32 0.01489 0.(Operating Systems Review, Vol. 23, No. 5, 1989)awidthshow
431 90 gm
-0.05162 0.([Bar90])ashow
431 162 gm
0.37094 0. 32 0.03709 0.(R. Barrett, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.46722 0. 32 0.04672 0.(Security in Wide Area Networks \320 Some Baseline Require-)awidthshow
447 162 gm
(ments)show
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.00425 0.(, Computer Fraud & Security Bulletin, Dec. 1990, pp. 14-18)ashow
479 90 gm
-0.05278 0.([BDH88])ashow
479 162 gm
0.31799 0. 32 0.03179 0.(D. Branstad, J. Dorman, R. Housley, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.45303 0. 32 0.04530 0.(SP4: A Transport Encapsulation)awidthshow
495 162 gm
-0.05659 0.(Security Protocol)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.06848 0.(, 1988)ashow
527 90 gm
-0.10839 0.([Bel89])ashow
527 162 gm
0.93566 0. 32 0.09356 0.(S. Bellowin, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.06887 0. 32 0.10688 0.(Security Problems in the TCP/IP Protocol Suite)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.17309 0. 32 0.11730 0.(, ACM)awidthshow
543 162 gm
0.06362 0. 32 0.00636 0.(Computer Communication Review, Vol. 19, No. 2, April 1989, pp. 32-)awidthshow
559 162 gm
(48)show
591 90 gm
0.06935 0.([BG89])ashow
591 162 gm
2.87078 0. 32 0.28707 0.(T. Beth, D. Gollmann, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
3.94561 0. 32 0.39456 0.(Algorithm Engineering for Public Key)awidthshow
607 162 gm
0.06990 0.(Algorithms)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.27603 0. 32 0.02760 0.(, IEEE Journal on Selected Areas in Communications, Vol.)awidthshow
623 162 gm
0.48355 0. 32 0.04835 0.(7, No. 4, May 1989, pp. 458-466)awidthshow
655 90 gm
([BI89])show
655 162 gm
2.64984 0. 32 0.26498 0.(F. Burg, N. Di Iorio, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
5.37979 0. 32 0.53797 0.(Networking of Networks: Interworking)awidthshow
671 162 gm
-0.03387 0.(According to OSI)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.03359 0.(, IEEE Journal on Selected Areas in Communications,)ashow
687 162 gm
0.35705 0. 32 0.03570 0.(Vol. 7, No. 7, September 1989, pp. 1131-1142)awidthshow
719 90 gm
-0.05401 0.([Bib77])ashow
719 162 gm
0.16525 0. 32 0.01652 0.(K. Biba, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.28442 0. 32 0.02844 0.(Integrity Considerations for Secure Computer Systems)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.24078 0. 32 0.02407 0.(, ESD-)awidthshow
735 162 gm
0.63552 0. 32 0.06355 0.(TR-76-372, MITRE MTR-3153 NTIS AD A039324, Bedford, Mass.,)awidthshow
751 162 gm
-0.14717 0.(April 1977)ashow
F T cp
%%Page: ? 2
op
30 28 xl
1 1 pen
45 288 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(114)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 452 gm
-0.07005 0.(Bibliography)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.05290 0.([Bir85])ashow
101 162 gm
0.87203 0. 32 0.08720 0.(A. Birrell, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.44714 0. 32 0.14471 0.(Secure Communications Using Remote Procedure Calls)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(,)show
117 162 gm
0.97000 0. 32 0.09700 0.(ACM Transactions on Computer Systems, Vol. 3, No. 1, Feb. 1985,)awidthshow
133 162 gm
0.59234 0. 32 0.05923 0.(pp. 1-14)awidthshow
165 90 gm
-0.13142 0.([BM90])ashow
165 162 gm
0.39077 0. 32 0.03907 0.(J. Burns, C. Mitchell, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.46493 0. 32 0.04649 0.(A Security Scheme for Resource Sharing over a)awidthshow
181 162 gm
0.13604 0.(Network)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.40237 0. 32 0.04023 0.(, Computers & Security, Vol. 9, No. 1, Feb. 1990, pp. 67-75)awidthshow
213 90 gm
-0.13064 0.([BO88])ashow
213 162 gm
0.95153 0. 32 0.09515 0.(E. Brickell, A. Odlyzko, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.14593 0. 32 0.11459 0.(Cryptanalysis: A Survey of Recent Results)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(,)show
229 162 gm
0.17974 0. 32 0.01797 0.(Proceedings of the IEEE, Vol. 76, No. 5, May 1988, pp. 578-593)awidthshow
261 90 gm
0.06781 0.([BP74])ashow
261 162 gm
2.15057 0. 32 0.21505 0.(D. Bell, E. LaPadula, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
3.80355 0. 32 0.38035 0.(Secure Computer Systems: Mathematical)awidthshow
277 162 gm
1.59820 0. 32 0.15982 0.(Foundations and Model)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.19552 0. 32 0.11955 0.(, M74-244, Vol. 2, MITRE Corp., Bedford,)awidthshow
293 162 gm
0.38543 0. 32 0.03854 0.(Mass., Oct. 1984)awidthshow
325 90 gm
0.06781 0.([BS90])ashow
325 162 gm
0.38681 0. 32 0.03868 0.(E. Biham, A. Shamir, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59341 0. 32 0.05934 0.(Differential Cryptanalysis of DES-Like Crypto-)awidthshow
341 162 gm
0.10073 0.(systems)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.40969 0. 32 0.04096 0.(, Proceedings of Crypto'90, June 1990)awidthshow
373 90 gm
-0.21942 0.([BVA90])ashow
373 162 gm
1.98043 0. 32 0.19804 0.(T. Beth, S. Vanstone, G. Agnew, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
2.53707 0. 32 0.25370 0.(What One Should Know about)awidthshow
389 162 gm
1.28570 0. 32 0.12857 0.(Public Key Algorithms \320 Today!)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.41067 0. 32 0.14106 0.(, proceedings of SECURICOM 90,)awidthshow
405 162 gm
-0.01895 0.(Paris, March 1990)ashow
437 90 gm
([CEN90])show
437 162 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.51504 0. 32 0.15150 0.(Report on Taxonomy for Security Standardisation)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.07788 0. 32 0.10778 0.(, prepared for the)awidthshow
453 162 gm
1.36978 0. 32 0.13697 0.(ITSTC by the CEN/CENELEC Security Group, CSecG/49/90, Sep.)awidthshow
469 162 gm
(1990)show
501 90 gm
0.06935 0.([CG90])ashow
501 162 gm
0.36682 0. 32 0.03668 0.(P.-C. Cheng, V. Gligor, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.47103 0. 32 0.04710 0.(On the Formal Specification and Verification)awidthshow
517 162 gm
2.17468 0. 32 0.21746 0.(of a Multiparty Session Protocol)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.71356 0. 32 0.17135 0.(,  Proceedings of the 1990 IEEE)awidthshow
533 162 gm
1.01516 0. 32 0.10151 0.(Computer Society Symposium on Research in Security and Privacy,)awidthshow
549 162 gm
0.16326 0. 32 0.01632 0.(Oakland, May 7-9, 1990, pp. 216-233)awidthshow
581 90 gm
-0.05278 0.([CGV90])ashow
581 162 gm
0.31845 0. 32 0.03184 0.(R. Cocino, M.T. Grillo, F. Vaschetto, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.36834 0. 32 0.03683 0.(Draft Specification for a Secure)awidthshow
597 162 gm
0.79376 0. 32 0.07937 0.(Tranport Protocol Class 0)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.69305 0. 32 0.06930 0.(, 4th version, a contribution to COST-225,)awidthshow
613 162 gm
-0.07475 0.(ISO/IEC JTC1/SC6/WG4,  December 1990)ashow
645 90 gm
-0.05268 0.([Cha85])ashow
645 162 gm
1.29226 0. 32 0.12922 0.(D. Chaum, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.78054 0. 32 0.17805 0.(Security without Identification: Transaction Systems to)awidthshow
661 162 gm
1.16012 0. 32 0.11601 0.(Make Big Brother Obsolete)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.97457 0. 32 0.09745 0.(, Communications of the ACM, Vol. 28,)awidthshow
677 162 gm
0.49652 0. 32 0.04965 0.(No. 10, Oct. 1985, pp. 1030-1044)awidthshow
709 90 gm
-0.10839 0.([Cla88])ashow
709 162 gm
0.88073 0. 32 0.08807 0.(D. Clark, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.24191 0. 32 0.12419 0.(The Design Philosophy of the DARPA Internet Protocols)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(,)show
725 162 gm
0.625 0. 32 0.0625 0.(ACM Computer Communication Review, Vol. 18, No. 4, Aug. 1988,)awidthshow
741 162 gm
0.50354 0. 32 0.05035 0.(pp. 106-114)awidthshow
F T cp
%%Page: ? 3
op
30 28 xl
1 1 pen
45 288 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(115)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 452 gm
-0.07005 0.(Bibliography)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.05398 0.([Com89])ashow
101 162 gm
0.47882 0. 32 0.04788 0.(Commission of the European Communities, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.48385 0. 32 0.04838 0.(EDI in Perspective)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.43151 0. 32 0.04315 0.(, EUR)awidthshow
117 162 gm
0.12145 0. 32 0.01214 0.(11883 EN, Brussel \320 Luxembourg, 1989)awidthshow
149 90 gm
-0.05398 0.([Com90])ashow
149 162 gm
(Commission of the European Communities, )show
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
(Proposal for a Decision of)show
165 162 gm
-0.01739 0.(the Council in the Field of Information Security)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.02316 0.( \(INFOSEC\), COM\(90\))ashow
181 162 gm
0.24948 0. 32 0.02494 0.(314 final, Brussel, July 3, 1990)awidthshow
213 90 gm
-0.05398 0.([COS90])ashow
213 162 gm
0.44601 0. 32 0.04460 0.(Security Mechanisms for Computer Networks, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.49560 0. 32 0.04956 0.(Extended OSI Security)awidthshow
229 162 gm
-0.07527 0.(Architecture)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.07670 0.(, COST-11 Ter Project Report, Volume II, Draft, Oct. 1990)ashow
261 90 gm
0.06781 0.([CP88])ashow
261 162 gm
1.59393 0. 32 0.15939 0.(J. Crowcroft, K. Paliwoda, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
2.05596 0. 32 0.20559 0.(A Multicast Transport Protocol)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.93679 0. 32 0.19367 0.(, ACM)awidthshow
277 162 gm
1.44699 0. 32 0.14469 0.(Computer Communication Review, Vol. 18, No. 4, Aug. 1988, pp.)awidthshow
293 162 gm
(247-256)show
325 90 gm
([CPW89])show
325 162 gm
3.91067 0. 32 0.39106 0.(L. Cassel, C. Partridge, J. Westcott, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
8.67446 0. 32 0.86744 0.(Network Management)awidthshow
341 162 gm
0.16372 0. 32 0.01637 0.(Architectures and Protocols: Problems and Approaches)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.13198 0. 32 0.01319 0.(, IEEE Journal)awidthshow
357 162 gm
0.12557 0. 32 0.01255 0.(on Selected Areas in Communications, Vol. 7, No. 7, September 1989,)awidthshow
373 162 gm
0.45776 0. 32 0.04577 0.(pp. 1104-1114)awidthshow
405 90 gm
-0.16256 0.([Dav83])ashow
405 162 gm
-0.08790 0.(D. Davies, )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.08865 0.(Applying the RSA Digital Signature to Electronic Mail)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.11459 0.(, IEEE)ashow
421 162 gm
0.08117 0. 32 0.00811 0.(Computer Magazine, Feb. 1983, pp. 55-62)awidthshow
453 90 gm
-0.21699 0.([Dee88])ashow
453 162 gm
0.82595 0. 32 0.08259 0.(S. Deering, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.09771 0. 32 0.10977 0.(Multicast Routing in Internetworks and Extended LANs)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(,)show
469 162 gm
0.625 0. 32 0.0625 0.(ACM Computer Communication Review, Vol. 18, No. 4, Aug. 1988,)awidthshow
485 162 gm
0.55953 0. 32 0.05595 0.(pp. 55-64)awidthshow
517 90 gm
-0.16256 0.([Den83])ashow
517 162 gm
2.54730 0. 32 0.25473 0.(D. Denning, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
3.00979 0. 32 0.30097 0.(Protecting Public Keys and Signature Keys)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
2.80395 0. 32 0.28039 0.(, IEEE)awidthshow
533 162 gm
0.08117 0. 32 0.00811 0.(Computer Magazine, Feb. 1983, pp. 27-35)awidthshow
565 90 gm
-0.06251 0.([DH76])ashow
565 162 gm
2.19360 0. 32 0.21936 0.(W. Diffie, M. Hellman, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
3.13156 0. 32 0.31315 0.(New Directions in Cryptography)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
2.54135 0. 32 0.25413 0.(, IEEE)awidthshow
581 162 gm
1.47552 0. 32 0.14755 0.(Transactions on Information Theory,Vol. IT-22, No. 6, Nov. 1976,)awidthshow
597 162 gm
0.50354 0. 32 0.05035 0.(pp. 644-654)awidthshow
629 90 gm
-0.06251 0.([DH77])ashow
629 162 gm
1.29104 0. 32 0.12910 0.(W. Diffie, M. Hellman, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.60491 0. 32 0.16049 0.(Exhaustive Cryptanalysis of the NBS Data)awidthshow
645 162 gm
-0.00596 0.(Encryption Standard)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.00585 0.(, Computer, June 1977, pp. 74-78)ashow
677 90 gm
-0.06251 0.([DH79])ashow
677 162 gm
-0.02291 0.(W. Diffie, M. Hellman, )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.02299 0.(Privacy and Authentication: An Introduction to)ashow
693 162 gm
0.28892 0.(Cryptography)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.87387 0. 32 0.08738 0.(, Proceedings of the IEEE, Vol. 67, No. 3, Mar. 1979,)awidthshow
709 162 gm
0.50354 0. 32 0.05035 0.(pp. 397-427)awidthshow
741 90 gm
-0.16276 0.([Dif88])ashow
741 162 gm
2.98828 0. 32 0.29882 0.(W. Diffie, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
3.95675 0. 32 0.39567 0.(The First Ten Years of Public-Key Cryptography)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(,)show
757 162 gm
0.17974 0. 32 0.01797 0.(Proceedings of the IEEE, Vol. 76, No. 5, May 1988, pp. 560-577)awidthshow
F T cp
%%Page: ? 4
op
30 28 xl
1 1 pen
45 288 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(116)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 452 gm
-0.07005 0.(Bibliography)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
([DKK90])show
101 162 gm
0.05035 0. 32 0.00503 0.(F. Dix, M. Kelly, R. Klessig, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.07202 0. 32 0.00720 0.(Access to a Public Switched Multi-Mega-)awidthshow
117 162 gm
0.87829 0. 32 0.08782 0.(bit Data Service Offering)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.09786 0. 32 0.10978 0.(, ACM Computer Communication Review,)awidthshow
133 162 gm
0.50903 0. 32 0.05090 0.(Vol. 20, No. 3, July 1990, pp. 46-61)awidthshow
165 90 gm
-0.21876 0.([DoD85])ashow
165 162 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.23840 0. 32 0.12384 0.(Trusted Computer Systems Evaluation Criteria)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.25640 0. 32 0.12564 0.(, DoD 5200.28-STD,)awidthshow
181 162 gm
-0.06219 0.(Department of Defense, USA, 1985)ashow
213 90 gm
-0.06402 0.([DP84])ashow
213 162 gm
0.55999 0. 32 0.05599 0.(D. Davies, W. Price, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.86914 0. 32 0.08691 0.(Security for Computer Networks)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.57144 0. 32 0.05714 0.(, John Wiley &)awidthshow
229 162 gm
0.87463 0. 32 0.08746 0.(Sons, 1984)awidthshow
261 90 gm
-0.06402 0.([DS81])ashow
261 162 gm
1.41937 0. 32 0.14193 0.(D. Denning, G. Sacco, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
2.00286 0. 32 0.20028 0.(Timestamps in Key Distribution Protocols)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(,)show
277 162 gm
0.15548 0. 32 0.01554 0.(Communications of the ACM, Vol. 24, No. 8, Aug. 1981, pp. 533-536)awidthshow
309 90 gm
-0.16455 0.([ECM88])ashow
309 162 gm
1.61483 0. 32 0.16148 0.(ECMA, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.30462 0. 32 0.13046 0.(Security in Open Systems - A Security Framework)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.72241 0. 32 0.17224 0.(, ECMA)awidthshow
325 162 gm
0.09445 0. 32 0.00944 0.(TR/46, July 1988)awidthshow
357 90 gm
-0.16455 0.([ECM89])ashow
357 162 gm
3.69735 0. 32 0.36973 0.(ECMA, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
3.12652 0. 32 0.31265 0.(Security in Open Systems, Data Elements and Service)awidthshow
373 162 gm
-0.01493 0.(Definitions)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.01634 0.(, July 1989)ashow
405 90 gm
([Far91])show
405 162 gm
-0.04600 0.(Discussions with professsor David Farber in Helsinki, March 1991)ashow
437 90 gm
0.16682 0.([FFS88])ashow
437 162 gm
1.63269 0. 32 0.16326 0.(U. Feige, A. Fiat, A. Shamir, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
2.70996 0. 32 0.27099 0.(Zero-knowledge Proofs of Identity)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(,)show
453 162 gm
0.14785 0. 32 0.01478 0.(Journal of Cryptology, 1, 1988)awidthshow
485 90 gm
0.13435 0.([FP90])ashow
485 162 gm
1.26419 0. 32 0.12641 0.(W. Fumy, A. Pfau, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
2.12417 0. 32 0.21241 0.(Asymmetric Authentication Schemes for Smart)awidthshow
501 162 gm
-0.13992 0.(Cards \320 Dream or reality?)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.13775 0.(, IFIP TC-11 6th International Conference and)ashow
517 162 gm
-0.02941 0.(Exhibition on Information Security, Espoo, Finland, 1990)ashow
549 90 gm
0.13435 0.([FS87])ashow
549 162 gm
1.30081 0. 32 0.13008 0.(A. Fiat, A. Shamir, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.75460 0. 32 0.17546 0.(How to Prove Yourself: Practical Solutions to)awidthshow
565 162 gm
2.31765 0. 32 0.23176 0.(Identification and Signature Problems)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.97296 0. 32 0.19729 0.(, Proceedings of Crypto'86,)awidthshow
581 162 gm
0.29663 0. 32 0.02966 0.(Springer, 1987)awidthshow
613 90 gm
([Gen90])show
613 162 gm
0.65383 0. 32 0.06538 0.(G. Genilloud, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.72677 0. 32 0.07267 0.(X.400 MHS: First Steps Towards an EDI Communica-)awidthshow
629 162 gm
0.54153 0. 32 0.05415 0.(tion Standard)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.43395 0. 32 0.04339 0.(, ACM Computer Communication Review, Vol. 20, No.)awidthshow
645 162 gm
0.26702 0. 32 0.02670 0.(2, April 1990, pp. 72-86)awidthshow
677 90 gm
([GNY90])show
677 162 gm
2.62954 0. 32 0.26295 0.(L. Gong, R. Needham, R. Yahalom, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
3.19931 0. 32 0.31993 0.(Reasoning about Belief in)awidthshow
693 162 gm
1.83807 0. 32 0.18380 0.(Cryptographic Protocols)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.94940 0. 32 0.09494 0.(,  Proceedings of the 1990 IEEE Computer)awidthshow
709 162 gm
1.32095 0. 32 0.13209 0.(Society Symposium on Research in Security and Privacy, Oakland,)awidthshow
725 162 gm
0.31082 0. 32 0.03108 0.(May 7-9, 1990, pp. 234-248)awidthshow
F T cp
%%Page: ? 5
op
30 28 xl
1 1 pen
45 288 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(117)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 452 gm
-0.07005 0.(Bibliography)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
([GOS90])show
101 162 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
2.08465 0. 32 0.20846 0.(U.S. Government Open Systems Interconnection Profile)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
2.14233 0. 32 0.21423 0.( \(GOSIP\),)awidthshow
117 162 gm
-0.02130 0.(Draft, Version 2.0, April 1989)ashow
149 90 gm
-0.06251 0.([HD89])ashow
149 162 gm
0.22216 0. 32 0.02221 0.(C. Huitema, A. Doghri, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.25756 0. 32 0.02575 0.(Defining Faster Transfer Syntaxes for the OSI)awidthshow
165 162 gm
0.44586 0. 32 0.04458 0.(Presentation Protocol)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.33416 0. 32 0.03341 0.(, ACM Computer Communication Review, Vol.)awidthshow
181 162 gm
0.55786 0. 32 0.05578 0.(19, No. 5, Oct. 1989, pp. 44-55)awidthshow
213 90 gm
-0.05162 0.([Hei90])ashow
213 162 gm
1.74316 0. 32 0.17431 0.(J. Hein\212nen, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.65603 0. 32 0.16560 0.(Review of ISO IP)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.67312 0. 32 0.16731 0.(, a contribution to the EC COSINE)awidthshow
229 162 gm
(project, August 13, 1990)show
261 90 gm
-0.05162 0.([Hei91])ashow
261 162 gm
0.95932 0. 32 0.09593 0.(J. Hein\212nen, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.36093 0. 32 0.13609 0.(Review of Backbone Technologies)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.81710 0. 32 0.08171 0.(, preprint, to be pub-)awidthshow
277 162 gm
2.49206 0. 32 0.24920 0.(lished in the RARE Symposium on High Speed Networking for)awidthshow
293 162 gm
0.23498 0. 32 0.02349 0.(Research in Europe, Jan. 24, 1991, Brussels)awidthshow
325 90 gm
0.17070 0.([HKK90])ashow
325 162 gm
0.92910 0. 32 0.09291 0.(J. Harju, J. Koivisto, J. Kuittinen, J. Lahti, J. Malka, E. Ojanper\212, J.)awidthshow
341 162 gm
0.03173 0. 32 0.00317 0.(Reilly, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.04653 0. 32 0.00465 0.(C-VOPS Users' Manual)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.03509 0. 32 0.00350 0.(, Technical Research Centre of Finland,)awidthshow
357 162 gm
-0.11584 0.(Telecommunications laboratory, 1990)ashow
389 90 gm
0.05841 0.([Hou89])ashow
389 162 gm
-0.03303 0.(R. Housley, )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.03182 0.(Authentication, Confidentiality, and Integrity Extensions to)ashow
405 162 gm
0.17135 0. 32 0.01713 0.(the XNS Protocol Suite)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.16220 0. 32 0.01622 0.(, ACM Security, Audit & Control Review, Vol.)awidthshow
421 162 gm
0.46783 0. 32 0.04678 0.(7, No. 3, Fall  1989, pp. 17-24)awidthshow
453 90 gm
-0.10661 0.([IEE90])ashow
453 162 gm
1.27517 0. 32 0.12751 0.(Institute of Electrical and Electronic Engineers, Proposed Standard:)awidthshow
469 162 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.97769 0. 32 0.19776 0.(DQDB Subnetwork of a Metropolitan Area Network)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.69860 0. 32 0.16986 0.(, IEEE 802.6,)awidthshow
485 162 gm
0.43151 0. 32 0.04315 0.(P802.6/D14, July 13, 1990)awidthshow
517 90 gm
-0.12931 0.([IM90])ashow
517 162 gm
0.58044 0. 32 0.05804 0.(C. I'Anson, C. Mitchell, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.86212 0. 32 0.08621 0.(Security Defects in CCITT Recommendation)awidthshow
533 162 gm
1.31668 0. 32 0.13166 0.(X.509 \320 The Directory Authentication Framework)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.34246 0. 32 0.13424 0.(, ACM Computer)awidthshow
549 162 gm
0.13793 0. 32 0.01379 0.(Communication Review, Vol. 20, No. 2, April 1990, pp. 30-34)awidthshow
581 90 gm
0.03962 0.([IS7498-1])ashow
581 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.49285 0. 32 0.04928 0.(Open  Systems Interconnection)awidthshow
597 162 gm
0.11871 0. 32 0.01187 0.(Reference Model, Part 1: Basic Reference Model)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.11535 0. 32 0.01153 0.(, ISO 7498-1 \(CCITT)awidthshow
613 162 gm
0.44799 0. 32 0.04479 0.(X.200\), Geneva 1984)awidthshow
645 90 gm
0.03962 0.([IS7498-2])ashow
645 162 gm
0.68817 0. 32 0.06881 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.88180 0. 32 0.08818 0.(Open Systems Interconnection)awidthshow
661 162 gm
0.28930 0. 32 0.02893 0.(Reference Model, Part 2: Security Architecture)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.22171 0. 32 0.02217 0.(, ISO DIS 7498-2, July)awidthshow
677 162 gm
0.58807 0. 32 0.05880 0.(19, 1988)awidthshow
709 90 gm
0.03962 0.([IS7498-3])ashow
709 162 gm
0.68817 0. 32 0.06881 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.88180 0. 32 0.08818 0.(Open Systems Interconnection)awidthshow
725 162 gm
0.92849 0. 32 0.09284 0.(Reference Model, Part 3: Naming and Addressing)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.77835 0. 32 0.07783 0.(, ISO DIS 7498-3,)awidthshow
741 162 gm
(1989)show
F T cp
%%Page: ? 6
op
30 28 xl
1 1 pen
45 288 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(118)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 452 gm
-0.07005 0.(Bibliography)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.03962 0.([IS7498-4])ashow
101 162 gm
0.68817 0. 32 0.06881 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.88180 0. 32 0.08818 0.(Open Systems Interconnection)awidthshow
117 162 gm
0.60470 0. 32 0.06047 0.(Reference Model, Part 4: Management Framework)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.44403 0. 32 0.04440 0.(, ISO DIS 7498-4,)awidthshow
133 162 gm
(1987)show
165 90 gm
-0.06477 0.([IS7498/A1])ashow
165 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
181 162 gm
-0.05847 0.(Connectionless Data Transmission)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.05955 0.(, ISO 7498-1/Add. 1, 1987)ashow
213 90 gm
-0.06477 0.([IS7498/A2])ashow
213 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
229 162 gm
-0.11595 0.(Multipeer Data Transmission)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.12043 0.(, ISO 7498-1/Add. 2)ashow
261 90 gm
([IS7498/C1])show
261 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
277 162 gm
-0.03520 0.(Technical Corrigendum 1)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.03419 0.(, ISO 7498-1/Cor. 1, 1988)ashow
309 90 gm
0.04992 0.([IS7776])ashow
309 162 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.34613 0. 32 0.13461 0.(HDLC \320 Description of the X.25 LAPB-compatible DTE Data Link)awidthshow
325 162 gm
-0.02557 0.(Procedures)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.02537 0.(, ISO 7776, 1986)ashow
357 90 gm
-0.06477 0.([IS8072/A1])ashow
357 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
373 162 gm
2.49221 0. 32 0.24922 0.(Transport Service Definition, Addendum 1: Connectionless-mode)awidthshow
389 162 gm
(Transmission)show
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(, ISO 8072/Add. 1)show
421 90 gm
-0.06477 0.([IS8073/A2])ashow
421 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
437 162 gm
0.73135 0. 32 0.07313 0.(Connection Oriented Transport Protocol Specification, Addendum 2:)awidthshow
453 162 gm
3.72817 0. 32 0.37281 0.(Class 4 Operation over Connectionless Network Service)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
2.81646 0. 32 0.28164 0.(, ISO)awidthshow
469 162 gm
(8073/Add. 2)show
501 90 gm
0.04992 0.([IS8073])ashow
501 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
517 162 gm
2.45178 0. 32 0.24517 0.(Connection Oriented Transport Protocol Specification)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.54983 0. 32 0.15498 0.(, ISO 8073)awidthshow
533 162 gm
0.44448 0. 32 0.04444 0.(\(CCITT X.224\), 1986)awidthshow
565 90 gm
0.04992 0.([IS8208])ashow
565 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
581 162 gm
0.58990 0. 32 0.05899 0.(X.25 Packet Level Protocol for Data Terminal, Equipment)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.47363 0. 32 0.04736 0.(, ISO 8208)awidthshow
597 162 gm
0.45669 0. 32 0.04566 0.(\(CCITT X.25\), 1990)awidthshow
629 90 gm
-0.06477 0.([IS8326/A3])ashow
629 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
645 162 gm
0.90270 0. 32 0.09027 0.(Basic Connection Oriented Session Service Definition, Addendum 3:)awidthshow
661 162 gm
-0.02374 0.(Connectionless Session Service)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.02783 0.(, ISO 8326/DAD3, 1988)ashow
693 90 gm
-0.06477 0.([IS8348/A1])ashow
693 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
709 162 gm
-0.00361 0.(Network Service Definition, Addendum 1: Connectionless-mode Trans-)ashow
725 162 gm
0.01246 0.(mission)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.05294 0. 32 0.00529 0.(, ISO 8348/AD1, 1987)awidthshow
F T cp
%%Page: ? 7
op
30 28 xl
1 1 pen
45 288 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(119)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 452 gm
-0.07005 0.(Bibliography)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.04992 0.([IS8348])ashow
101 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
117 162 gm
0.16937 0. 32 0.01693 0.(Network Service Definition)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.12130 0. 32 0.01213 0.(, ISO 8348 \(CCITT X.213\), 1987)awidthshow
149 90 gm
0.04992 0.([IS8372])ashow
149 162 gm
0.51284 0. 32 0.05128 0.(ISO, Information Technology, Security Techniques, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.48812 0. 32 0.04881 0.(Modes of Opera-)awidthshow
165 162 gm
-0.02925 0.(tion for a 64-bit Block Cipher Algorithm)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.03263 0.(, ISO/IEC, ISO 8372, 1989)ashow
197 90 gm
0.04992 0.([IS8473])ashow
197 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
213 162 gm
2.15606 0. 32 0.21560 0.(Protocol for Providing the Connectionless-mode Network Service)awidthshow
229 162 gm
-0.06817 0.(\(Internetwork Protocol\))ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.07931 0.(, ISO 8473)ashow
261 90 gm
0.03962 0.([IS8571-1])ashow
261 162 gm
0.03143 0. 32 0.00314 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.03402 0. 32 0.00340 0.(Open Systems Interconnection \320)awidthshow
277 162 gm
0.30075 0. 32 0.03007 0.(File Transfer, Access and Management, Part 1: General Introduction)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(,)show
293 162 gm
0.07125 0. 32 0.00712 0.(ISO 8571-1, Oct. 1988)awidthshow
325 90 gm
0.03962 0.([IS8571-2])ashow
325 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
341 162 gm
0.53970 0. 32 0.05397 0.(File Transfer, Access and Management, Part 2: The Virtual Filestore)awidthshow
357 162 gm
-0.00898 0.(Definition)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.00970 0.(, ISO 8571-2, Oct. 1988)ashow
389 90 gm
0.03962 0.([IS8571-4])ashow
389 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
405 162 gm
1.60675 0. 32 0.16067 0.(File Transfer, Access and Management, Part 4: The File Protocol)awidthshow
421 162 gm
-0.00787 0.(Specification)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.00857 0.(, ISO 8571-4, Oct. 1988)ashow
453 90 gm
0.04992 0.([IS8602])ashow
453 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
469 162 gm
-0.09541 0.(Protocol for Providing the Connectionless-mode Transport Service)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.11961 0.(, ISO)ashow
485 162 gm
0.20141 0. 32 0.02014 0.(8602, Dec. 1987)awidthshow
517 90 gm
-0.06477 0.([IS8649/A1])ashow
517 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
533 162 gm
-0.06240 0.(Association Control Service Element, Addendum 1: Authentication)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.07759 0.(, ISO)ashow
549 162 gm
-0.09452 0.(8649/DAD1, 1989)ashow
581 90 gm
-0.06477 0.([IS8649/A2])ashow
581 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
597 162 gm
1.50955 0. 32 0.15095 0.(Association Control Service Element, Addendum 2: Connectionless)awidthshow
613 162 gm
0.06271 0. 32 0.00627 0.(ACSE Service)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.04852 0. 32 0.00485 0.(, ISO 8649/DAD2, 1989)awidthshow
645 90 gm
-0.06477 0.([IS8649/A3])ashow
645 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
661 162 gm
-0.04959 0.(Association Control Service Element, Addendum 3: A-Context Manage-)ashow
677 162 gm
-0.03079 0.(ment Service)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.03256 0.(, ISO 8649/PDAD3 \(working draft\), 1990)ashow
709 90 gm
0.04992 0.([IS8649])ashow
709 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
725 162 gm
-0.03199 0.(Service Definition for the Association Control Service Element \(ACSE\))ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(,)show
741 162 gm
0.20324 0. 32 0.02032 0.(ISO 8649 \(CCITT X.217\), 1988)awidthshow
F T cp
%%Page: ? 8
op
30 28 xl
1 1 pen
45 288 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(120)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 452 gm
-0.07005 0.(Bibliography)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.06477 0.([IS8650/A1])ashow
101 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
117 162 gm
1.78024 0. 32 0.17802 0.(Peer Entity Authentication During Association Establishment)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.18759 0. 32 0.11875 0.(, ISO)awidthshow
133 162 gm
-0.09452 0.(8650/DAD1, 1989)ashow
165 90 gm
-0.06477 0.([IS8650/A4])ashow
165 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
181 162 gm
-0.06278 0.(Application Entity Titles)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.07267 0.(, ISO 8650/PDAD4 \(working draft\), 1990)ashow
213 90 gm
0.04992 0.([IS8650])ashow
213 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
229 162 gm
1.46270 0. 32 0.14627 0.(Protocol Specification for the Association Control Service Element)awidthshow
245 162 gm
0.11492 0.(\(ACSE\))ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.38253 0. 32 0.03825 0.(, ISO 8650 \(CCITT X.227\), 1988)awidthshow
277 90 gm
0.03962 0.([IS8802-1])ashow
277 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
293 162 gm
-0.08633 0.(Local Area Networks, Part 1: Introduction)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.09768 0.(, ISO 8802-1)ashow
325 90 gm
0.03962 0.([IS8802-2])ashow
325 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
341 162 gm
-0.08087 0.(Local Area Networks, Part 2: Logical Link Control)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.09103 0.(, ISO 8802-2)ashow
373 90 gm
0.03962 0.([IS8802-3])ashow
373 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
389 162 gm
1.75933 0. 32 0.17593 0.(Local Area Networks, Part 3: Carrier Sense Multiple Access with)awidthshow
405 162 gm
0.26763 0. 32 0.02676 0.(Collision Detection,Access Method and Physical Layer Specifications)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(,)show
421 162 gm
0.19424 0. 32 0.01942 0.(ISO 8802-3, 1989)awidthshow
453 90 gm
0.03962 0.([IS8802-5])ashow
453 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
469 162 gm
0.06622 0. 32 0.00662 0.(Local Area Networks, Part 5: Token Ring Access Method and Physical)awidthshow
485 162 gm
-0.02197 0.(Layer Specifications)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.02441 0.(, ISO DIS 8802-5, 1990)ashow
517 90 gm
0.04992 0.([IS8807])ashow
517 162 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.32415 0. 32 0.13241 0.(LOTOS \320 A Formal Description Technique Based on the Temporal)awidthshow
533 162 gm
-0.09739 0.(Ordering of Observational Behaviour)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.10301 0.(, ISO 8807, 1989)ashow
565 90 gm
-0.06477 0.([IS8822/A1])ashow
565 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
581 162 gm
1.33560 0. 32 0.13356 0.(Connection Oriented Presentation Service Definition, Addendum 1:)awidthshow
597 162 gm
-0.08868 0.(Connectionless-mode Presentation Service)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.10133 0.(, ISO 8822/DAD1, 1989)ashow
629 90 gm
0.04992 0.([IS8823])ashow
629 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
645 162 gm
1.21566 0. 32 0.12156 0.(Connection Oriented Presentation Protocol Specification)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.75515 0. 32 0.07551 0.(, ISO 8823)awidthshow
661 162 gm
0.44448 0. 32 0.04444 0.(\(CCITT X.226\), 1988)awidthshow
693 90 gm
-0.06477 0.([IS8824/A1])ashow
693 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
709 162 gm
1.17004 0. 32 0.11700 0.(Specification of Abstract Syntax Notation One, Addendum 1: ASN.1)awidthshow
725 162 gm
(Extensions)show
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(, ISO 8824/DAD1 \(CCITT X.208\), 1988)show
F T cp
%%Page: ? 9
op
30 28 xl
1 1 pen
45 288 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(121)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 452 gm
-0.07005 0.(Bibliography)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.04992 0.([IS8824])ashow
101 162 gm
0.48065 0. 32 0.04806 0.(ISO, Information Processing Systems, O)awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.57296 0. 32 0.05729 0.(pen Systems Interconnection,)awidthshow
117 162 gm
1.95098 0. 32 0.19509 0.(Specification of Abstract Syntax Notation One)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.70867 0. 32 0.17086 0.(, ISO 8824 \(CCITT)awidthshow
133 162 gm
1.11602 0. 32 0.11160 0.(X.208\), 1987)awidthshow
165 90 gm
-0.06477 0.([IS8825/A1])ashow
165 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
181 162 gm
2.73849 0. 32 0.27384 0.(Specification of Basic Encoding Rules for ASN.1, Addendum 1:)awidthshow
197 162 gm
0.43411 0. 32 0.04341 0.(ASN.1 Extensions)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.30868 0. 32 0.03086 0.(, ISO 8825/DAD1 \(CCITT X.209\), 1988)awidthshow
229 90 gm
0.04992 0.([IS8825])ashow
229 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
245 162 gm
0.95947 0. 32 0.09594 0.(Specification of Basic Encoding Rules for ASN.1)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.89782 0. 32 0.08978 0.(, ISO 8825 \(CCITT)awidthshow
261 162 gm
1.11602 0. 32 0.11160 0.(X.209\), 1987)awidthshow
293 90 gm
0.04992 0.([IS8831])ashow
293 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
309 162 gm
-0.08871 0.(Job Transfer and Manipulation Concepts and Services)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.09454 0.(, ISO 8831, 1989)ashow
341 90 gm
0.04992 0.([IS8832])ashow
341 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
357 162 gm
2.80639 0. 32 0.28063 0.(Specification of the Basic Class Protocol for Job Transfer and)awidthshow
373 162 gm
-0.06105 0.(Manipulation)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.06155 0.(, ISO 8832, 1989)ashow
405 90 gm
0.04992 0.([IS9040])ashow
405 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
421 162 gm
-0.07232 0.(Virtual Terminal Service \320 Basic Class)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.08039 0.(, ISO 9040, 1988)ashow
453 90 gm
0.04992 0.([IS9041])ashow
453 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
469 162 gm
-0.10157 0.(Virtual Terminal Protocol \320 Basic Class)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.11189 0.(, ISO 9041, 1989)ashow
501 90 gm
0.03962 0.([IS9066-1])ashow
501 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
517 162 gm
0.67703 0. 32 0.06770 0.(Reliable Transfer, Part 1: Model and Service Definition)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.63186 0. 32 0.06318 0.(, ISO 9066-1)awidthshow
533 162 gm
0.44448 0. 32 0.04444 0.(\(CCITT X.218\), 1989)awidthshow
565 90 gm
0.03962 0.([IS9066-2])ashow
565 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
581 162 gm
0.19226 0. 32 0.01922 0.(Reliable Transfer, Part 2: Protocol Specification)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.17517 0. 32 0.01751 0.(, ISO 9066-2 \(CCITT)awidthshow
597 162 gm
1.11602 0. 32 0.11160 0.(X.228\), 1989)awidthshow
629 90 gm
0.03962 0.([IS9072-1])ashow
629 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
645 162 gm
0.89385 0. 32 0.08938 0.(Remote Operations, Part 1: Model, Notation and Service Definition)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(,)show
661 162 gm
0.19836 0. 32 0.01983 0.(ISO 9072-1 \(CCITT X.219\), 1989)awidthshow
693 90 gm
0.03962 0.([IS9072-2])ashow
693 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
709 162 gm
-0.08454 0.(Remote Operations, Part 2: Protocol Specification)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.09809 0.(, ISO 9072-2 \(CCITT)ashow
725 162 gm
1.11602 0. 32 0.11160 0.(X.229\), 1989)awidthshow
F T cp
%%Page: ? 10
op
30 28 xl
1 1 pen
45 288 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(122)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 452 gm
-0.07005 0.(Bibliography)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.03962 0.([IS9314-1])ashow
101 162 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.02241 0.(Fiber Distributed Data Interface, Part 1: Physical Layer Protocol)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.02899 0.(, ISO)ashow
117 162 gm
0.47943 0. 32 0.04794 0.(9314-1, 1989)awidthshow
149 90 gm
0.03962 0.([IS9314-2])ashow
149 162 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.02807 0. 32 0.00280 0.(Fiber Distributed Data Interface, Part 2: Medium Access Control)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(, ISO)show
165 162 gm
0.47943 0. 32 0.04794 0.(9314-2, 1989)awidthshow
197 90 gm
0.03962 0.([IS9314-3])ashow
197 162 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.86126 0. 32 0.18612 0.(Fiber Distributed Data Interface, Part 3: Physical Layer Medium)awidthshow
213 162 gm
-0.02159 0.(Dependent)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.02041 0.(, ISO DIS 9314-3, 1990)ashow
245 90 gm
0.03962 0.([IS9314-4])ashow
245 162 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.43746 0. 32 0.04374 0.(Fiber Distributed Data Interface, Part 3: Single Mode Fiber/Physical)awidthshow
261 162 gm
-0.04675 0.(Layer Medium Dependent)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.04542 0.(, ISO DP 9314-4, 1990)ashow
293 90 gm
0.03962 0.([IS9314-5])ashow
293 162 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.17536 0.(Fiber Distributed Data Interface, Part 5: Hybrid Ring Control \(FDDI II\))ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(,)show
309 162 gm
0.07186 0. 32 0.00718 0.(ISO DP 9314-5, 1990)awidthshow
341 90 gm
-0.06477 0.([IS9545/A1])ashow
341 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
357 162 gm
0.42877 0. 32 0.04287 0.(Application Layer Structure, Addendum 1: Connectionless Operation)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(,)show
373 162 gm
-0.05822 0.(ISO DIS 9545/PDAD1 \(working draft\), 1989)ashow
405 90 gm
0.04992 0.([IS9545])ashow
405 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
421 162 gm
-0.04086 0.(Application Layer Structure)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.04542 0.(, ISO DIS 9545 \(CCITT X.200\), 1989)ashow
453 90 gm
0.04992 0.([IS9549])ashow
453 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
469 162 gm
-0.01858 0.(Connectionless Session Protocol)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.02017 0.(, ISO DIS 9549, 1988)ashow
501 90 gm
0.04992 0.([IS9576])ashow
501 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
517 162 gm
1.52999 0. 32 0.15299 0.(Connectionless Presentation Protocol Specification)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.87005 0. 32 0.08700 0.(, ISO DIS 9576,)awidthshow
533 162 gm
(1989)show
565 90 gm
0.03962 0.([IS9579-1])ashow
565 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
581 162 gm
-0.14389 0.(Remote Database Access, Part 1: General Model, Services and Protocol)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(,)show
597 162 gm
0.07385 0. 32 0.00738 0.(ISO DP 9579, 1990)awidthshow
629 90 gm
0.03962 0.([IS9579-2])ashow
629 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
645 162 gm
1.23535 0. 32 0.12353 0.(Remote Database Access, Part 2: SQL Specification)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.91934 0. 32 0.09193 0.(, ISO DP 9579,)awidthshow
661 162 gm
(1990)show
693 90 gm
0.03962 0.([IS9594-1])ashow
693 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
709 162 gm
1.07940 0. 32 0.10794 0.(The Directory, Part 1: Overview of Concepts, Models and Services)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(,)show
725 162 gm
0.12557 0. 32 0.01255 0.(ISO 9594-1 \(CCITT X.500\), Dec. 1988)awidthshow
F T cp
%%Page: ? 11
op
30 28 xl
1 1 pen
45 288 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(123)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 452 gm
-0.07005 0.(Bibliography)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.03962 0.([IS9594-8])ashow
101 162 gm
0.65429 0. 32 0.06542 0.(ISO, Information processing systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.84991 0. 32 0.08499 0.(Open Systems Interconnection,)awidthshow
117 162 gm
0.10162 0. 32 0.01016 0.(The Directory, Part 8: Authentication framework)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.09017 0. 32 0.00901 0.(, ISO 9594-8 \(CCITT)awidthshow
133 162 gm
0.56335 0. 32 0.05633 0.(X.509\), Dec. 1988)awidthshow
165 90 gm
0.04992 0.([IS9595])ashow
165 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
181 162 gm
0.86669 0. 32 0.08666 0.(Common Management Information Service Definition, Part 1: Over-)awidthshow
197 162 gm
0.10226 0.(view)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.32989 0. 32 0.03298 0.(, ISO DIS 9595, 1989)awidthshow
229 90 gm
0.04992 0.([IS9596])ashow
229 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
245 162 gm
-0.05607 0.(Common Management Information Protocol \(CMIP\) Specification)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.06541 0.(, ISO)ashow
261 162 gm
0.20401 0. 32 0.02040 0.(DIS 9596, 1989)awidthshow
293 90 gm
0.04992 0.([IS9796])ashow
293 162 gm
0.15686 0. 32 0.01568 0.(ISO, Information Technology, Security Techniques, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.14907 0. 32 0.01490 0.(A Signature Algo-)awidthshow
309 162 gm
-0.00703 0.(rithm for Short Messages)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.00776 0.(, ISO DP 9796, 1990)ashow
341 90 gm
0.04992 0.([IS9797])ashow
341 162 gm
0.77163 0. 32 0.07716 0.(ISO, Information Technology, Security Techniques, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.68466 0. 32 0.06846 0.(A Data Integrity)awidthshow
357 162 gm
(Mechanism)show
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(, ISO DP 9797, 1990)show
389 90 gm
0.03962 0.([IS9798-1])ashow
389 162 gm
0.08300 0. 32 0.00830 0.(ISO, Information Technology, Security Techniques, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.10650 0. 32 0.01065 0.(Entity Authentica-)awidthshow
405 162 gm
1.52099 0. 32 0.15209 0.(tion Mechanisms, Part 1: General Model for Entity Authentication)awidthshow
421 162 gm
-0.00869 0.(Mechanisms)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.00796 0.(, ISO/IEC DIS 9798-1, 1990)ashow
453 90 gm
0.03962 0.([IS9798-2])ashow
453 162 gm
0.08300 0. 32 0.00830 0.(ISO, Information Technology, Security Techniques, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.10650 0. 32 0.01065 0.(Entity Authentica-)awidthshow
469 162 gm
0.53527 0. 32 0.05352 0.(tion Mechanisms, Part 2: Entity Authentication Using Symmetric Key)awidthshow
485 162 gm
(Techniques)show
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(, ISO/IEC DIS 9798-2, 1990)show
517 90 gm
0.03962 0.([IS9798-3])ashow
517 162 gm
0.08300 0. 32 0.00830 0.(ISO, Information Technology, Security Techniques, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.10650 0. 32 0.01065 0.(Entity Authentica-)awidthshow
533 162 gm
1.17370 0. 32 0.11737 0.(tion Mechanisms, Part 3: Entity Authentication Using a Public Key)awidthshow
549 162 gm
-0.00915 0.(Algorithm)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.00950 0.(, ISO/IEC CD 9798-3, 1990)ashow
581 90 gm
0.04992 0.([IS9799])ashow
581 162 gm
-0.06179 0.(ISO, Information Processing Systems, )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.06309 0.(Peer Entity Authentication Using)ashow
597 162 gm
1.09039 0. 32 0.10903 0.(a Public-Key Algorithm with a Two-Way Handshake)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.78918 0. 32 0.07891 0.(, ISO DP 9799,)awidthshow
613 162 gm
(1988)show
645 90 gm
0.03561 0.([IS10000-1])ashow
645 162 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.09222 0.(International Standardized Profiles, Part 1: Taxonomy Framework)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.11390 0.(, ISO)ashow
661 162 gm
0.19210 0. 32 0.01921 0.(TR 10000-1, 1990)awidthshow
693 90 gm
0.03561 0.([IS10000-2])ashow
693 162 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.00863 0.(International Standardized Profiles, Part 2: Taxonomy of Profiles)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(, ISO)show
709 162 gm
0.19210 0. 32 0.01921 0.(TR 10000-2, 1990)awidthshow
741 90 gm
0.04370 0.([IS10035])ashow
741 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
757 162 gm
-0.03579 0.(Connectionless ACSE Protocol Specification)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.03857 0.(, ISO DIS 10035, 1989)ashow
F T cp
%%Page: ? 12
op
30 28 xl
1 1 pen
45 288 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(124)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 452 gm
-0.07005 0.(Bibliography)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.04370 0.([IS10040])ashow
101 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
117 162 gm
0.85403 0. 32 0.08540 0.(Systems Management Overview)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.57952 0. 32 0.05795 0.(, ISO/IEC DP 10040 \(CCITT X.701\),)awidthshow
133 162 gm
0.41809 0. 32 0.04180 0.(1990, June 16, 1990)awidthshow
165 90 gm
0.04370 0.([IS10116])ashow
165 162 gm
0.51284 0. 32 0.05128 0.(ISO, Information Technology, Security Techniques, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.48812 0. 32 0.04881 0.(Modes of Opera-)awidthshow
181 162 gm
-0.02917 0.(tion for an N-bit Block Cipher Algorithm)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.03297 0.(, ISO/IEC DIS 10116, 1990)ashow
209 90 gm
0.03561 0.([IS10118-1])ashow
209 162 gm
0.95520 0. 32 0.09552 0.(ISO, Information Technology, Security Techniques, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.25167 0. 32 0.12516 0.(Hash Functions)awidthshow
223 162 gm
-0.03648 0.(for Digital Signatures, Part 1: General)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.04087 0.(, ISO/IEC CD 10118-1, June 21,)ashow
237 162 gm
(1990)show
265 90 gm
0.03561 0.([IS10118-2])ashow
265 162 gm
0.95520 0. 32 0.09552 0.(ISO, Information Technology, Security Techniques, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.25167 0. 32 0.12516 0.(Hash Functions)awidthshow
279 162 gm
-0.07142 0.(for Digital Signatures, Part 2: Hash Functions using a Symmetric Block)ashow
293 162 gm
-0.01255 0.(Cipher Algorithm)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.01277 0.(, ISO/IEC CD 10118-2, June 21, 1990)ashow
325 90 gm
0.03561 0.([IS10164-7])ashow
325 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
341 162 gm
1.69586 0. 32 0.16958 0.(Systems Management, Part 7: Security Alarm Reporting Function)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(,)show
357 162 gm
0.07812 0. 32 0.00781 0.(ISO/IEC DIS 10164-7 \(CCITT X.736\), Soeul, May 21-22, 1990)awidthshow
389 90 gm
0.03561 0.([IS10164-8])ashow
389 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
405 162 gm
0.36575 0. 32 0.03657 0.(Systems Management, Part 8: Security Audit Trail Function)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.42922 0. 32 0.04292 0.(, ISO/IEC)awidthshow
421 162 gm
0.20034 0. 32 0.02003 0.(DIS 10164-8 \(CCITT X.740\), Soeul, June 1990)awidthshow
453 90 gm
0.03561 0.([IS10164-9])ashow
453 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
469 162 gm
2.45925 0. 32 0.24592 0.(Systems Management, Part 9: Objects and Attributes for Access)awidthshow
485 162 gm
0.01203 0.(Control)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.04791 0. 32 0.00479 0.(, ISO/IEC DIS 10164-9 \(CCITT X.741\), Soeul, June 1990)awidthshow
517 90 gm
0.03561 0.([IS10165-1])ashow
517 162 gm
0.46524 0. 32 0.04652 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59555 0. 32 0.05955 0.(Open Systems Interconnection,)awidthshow
533 162 gm
-0.10981 0.(Structure of Management Information, Part 1: Management Information)ashow
549 162 gm
0.05528 0.(Model)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.18692 0. 32 0.01869 0.(, ISO/IEC DIS 10165-1 \(CCITT X.720\), Paris, Jan. 1990)awidthshow
581 90 gm
0.04370 0.([IS10167])ashow
581 162 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.31127 0. 32 0.03112 0.(Guidelines for the Application of Estelle, LOTOS, and SDL)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.27999 0. 32 0.02799 0.(, ISO DTR)awidthshow
597 162 gm
0.52642 0. 32 0.05264 0.(8807, 1990)awidthshow
629 90 gm
0.03561 0.([IS10181-1])ashow
629 162 gm
1.22192 0. 32 0.12219 0.(ISO, Information Technology, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.00936 0. 32 0.10093 0.(OSI Security Model, Part 1: Security)awidthshow
645 162 gm
-0.02781 0.(Framework)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.02583 0.(, ISO DP 10181-1)ashow
677 90 gm
0.03561 0.([IS10181-2])ashow
677 162 gm
0.79589 0. 32 0.07958 0.(ISO, Information Technology, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.66940 0. 32 0.06694 0.(OSI Security Model, Part 2: Authenti-)awidthshow
693 162 gm
-0.08332 0.(cation Framework)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.08656 0.(, ISO DP 10181-1)ashow
725 90 gm
-0.09136 0.([ISO90a])ashow
725 162 gm
0.34103 0. 32 0.03410 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.31158 0. 32 0.03115 0.(Proposed Draft for End System)awidthshow
741 162 gm
0.35079 0. 32 0.03507 0.(to End System Security Protocol)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.34622 0. 32 0.03462 0.(, 2nd version, ISO/IEC JTC1/SC6, 27)awidthshow
757 162 gm
0.52566 0. 32 0.05256 0.(July, 1990)awidthshow
F T cp
%%Page: ? 13
op
30 28 xl
1 1 pen
45 288 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(125)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 452 gm
-0.07005 0.(Bibliography)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.04473 0.([ISO90b])ashow
101 162 gm
0.26779 0. 32 0.02677 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.21484 0. 32 0.02148 0.(Appendix B to UK Proposal for)awidthshow
117 162 gm
0.34225 0. 32 0.03422 0.(Network Layer End System to End System Security Protocol)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.42999 0. 32 0.04299 0.(, ISO/IEC)awidthshow
133 162 gm
0.38238 0. 32 0.03823 0.(JTC1/SC6, July 27, 1990)awidthshow
165 90 gm
-0.09136 0.([ISO90c])ashow
165 162 gm
1.91940 0. 32 0.19194 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.91070 0. 32 0.19107 0.(OSI Upper Layers Security)awidthshow
181 162 gm
0.31553 0.(Model)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.21307 0. 32 0.12130 0.(, fourth working draft, ISO/IEC JTC1/SC21 N5447, ISO/IEC)awidthshow
197 162 gm
1.11679 0. 32 0.11167 0.(JTC1/SC21/WG6 and CCITT Question 19/VII Collaborative ad hoc)awidthshow
213 162 gm
-0.06092 0.(Meeting on Security in Berlin, Oct. 30, 1990)ashow
245 90 gm
-0.04473 0.([ISO90d])ashow
245 162 gm
0.12603 0. 32 0.01260 0.(ISO, Information Processing Systems, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.13549 0. 32 0.01354 0.(Working Draft Integrity Frame-)awidthshow
261 162 gm
0.06390 0.(work)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.24520 0. 32 0.02452 0.(, ISO/IEC JTC1/SC21 N5047, July 1990)awidthshow
293 90 gm
-0.09136 0.([ISO90e])ashow
293 162 gm
-0.00869 0.(ISO, Information Processing Systems, )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.00959 0.(Working Draft Non-Repudiation)ashow
309 162 gm
0.03312 0.(Framework)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.12298 0. 32 0.01229 0.(, ISO/IEC JTC1/SC21 N5046, July, 1990)awidthshow
341 90 gm
-0.04380 0.([ISO90f])ashow
341 162 gm
0.84091 0. 32 0.08409 0.(D. Kim, Y. Kim, H. Shin, H. Choi, T. Park, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.29287 0. 32 0.12928 0.(Proposal of a Common)awidthshow
357 162 gm
2.00332 0. 32 0.20033 0.(Security Service Element in the OSI Application Layer)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.65634 0. 32 0.16563 0.(,  ISO/IEC)awidthshow
373 162 gm
-0.01795 0.(JTC1/SC21 N5002 Attachment, Sep. 1990)ashow
405 90 gm
([ITS90])show
405 162 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
3.67599 0. 32 0.36759 0.(Information Technology Security Evaluation Criteria \(ITSEC\),)awidthshow
421 162 gm
1.27655 0. 32 0.12765 0.(Harmonised Criteria of France \320 Germany \320 the Netherlands \320\312the)awidthshow
437 162 gm
0.19393 0. 32 0.01939 0.(United Kingdom)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.09735 0. 32 0.00973 0.(, Draft, May 2, 1990)awidthshow
469 90 gm
([Kar86])show
469 162 gm
-0.01637 0.(A. Karila, )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.01905 0.(Portable Protocol Development and Run-Time Environment)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(,)show
485 162 gm
-0.02189 0.(Licentiate's thesis, Helsinki University of Technology, Apr. 1986)ashow
517 90 gm
([Kar87])show
517 162 gm
0.58258 0. 32 0.05825 0.(A. Karila, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.81726 0. 32 0.08172 0.(C-VOPS \320 A Portable Environment for Protocol Develop-)awidthshow
533 162 gm
2.61917 0. 32 0.26191 0.(ment and Implementation)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.98928 0. 32 0.19892 0.(, Proceedings of IFIP TC6 International)awidthshow
549 162 gm
3.19961 0. 32 0.31996 0.(Conference on Information Network and Data Communication,)awidthshow
565 162 gm
0.32730 0. 32 0.03273 0.(Sweden, May 11-14, 1986, North Holland, 1987, pp. 19-34)awidthshow
597 90 gm
-0.05162 0.([Kat90])ashow
597 162 gm
0.44586 0. 32 0.04458 0.(Dave Katz, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.54626 0. 32 0.05462 0.(The Use of Connectionless Network Layer Protocols over)awidthshow
613 162 gm
1.61270 0. 32 0.16127 0.(FDDI Networks)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.15509 0. 32 0.11550 0.(, ACM Computer Communication Review, Vol. 20,)awidthshow
629 162 gm
0.57144 0. 32 0.05714 0.(No. 3, July 1990, pp. 32-45)awidthshow
661 90 gm
([Ken89])show
661 162 gm
1.06170 0. 32 0.10617 0.(S. Kent, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.66259 0. 32 0.16625 0.(Comments on "Security Problems in the TCP/IP Protocol)awidthshow
677 162 gm
0.11592 0.(Suite")ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.50033 0. 32 0.05003 0.(, ACM Computer Communication Review, Vol. 19, No. 3, July)awidthshow
693 162 gm
0.59036 0. 32 0.05903 0.(1989, pp. 10-19)awidthshow
725 90 gm
([KHA90])show
725 162 gm
1.49414 0. 32 0.14941 0.(A. Karila, J. Harju, I. Airaksinen, M. Siev\212nen, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
2.65884 0. 32 0.26588 0.(Inserting Security)awidthshow
741 162 gm
0.19592 0. 32 0.01959 0.(Mechanisms into OSI Layers \320 a Case Study)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.28900 0. 32 0.02890 0.(, Lappeenranta University)awidthshow
757 162 gm
-0.01718 0.(of Technology, 1990)ashow
F T cp
%%Page: ? 14
op
30 28 xl
1 1 pen
45 288 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(126)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 452 gm
-0.07005 0.(Bibliography)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.05824 0.([KLP83])ashow
101 162 gm
2.45834 0. 32 0.24583 0.(A. Karila, K. L\214ng, P. Pulli, Tietoliikennesovittimen toiminta ja)awidthshow
117 162 gm
0.26535 0. 32 0.02653 0.(rakenne, \()awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.25085 0. 32 0.02508 0.(Functional Specification and Structure of a Transport Layer)awidthshow
133 162 gm
0.05635 0.(Gateway)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.19561 0. 32 0.01956 0.(, in Finnish\), Technical Research Centre of Finland, Research)awidthshow
149 162 gm
0.49346 0. 32 0.04934 0.(Notes 252, 1983, 94 p.)awidthshow
181 90 gm
-0.06323 0.([KM91])ashow
181 162 gm
1.55349 0. 32 0.15534 0.(J. Koivisto, J. Malka, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
2.21740 0. 32 0.22174 0.(DVOPS \320 An Object-Oriented Approach to)awidthshow
197 162 gm
0.35278 0. 32 0.03527 0.(Distributed Computation)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.18371 0. 32 0.01837 0.(, to be presented in the Usenix'91 conference,)awidthshow
213 162 gm
-0.08624 0.(Technical Research Centre of Finland, January 1991)ashow
245 90 gm
([Koi87])show
245 162 gm
0.31448 0. 32 0.03144 0.(J. Koivisto, Sovelluskerroksen tietoyksik\232iden automaattinen k\212sittely)awidthshow
261 162 gm
0.06896 0. 32 0.00689 0.(standardikuvauskielen perusteella, \()awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.06118 0. 32 0.00611 0.(Automatic Handling of Application)awidthshow
277 162 gm
1.99279 0. 32 0.19927 0.(Layer Data Units Based on a Standard Description Language)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.08078 0. 32 0.10807 0.(, in)awidthshow
293 162 gm
0.38269 0. 32 0.03826 0.(Finnish\), Master's Thesis, Helsinki University of Technology, Depart-)awidthshow
309 162 gm
-0.06513 0.(ment of Technical Physics, 1987)ashow
341 90 gm
-0.10711 0.([Lan81])ashow
341 162 gm
-0.02465 0.(C. Landwehr, )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.02462 0.(Formal Models for Computer Security)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.03013 0.(, ACM Computing)ashow
357 162 gm
0.57937 0. 32 0.05793 0.(Surveys, Vol. 13, No. 3, Sept. 1981, pp. 247-278)awidthshow
389 90 gm
-0.05154 0.([LLH89])ashow
389 162 gm
1.73812 0. 32 0.17381 0.(C.-S.Laih, J.-Y. Lee, L. Harn, Y.-K. Su, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
2.72842 0. 32 0.27284 0.(Linearly Shift Knapsack)awidthshow
405 162 gm
1.59622 0. 32 0.15962 0.(Public-Key Cryptosystem)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.73791 0. 32 0.07379 0.(,  IEEE Journal on Selected Areas in Com-)awidthshow
421 162 gm
0.28884 0. 32 0.02888 0.(munications, Vol. 7, No. 4, May 1989, pp. 534-547)awidthshow
453 90 gm
([LS90])show
453 162 gm
2.95989 0. 32 0.29598 0.(W.-P. Lu, M. Sundareshan, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
2.87902 0. 32 0.28790 0.(A Model for Multilevel Security in)awidthshow
469 162 gm
-0.00917 0.(Computer Networks)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.00830 0.(, IEEE Transactions on Software Engineering, Vol.)ashow
485 162 gm
0.58166 0. 32 0.05816 0.(16, No. 6, June 1990, pp. 647-659)awidthshow
517 90 gm
-0.12931 0.([LT90])ashow
517 162 gm
1.06155 0. 32 0.10615 0.(L. Landweber, M. Tasman, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.26434 0. 32 0.12643 0.(An ISO TP4-TP0 Gateway)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.13082 0. 32 0.11308 0.(, ACM Com-)awidthshow
533 162 gm
0.08468 0. 32 0.00846 0.(puter Communication Review, Vol. 20, No. 2, April 1990, pp. 16-21)awidthshow
565 90 gm
-0.10771 0.([Mas88])ashow
565 162 gm
0.27603 0. 32 0.02760 0.(J. Massey, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.42800 0. 32 0.04280 0.(An Introduction to Contemporary Cryptology)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.47164 0. 32 0.04716 0.(, Proceedings)awidthshow
581 162 gm
0.24932 0. 32 0.02493 0.(of the IEEE, Vol. 76, No. 5, May 1988, pp. 533-549)awidthshow
613 90 gm
-0.16213 0.([Mer89])ashow
613 162 gm
2.34085 0. 32 0.23408 0.(R. Merkle, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
2.81539 0. 32 0.28153 0.(One Way Hash Functions and DES)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
2.94540 0. 32 0.29454 0.(, Proceedings of)awidthshow
629 162 gm
0.15930 0. 32 0.01593 0.(Crypto'89, Santa Barbara, October, 1989)awidthshow
661 90 gm
-0.06323 0.([MH78])ashow
661 162 gm
2.63977 0. 32 0.26397 0.(R. Merkle, M. Hellman, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
3.38897 0. 32 0.33889 0.(Hiding Information and Signatures in)awidthshow
677 162 gm
1.01150 0. 32 0.10115 0.(Trapdoor Knapsack)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.63186 0. 32 0.06318 0.(, IEEE Transactions on Information Theory, Vol.)awidthshow
693 162 gm
0.54321 0. 32 0.05432 0.(IT-24, Sep. 1978, pp. 525-530)awidthshow
725 90 gm
-0.22019 0.([Mit90])ashow
725 162 gm
0.18539 0. 32 0.01853 0.(C. Mitchell, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.21972 0. 32 0.02197 0.(OSI and X.400 Security)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.27679 0. 32 0.02767 0.(, Telecommunications, May 1990,)awidthshow
741 162 gm
0.55953 0. 32 0.05595 0.(pp. 49-54)awidthshow
F T cp
%%Page: ? 15
op
30 28 xl
1 1 pen
45 288 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(127)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 452 gm
-0.07005 0.(Bibliography)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.26405 0.([MM83])ashow
101 162 gm
0.48110 0. 32 0.04811 0.(R. DeMillo, M. Merritt, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.61218 0. 32 0.06121 0.(Protocols for Data Security)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.64056 0. 32 0.06405 0.(, IEEE Computer)awidthshow
117 162 gm
0.24719 0. 32 0.02471 0.(Magazine, Feb. 1983, pp. 39-51)awidthshow
149 90 gm
-0.21830 0.([MOI90])ashow
149 162 gm
1.33514 0. 32 0.13351 0.(S. Miyaguchi, K. Ohta, M. Iwata, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.90551 0. 32 0.19055 0.(128-bit hash function \(N-Hash\))awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(,)show
165 162 gm
-0.02880 0.(proceedings of SECURICOM90, Paris, March 1990)ashow
197 90 gm
-0.10890 0.([Moo88])ashow
197 162 gm
1.39495 0. 32 0.13949 0.(J. Moore, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
2.29766 0. 32 0.22976 0.(Protocol Failures in Cryptosystems)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.67282 0. 32 0.16728 0.(, Proceedings of the)awidthshow
213 162 gm
0.35827 0. 32 0.03582 0.(IEEE, Vol. 76, No. 5, May 1988, pp. 594-602)awidthshow
245 90 gm
-0.19671 0.([MT79])ashow
245 162 gm
2.90481 0. 32 0.29048 0.(R. Morris, K. Thompson, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
3.47229 0. 32 0.34722 0.(Password Security: A Case History)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(,)show
261 162 gm
0.09292 0. 32 0.00929 0.(Communications of the ACM, Vol. 22, Nov. 1979, pp. 594-597)awidthshow
293 90 gm
-0.16384 0.([MWR89])ashow
293 162 gm
1.00189 0. 32 0.10018 0.(C. Mitchell, M. Walker, D. Rush, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.53762 0. 32 0.15376 0.(CCITT/ISO Standards for Secure)awidthshow
309 162 gm
1.45858 0. 32 0.14585 0.(Message Handling)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.86868 0. 32 0.08686 0.(, IEEE Journal on Selected Areas in Communica-)awidthshow
325 162 gm
0.41137 0. 32 0.04113 0.(tions, Vol. 7, No. 4, May 1989, pp. 517-524)awidthshow
357 90 gm
0.11260 0.([NCS87])ashow
357 162 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
2.26898 0. 32 0.22689 0.(Trusted Network Interpretation of the Trusted Computer Systems)awidthshow
373 162 gm
1.63879 0. 32 0.16387 0.(Evaluation Criteria)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.26663 0. 32 0.12666 0.(, NCSG-TG-005, Version 1, National Computer)awidthshow
389 162 gm
(Security Center, USA July 31, 1987)show
421 90 gm
-0.05162 0.([Nel88])ashow
421 162 gm
0.10147 0. 32 0.01014 0.(R. Nelson, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.15121 0. 32 0.01512 0.(SDNS Services and Architecture)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.11657 0. 32 0.01165 0.(, 1988)awidthshow
453 90 gm
0.05955 0.([Nes90])ashow
453 162 gm
1.31118 0. 32 0.13111 0.(D. Nessett: )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.48422 0. 32 0.14842 0.(A Critique of the Burrows, Abadi and Needham Logic)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(,)show
469 162 gm
-0.08979 0.(ACM Operating Systems Review, 1990)ashow
501 90 gm
0.05841 0.([Nok90])ashow
501 162 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.75347 0. 32 0.07534 0.(How to Use CASN Compiler for Implementation of a Virtual Task in)awidthshow
517 162 gm
0.01071 0.(CVOPS)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.02960 0. 32 0.00296 0.(, Ver. 1.0, Technical Report, Nokia Research Centre, 1990)awidthshow
549 90 gm
0.13592 0.([NS78])ashow
549 162 gm
1.22756 0. 32 0.12275 0.(R. Needham, R. Schroeder, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.46911 0. 32 0.14691 0.(Using Encryption for Authentication in)awidthshow
565 162 gm
0.22781 0. 32 0.02278 0.(Large Networks of Computers)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.18096 0. 32 0.01809 0.(, Communications of the ACM, Vol. 21,)awidthshow
581 162 gm
0.50979 0. 32 0.05097 0.(No. 12, Dec. 1978, pp. 993-999)awidthshow
613 90 gm
0.13592 0.([NS87])ashow
613 162 gm
0.32958 0. 32 0.03295 0.(R. Needham, R. Schroeder, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.55908 0. 32 0.05590 0.(Authentication Revisited)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.40069 0. 32 0.04006 0.(, ACM Operating)awidthshow
629 162 gm
0.49224 0. 32 0.04922 0.(Systems Review, Vol. 21, No. 1, Jan. 1987, p. 7)awidthshow
661 90 gm
0.13592 0.([NS89])ashow
661 162 gm
0.50994 0. 32 0.05099 0.(K. Nakao, K. Suzuki, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.72204 0. 32 0.07220 0.(Proposal on a Secure Communications Service)awidthshow
677 162 gm
2.61611 0. 32 0.26161 0.(Element \(SCSE\) in the OSI Application Layer)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
2.27905 0. 32 0.22790 0.(, IEEE Journal on)awidthshow
693 162 gm
0.19348 0. 32 0.01934 0.(Selected Areas in Communications, Vol. 7, No. 4, May 1989, pp. 505-)awidthshow
709 162 gm
(516)show
741 90 gm
-0.13064 0.([OR87])ashow
741 162 gm
0.16494 0. 32 0.01649 0.(D. Otway, O. Rees, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.25619 0. 32 0.02561 0.(Efficient and Timely Mutual Authentication)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.23971 0. 32 0.02397 0.(, ACM)awidthshow
757 162 gm
0.29525 0. 32 0.02952 0.(Operating Systems Review, Vol. 21, No. 1, Jan. 1987, pp. 8-10)awidthshow
F T cp
%%Page: ? 16
op
30 28 xl
1 1 pen
45 288 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(128)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 452 gm
-0.07005 0.(Bibliography)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.19587 0.([OT89])ashow
101 162 gm
0.28854 0. 32 0.02885 0.(E. Okamoto, K. Tanaka, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.35339 0. 32 0.03533 0.(Key Distribution System Based on Identifica-)awidthshow
117 162 gm
-0.00354 0.(tion Information)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.00370 0.(,  IEEE Journal on Selected Areas in Communications,)ashow
133 162 gm
0.41473 0. 32 0.04147 0.(Vol. 7, No. 4, May 1989, pp. 481-485)awidthshow
165 90 gm
([Par90])show
165 162 gm
0.16921 0. 32 0.01692 0.(G. Parulkar, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.22567 0. 32 0.02256 0.(The Next Generation of Internetworking)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.23284 0. 32 0.02328 0.(, ACM Computer)awidthshow
181 162 gm
0.29769 0. 32 0.02976 0.(Communication Review, Vol. 20, No. 1, Jan. 1990, pp. 18-43)awidthshow
213 90 gm
-0.05290 0.([Pat87])ashow
213 162 gm
0.77713 0. 32 0.07771 0.(W. Patterson: )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.00936 0. 32 0.10093 0.(Mathematical Cryptology for Computer Scientists and)awidthshow
229 162 gm
-0.14939 0.(Mathematicians)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.14292 0.(, Rowman & Littlefield, 1987)ashow
261 90 gm
0.13592 0.([PK79])ashow
261 162 gm
0.09826 0. 32 0.00982 0.(G. Popek, C. Kline, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.16052 0. 32 0.01605 0.(Encryption and Secure Computer Networks)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.14419 0. 32 0.01441 0.(, ACM)awidthshow
277 162 gm
0.36773 0. 32 0.03677 0.(Computing Surveys, Vol. 11, No. 4, Dec. 1979, pp. 331-356)awidthshow
309 90 gm
0.13592 0.([PK90])ashow
309 162 gm
1.75521 0. 32 0.17552 0.(D. Piscitello, M. Kramer, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
2.65197 0. 32 0.26519 0.(Internetworking Using Switched Multi-)awidthshow
325 162 gm
2.51037 0. 32 0.25103 0.(megabit Data Service in TCP/IP Environments)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
2.64434 0. 32 0.26443 0.(, ACM Computer)awidthshow
341 162 gm
0.22903 0. 32 0.02290 0.(Communication Review, Vol. 20, No. 3, July 1990, pp. 62-71)awidthshow
373 90 gm
0.11314 0.([PSI90])ashow
373 162 gm
0.29281 0. 32 0.02928 0.(PSI Inc., )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.59448 0. 32 0.05944 0.(ISODE 6.0 Announcement)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.34088 0. 32 0.03408 0.(, Jan. 1990)awidthshow
405 90 gm
-0.06251 0.([QG90])ashow
405 162 gm
0.69503 0. 32 0.06950 0.(J.-J. Quisquater, L. Guillou, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.91552 0. 32 0.09155 0.(How to Explain Zero-Knowledge Proto-)awidthshow
421 162 gm
-0.02455 0.(cols to Your Children)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.02984 0.(, 1990)ashow
453 90 gm
([RFC81a])show
453 162 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.01690 0.(Internet Protocol)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.01890 0.(, RFC 791, Sep. 1981)ashow
485 90 gm
0.04783 0.([RFC81b])ashow
485 162 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.01380 0.(Transmission Control Protocol)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.01457 0.(, RFC 793, Sep. 1981)ashow
517 90 gm
([RFC89a])show
517 162 gm
0.89279 0. 32 0.08927 0.(J. Linn, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.47094 0. 32 0.14709 0.(Privacy Enhancement for Internet Electronic Mail: Part I:)awidthshow
533 162 gm
1.64459 0. 32 0.16445 0.(Message Encipherment and Authentication Procedures)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.09146 0. 32 0.10914 0.(, RFC 1113,)awidthshow
549 162 gm
(1989)show
581 90 gm
0.04783 0.([RFC89b])ashow
581 162 gm
-0.12692 0.(S. Kent, J. Linn, )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.14340 0.(Privacy Enhancement for Internet Electronic Mail: Part)ashow
597 162 gm
-0.06845 0.(II: Certificate-Based Key Management)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.07530 0.(, RFC 1114, 1989)ashow
629 90 gm
([RFC89c])show
629 162 gm
0.54183 0. 32 0.05418 0.(J. Linn, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.90362 0. 32 0.09036 0.(Privacy Enhancement for Internet Electronic Mail: Part III:)awidthshow
645 162 gm
0.07217 0. 32 0.00721 0.(Algorithms, Modes and Identifiers)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.05264 0. 32 0.00526 0.(, RFC 1115, 1989)awidthshow
677 90 gm
0.11260 0.([RHF90])ashow
677 162 gm
1.20452 0. 32 0.12045 0.(F. Ross, J. Hamstra, R. Fink, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.50222 0. 32 0.15022 0.(FDDI \320 A LAN Among MANs)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.82632 0. 32 0.18263 0.(, ACM)awidthshow
693 162 gm
0.38879 0. 32 0.03887 0.(Computer Communication Review, Vol. 20, No. 3, July 1990, pp. 16-)awidthshow
709 162 gm
(31)show
741 90 gm
-0.05401 0.([Riv90])ashow
741 162 gm
1.40487 0. 32 0.14048 0.(R. Rivest, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
2.10845 0. 32 0.21084 0.(The MD4 Message Digest Algorithm)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
2.03598 0. 32 0.20359 0.( \(Version 2/17/90,)awidthshow
757 162 gm
0.08407 0. 32 0.00840 0.(Revised\), ISO/IEC JTC1/SC 27/WG20.2 N193, April 4, 1990)awidthshow
F T cp
%%Page: ? 17
op
30 28 xl
1 1 pen
45 288 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(129)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 452 gm
-0.07005 0.(Bibliography)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.05711 0.([Ros90])ashow
101 162 gm
-0.00822 0.(M. Rose, )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.00807 0.(The Open Book, OSI \320 a Practical Perspective)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.00761 0.(, Prentice Hall,)ashow
117 162 gm
(1990)show
149 90 gm
-0.05398 0.([RSA78])ashow
149 162 gm
1.12152 0. 32 0.11215 0.(R. Rivest, A. Shamir, L. Adleman, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.37756 0. 32 0.13775 0.(A Method for Obtaining Digital)awidthshow
165 162 gm
1.92489 0. 32 0.19248 0.(Signatures and Public-Key Cryptosystems)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.49810 0. 32 0.14981 0.(, Communications of the)awidthshow
181 162 gm
0.49301 0. 32 0.04930 0.(ACM, Vol. 21, No. 2, Feb. 1978, pp. 120-126)awidthshow
213 90 gm
-0.05268 0.([Rue90])ashow
213 162 gm
0.34042 0. 32 0.03404 0.(R. Rueppel, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.42739 0. 32 0.04273 0.(A Formal Approach to Security Architectures)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.32333 0. 32 0.03233 0.(, preprint of)awidthshow
229 162 gm
0.91888 0. 32 0.09188 0.(paper to be presented in Eurocrypt'91, April 8 \320 11, 1991, Brighton,)awidthshow
245 162 gm
-0.01077 0.(England, dated Dec. 17, 1990)ashow
277 90 gm
-0.05268 0.([Rue91])ashow
277 162 gm
0.17532 0. 32 0.01753 0.(Lecture by and discussion with Rainer Rueppel at Helsinki University,)awidthshow
293 162 gm
-0.02400 0.(March 18, 1991)ashow
325 90 gm
-0.04417 0.([SDN89a])ashow
325 162 gm
2.07717 0. 32 0.20771 0.(SDNS, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
2.00210 0. 32 0.20021 0.(Secure Data Network Systems, Security Protocol 3 \(SP3\))awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(,)show
341 162 gm
0.27847 0. 32 0.02784 0.(Specification SDN.301, Revision 1.4, Feb. 28, 1989)awidthshow
373 90 gm
([SDN89b])show
373 162 gm
2.07717 0. 32 0.20771 0.(SDNS, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
2.00210 0. 32 0.20021 0.(Secure Data Network Systems, Security Protocol 4 \(SP4\))awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(,)show
389 162 gm
0.09704 0. 32 0.00970 0.(Specification SDN.401, Revision 1.3, May 2, 1989)awidthshow
421 90 gm
0.05824 0.([SEG90])ashow
421 162 gm
3.09341 0. 32 0.30934 0.(Security EDIFACT Group, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
3.50097 0. 32 0.35009 0.(Security Framework for EDIFACT)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(,)show
437 162 gm
0.38894 0. 32 0.03889 0.(MD4.B, Document 1.19, v. 1.0, \(draft\), 7 June, 1990)awidthshow
469 90 gm
([Sha49])show
469 162 gm
0.48812 0. 32 0.04881 0.(C. Shannon, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.66101 0. 32 0.06610 0.(Communication Theory of Secrecy Systems)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.50643 0. 32 0.05064 0.(, Bell System)awidthshow
485 162 gm
0.08956 0. 32 0.00895 0.(Technical Journal, Vol. 28, Oct. 1949, pp. 656-715)awidthshow
517 90 gm
([Sha85])show
517 162 gm
2.04086 0. 32 0.20408 0.(A. Shamir, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
3.23059 0. 32 0.32305 0.(Identity-Based Cryptosystem and Signature Scheme)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(,)show
533 162 gm
0.72952 0. 32 0.07295 0.(Advances in Cryptology: Proceedings of Crypto'84, Springer, Berlin,)awidthshow
549 162 gm
0.59036 0. 32 0.05903 0.(1985, pp. 47-53)awidthshow
581 90 gm
-0.05419 0.([Sim79])ashow
581 162 gm
3.95858 0. 32 0.39585 0.(G. Simmons, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
5.53909 0. 32 0.55390 0.(Symmetric and Asymmetric Encryption)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
4.56970 0. 32 0.45697 0.(, ACM)awidthshow
597 162 gm
0.36773 0. 32 0.03677 0.(Computing Surveys, Vol. 11, No. 4, Dec. 1979, pp. 305-330)awidthshow
629 90 gm
-0.05419 0.([Sim84])ashow
629 162 gm
1.77154 0. 32 0.17715 0.(G. Simmons, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
2.86254 0. 32 0.28625 0.(Authentication Theory/Coding Theory)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.76193 0. 32 0.17619 0.(, Advances in)awidthshow
645 162 gm
1.36932 0. 32 0.13693 0.(Cryptology, Proceedings of Crypto '84, Springer, New York, 1985,)awidthshow
661 162 gm
0.50354 0. 32 0.05035 0.(pp. 411-431)awidthshow
693 90 gm
-0.05419 0.([Sim88])ashow
693 162 gm
0.56213 0. 32 0.05621 0.(G. Simmons, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.66131 0. 32 0.06613 0.(A Survey of Information Authentication)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.60455 0. 32 0.06045 0.(, Proceedings of)awidthshow
709 162 gm
0.27282 0. 32 0.02728 0.(the IEEE, Vol. 76, No. 5, May 1988, pp. 603-620)awidthshow
F T cp
%%Page: ? 18
op
30 28 xl
1 1 pen
45 288 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(130)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 452 gm
-0.07005 0.(Bibliography)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.05419 0.([Sim89])ashow
101 162 gm
1.01623 0. 32 0.10162 0.(G. Simmons, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.96298 0. 32 0.09629 0.(A Protocol to Provide Verifiable Proof of Identity and)awidthshow
117 162 gm
0.41900 0. 32 0.04190 0.(Unforgeable Transaction Receipts)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.24154 0. 32 0.02415 0.(, IEEE Journal on Selected Areas in)awidthshow
133 162 gm
0.25665 0. 32 0.02566 0.(Communications, Vol. 7, No. 4, May 1989, pp. 435-447)awidthshow
165 90 gm
-0.06480 0.([SM87])ashow
165 162 gm
0.33859 0. 32 0.03385 0.(A. Shimizu, S. Miyaguchi, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.44616 0. 32 0.04461 0.(Fast Data Encipherment Algorithm FEAL)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(,)show
181 162 gm
-0.00250 0.(Proceedings of Eurocrypt'87, April 1987)ashow
213 90 gm
0.11260 0.([SNC88])ashow
213 162 gm
-0.00308 0.(J. Steiner, C. Neuman, J. Schiller, )ashow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.00349 0.(Kerberos: An Authentication Service)ashow
229 162 gm
0.15609 0. 32 0.01560 0.(for Open Network Systems)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.13580 0. 32 0.01358 0.(, Project Athena, MIT, 1988)awidthshow
261 90 gm
-0.21830 0.([TED89])ashow
261 162 gm
1.64901 0. 32 0.16490 0.(The TEDIS \320 EDI Security Workshop, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.93252 0. 32 0.19325 0.(Security in a Multi-Owner)awidthshow
277 162 gm
0.16564 0.(System)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.60394 0. 32 0.06039 0.(, Brussels, June 20-21, 1989)awidthshow
309 90 gm
-0.23365 0.([TED90a])ashow
309 162 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
2.30346 0. 32 0.23034 0.(TEDIS Programme 1988-1989)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.39816 0. 32 0.13981 0.(, Activity Report, Brussels, July 25,)awidthshow
325 162 gm
(1990)show
357 90 gm
-0.18713 0.([TED90b])ashow
357 162 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.44631 0. 32 0.04463 0.(Digital Signatures in EDIFACT)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.37551 0. 32 0.03755 0.(, a TEDIS programme report prepared)awidthshow
373 162 gm
-0.00614 0.(by CRYPTOMATHIC A/S, final version, Nov. 29, 1990)ashow
405 90 gm
-0.21830 0.([TTY88])ashow
405 162 gm
0.19332 0. 32 0.01933 0.(Kari L\214ng \(editor\), Tietotekniikan kehitt\212misohjelma FINPRIT: Tieto-)awidthshow
421 162 gm
0.19821 0. 32 0.01982 0.(tekniikan yhdent\212minen, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.15029 0. 32 0.01502 0.(final report \(concise version\) of the FINPRIT)awidthshow
437 162 gm
-0.06710 0.(research program)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.06324 0.( \(in Finnish\), TEKES, Helsinki, 1988)ashow
469 90 gm
-0.06251 0.([VK83])ashow
469 162 gm
1.09130 0. 32 0.10913 0.(V. Voydock, S. Kent, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.67968 0. 32 0.16796 0.(Security Mechanisms in High-Level Network)awidthshow
485 162 gm
0.04516 0.(Protocols)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.17471 0. 32 0.01747 0.(, Computing Surveys, Vol. 15, June 1983, pp. 135-171)awidthshow
517 90 gm
-0.16213 0.([Wal89])ashow
517 162 gm
0.10787 0. 32 0.01078 0.(S. Walker, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.12054 0. 32 0.01205 0.(Network Security: The Parts of the Sum)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.12054 0. 32 0.01205 0.(, Proceedings of the)awidthshow
533 162 gm
1.26663 0. 32 0.12666 0.(1989 IEEE Computer Society Symposium on Security and Privacy,)awidthshow
549 162 gm
0.26611 0. 32 0.02661 0.(Oakland, 1989, pp. 2-9)awidthshow
581 90 gm
-0.05210 0.([Woo87])ashow
581 162 gm
1.75521 0. 32 0.17552 0.(C. Wood & al., )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
3.50555 0. 32 0.35055 0.(Computer Security: A Comprehensive Controls)awidthshow
597 162 gm
0.02149 0.(Checklist)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.08499 0. 32 0.00849 0.(, Wiley, New York, 1987)awidthshow
629 90 gm
-0.05210 0.([Woo90])ashow
629 162 gm
3.19458 0. 32 0.31945 0.(C. Wood, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
4.56146 0. 32 0.45614 0.(Principles of Secure Information Systems Design)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(,)show
645 162 gm
0.34439 0. 32 0.03443 0.(Computers & Security, Vol. 9, No. 1, Feb. 1990, pp. 13-24)awidthshow
677 90 gm
0.27015 0.([X.21])ashow
677 162 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.25717 0. 32 0.12571 0.(Interface between data terminal equipment \(DTE\) and data circuit-)awidthshow
693 162 gm
-0.08351 0.(terminating-equipment \(DCE\) for synchronous operation on public data)ashow
709 162 gm
0.62528 0.(networks)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
2.57614 0. 32 0.25761 0.(, CCITT Recommendation X.21, Blue Book Vol. VIII,)awidthshow
725 162 gm
0.07003 0. 32 0.00700 0.(Fascicle VIII.2, Geneva, 1989)awidthshow
F T cp
%%Page: ? 19
op
30 28 xl
1 1 pen
45 288 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(131)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 452 gm
-0.07005 0.(Bibliography)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.27015 0.([X.25])ashow
101 162 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.25717 0. 32 0.12571 0.(Interface between data terminal equipment \(DTE\) and data circuit-)awidthshow
117 162 gm
-0.16287 0.(terminating-equipment \(DCE\) for terminals operating in the packet mode)ashow
133 162 gm
1.10412 0. 32 0.11041 0.(and connected to public data networks by dedicated circuit)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.36383 0. 32 0.13638 0.(, CCITT)awidthshow
149 162 gm
0.33416 0. 32 0.03341 0.(Recommendation X.25 \(see also ISO 7776 and ISO 8208\), Blue Book)awidthshow
165 162 gm
0.08605 0. 32 0.00860 0.(Vol. VIII, Fascicle VIII.2, Geneva, 1989)awidthshow
197 90 gm
0.22509 0.([X.200])ashow
197 162 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
3.63220 0. 32 0.36322 0.(Reference Model of Open Systems Interconnection for CCITT)awidthshow
213 162 gm
0.08099 0.(Applications)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.37155 0. 32 0.03715 0.(, CCITT Recommendation X.200 \(ISO 7498\), Blue Book)awidthshow
229 162 gm
0.08605 0. 32 0.00860 0.(Vol. VIII, Fascicle VIII.4, Geneva, 1989)awidthshow
261 90 gm
0.22509 0.([X.224])ashow
261 162 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.05635 0.(Transport Protocol Specification)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.06652 0.(, CCITT Recommendation X.224 \(ISO)ashow
277 162 gm
0.08117 0. 32 0.00811 0.(8073\), Blue Book Vol. VIII, Fascicle VIII.5, Geneva, 1989)awidthshow
309 90 gm
0.22509 0.([X.208])ashow
309 162 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
2.94281 0. 32 0.29428 0.(Specification of Abstract Syntax Notation One \(ASN.1\))awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
3.21380 0. 32 0.32138 0.(, CCITT)awidthshow
325 162 gm
0.48049 0. 32 0.04804 0.(Recommendation X.208 \(ISO 8824, ISO 8824/AD1\), Blue Book Vol.)awidthshow
341 162 gm
0.10314 0. 32 0.01031 0.(VIII, Fascicle VIII.4, Geneva, 1989)awidthshow
373 90 gm
0.22509 0.([X.209])ashow
373 162 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.07142 0.(Specification of Basic Encoding Rules for Abstract Syntax Notation One)ashow
389 162 gm
0.05513 0.(\(ASN.1\))ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.24581 0. 32 0.02458 0.(, CCITT Recommendation X.208 \(ISO 8825, ISO 8825/AD1\),)awidthshow
405 162 gm
0.00839 0. 32 0.00083 0.(Blue Book Vol. VIII, Fascicle VIII.4, Geneva, 1989)awidthshow
437 90 gm
0.22509 0.([X.210])ashow
437 162 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
(Layer Service Definition Conventions)show
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(, CCITT Recommendation X.210)show
453 162 gm
0.02746 0. 32 0.00274 0.(\(ISO TR 8509\), Blue Book Vol. VIII, Fascicle VIII.4, Geneva, 1989)awidthshow
485 90 gm
0.22509 0.([X.213])ashow
485 162 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
2.15377 0. 32 0.21537 0.(Network Service Definition for Open Systems Interconnection for)awidthshow
501 162 gm
0.55404 0. 32 0.05540 0.(CCITT Applications)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.37567 0. 32 0.03756 0.(, CCITT Recommendation X.213 \(ISO 8348, ISO)awidthshow
517 162 gm
1.56723 0. 32 0.15672 0.(8348/AD2, ISO 8348/AD3\), Blue Book Vol. VIII, Fascicle VIII.4,)awidthshow
533 162 gm
0.17044 0. 32 0.01704 0.(Geneva, 1989)awidthshow
565 90 gm
0.22509 0.([X.217])ashow
565 162 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
2.50671 0. 32 0.25067 0.(Association Control Service Definition for Open Systems Interc-)awidthshow
581 162 gm
1.36123 0. 32 0.13612 0.(onnection for CCITT Applications)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.45050 0. 32 0.14505 0.(, CCITT Recommendation X.217)awidthshow
597 162 gm
0.05203 0. 32 0.00520 0.(\(ISO 8649\), Blue Book Vol. VIII, Fascicle VIII.4, Geneva, 1989)awidthshow
629 90 gm
0.22509 0.([X.218])ashow
629 162 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.06518 0.(Reliable Transfer: Model and Service Definition)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.08303 0.(, CCITT Recommenda-)ashow
645 162 gm
2.45712 0. 32 0.24571 0.(tion X.218 \(ISO 9066-1\), Blue Book Vol. VIII, Fascicle VIII.4,)awidthshow
661 162 gm
0.17044 0. 32 0.01704 0.(Geneva, 1989)awidthshow
693 90 gm
0.22509 0.([X.219])ashow
693 162 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.88073 0. 32 0.08807 0.(Remote Operations: Model, Notation and Service Definition)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.90423 0. 32 0.09042 0.(, CCITT)awidthshow
709 162 gm
0.47317 0. 32 0.04731 0.(Recommendation X.219 \(ISO 9072-1\), Blue Book Vol. VIII, Fascicle)awidthshow
725 162 gm
0.43975 0. 32 0.04397 0.(VIII.4, Geneva, 1989)awidthshow
F T cp
%%Page: ? 20
op
30 28 xl
1 1 pen
45 288 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(132)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 452 gm
-0.07005 0.(Bibliography)ashow
101 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
0.22509 0.([X.224])ashow
101 162 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.05635 0.(Transport Protocol Specification)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.06652 0.(, CCITT Recommendation X.224 \(ISO)ashow
117 162 gm
0.08117 0. 32 0.00811 0.(8073\), Blue Book Vol. VIII, Fascicle VIII.5, Geneva, 1989)awidthshow
149 90 gm
0.22509 0.([X.227])ashow
149 162 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.22024 0. 32 0.12202 0.(Protocol Specification for the Association Control Service Element)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(,)show
165 162 gm
1.55151 0. 32 0.15515 0.(CCITT Recommendation X.227 \(ISO 8650\), Blue Book Vol. VIII,)awidthshow
181 162 gm
0.07003 0. 32 0.00700 0.(Fascicle VIII.5, Geneva, 1989)awidthshow
213 90 gm
0.22509 0.([X.228])ashow
213 162 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.12292 0.(Protocol Specification for the Reliable Transfer Service Element)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.17185 0.(, CCITT)ashow
229 162 gm
0.47317 0. 32 0.04731 0.(Recommendation X.228 \(ISO 9066-2\), Blue Book Vol. VIII, Fascicle)awidthshow
245 162 gm
0.43975 0. 32 0.04397 0.(VIII.5, Geneva, 1989)awidthshow
277 90 gm
0.22509 0.([X.229])ashow
277 162 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.48666 0. 32 0.14866 0.(Protocol Specification for the Remote Operations Service Element)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
(,)show
293 162 gm
0.81542 0. 32 0.08154 0.(CCITT Recommendation X.229 \(ISO 9072-2\), Blue Book Vol. VIII,)awidthshow
309 162 gm
0.07003 0. 32 0.00700 0.(Fascicle VIII.5, Geneva, 1989)awidthshow
341 90 gm
0.22509 0.([X.400])ashow
341 162 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.84951 0. 32 0.18495 0.(Message Handling, Part 1: System and Service Overview)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
2.10052 0. 32 0.21005 0.(, CCITT)awidthshow
357 162 gm
3.00247 0. 32 0.30024 0.(Recommendation X.400, Blue Book Vol. VIII, Fascicle VIII.7,)awidthshow
373 162 gm
0.17044 0. 32 0.01704 0.(Geneva, 1989)awidthshow
405 90 gm
0.22509 0.([X.500])ashow
405 162 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
0.47378 0. 32 0.04737 0.(The Directory \320 Overview of Concepts, Models, and Services)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.56533 0. 32 0.05653 0.(, CCITT)awidthshow
421 162 gm
1.09069 0. 32 0.10906 0.(Recommendation X.500 \(Melbourne 1988, ISO 9594-1\), Blue Book)awidthshow
437 162 gm
0.08605 0. 32 0.00860 0.(Vol. VIII, Fascicle VIII.8, Geneva, 1989)awidthshow
469 90 gm
0.22509 0.([X.509])ashow
469 162 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
-0.01351 0.(The Directory, Part 8:\312Authentication Framework)ashow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
-0.01687 0.(, CCITT Recommen-)ashow
485 162 gm
1.18942 0. 32 0.11894 0.(dation X.509 \(Melbourne 1988, ISO 9594-1\), Blue Book Vol. VIII,)awidthshow
501 162 gm
0.07003 0. 32 0.00700 0.(Fascicle VIII.8, Geneva, 1989)awidthshow
533 90 gm
0.11396 0.([Z.100])ashow
533 162 gm
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
1.58706 0. 32 0.15870 0.(Functional Specification and Description Language \(SDL\))awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
1.50024 0. 32 0.15002 0.(, CCITT)awidthshow
549 162 gm
1.67098 0. 32 0.16709 0.(\312Recommendations Z.100 and Z.110,  Blue Book Vol. X, Fascicle)awidthshow
565 162 gm
0.74874 0. 32 0.07487 0.(X.1, Geneva, 1989)awidthshow
597 90 gm
-0.12931 0.([ZE90])ashow
597 162 gm
1.71463 0. 32 0.17146 0.(R. Zamparo, G. Endersz, )awidthshow
2 fs
bu fc
2 F /|______Times-Italic fnt
bn
2.19467 0. 32 0.21946 0.(Architecture and Testbed Realization of)awidthshow
613 162 gm
0.66833 0. 32 0.06683 0.(Security Services in an OSI Communication Environment)awidthshow
0 fs
bu fc
2 F /|______Times-Roman fnt
bn
0.48736 0. 32 0.04873 0.(, preprint of)awidthshow
629 162 gm
-0.00457 0.(presentation at ICCC in Nov. 1990 at New Delhi, Sep. 4, 1990)ashow
F T cp
%%Trailer
cd
end
%%Pages: 20 0

% Next: Glossary

%!PS-Adobe-2.0
%%Title: Glossary
%%Creator: NoWord
%%Pages: (atend)
%%BoundingBox: ? ? ? ?
%%PageBoundingBox: 28 30 566 811
%%For: AriA
%%IncludeProcSet: "(AppleDict md)" 68 0
%%EndComments
%%EndProlog
%%BeginDocumentSetup
md begin

T T -30 -28 811 566 100 72 72 3 F F F F T T T psu
(AriA; document: Glossary)jn
0 mf
od
%%EndDocumentSetup
%%Page: ? 1
op
30 28 xl
1 1 pen
45 288 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
bu fc
{}mark T /Times-Roman /|______Times-Roman 0 rf
bn
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(132)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 469 gm
-0.07739 0.(Glossary)ashow
110 90 gm
1 fs
bu fc
{}mark T /Times-Bold /|______Times-Bold 0 rf
bn
18 fz
bu fc
2 F /|______Times-Bold fnt
bn
0.57254 0.(Glossary)ashow
141 90 gm
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.22259 0.(ACSE)ashow
141 171 gm
-0.15521 0.(Association Control Service Element)ashow
169 90 gm
(ANSI)show
169 171 gm
-0.14611 0.(American National Standards Institute)ashow
197 90 gm
-0.22010 0.(APDU)ashow
197 171 gm
-0.18243 0.(Application Protocol Data Unit)ashow
225 90 gm
-0.66499 0.(ARQ)ashow
225 171 gm
-0.20104 0.(Automatic Repeat Request)ashow
253 90 gm
-0.33200 0.(ASE)ashow
253 171 gm
-0.21589 0.(Application Service Element)ashow
281 90 gm
0.25074 0.(ASN.1)ashow
281 171 gm
-0.11862 0.(Abstract Syntax Notation 1)ashow
309 90 gm
-0.83007 0.(ATM)ashow
309 171 gm
-0.07757 0.(Asynchronous Transfer Mode)ashow
337 90 gm
-0.16897 0.(BER)ashow
337 171 gm
-0.10409 0.(Basic Encoding Rules)ashow
365 90 gm
-0.66708 0.(CA)ashow
365 171 gm
-0.19529 0.(Certification Authority)ashow
393 90 gm
(CBC)show
393 171 gm
-0.11593 0.(Cipher Block Chaining)ashow
421 90 gm
-0.16528 0.(CCITT)ashow
421 171 gm
-0.15966 0.(Comit\216 Consultatif International de Telephonique et Telegraphique)ashow
435 171 gm
-0.14686 0.(\(International Consultative Committee of Telephony and Telegraphy\))ashow
463 90 gm
(CEP)show
463 171 gm
-0.10456 0.(Connection End-Point)ashow
491 90 gm
(CEPI)show
491 171 gm
-0.12063 0.(Connection End-Point Identifier)ashow
519 90 gm
0.16056 0.(CFB)ashow
519 171 gm
-0.10865 0.(Cipher Feed-Back)ashow
547 90 gm
0.11074 0.(CLNP)ashow
547 171 gm
-0.06524 0.(Connectionless Network Protocol)ashow
575 90 gm
0.11074 0.(CLNS)ashow
575 171 gm
-0.07844 0.(Connectionless Network Service)ashow
603 90 gm
(CONS)show
603 171 gm
-0.12504 0.(Connection-Oriented Network Service)ashow
631 90 gm
-0.13307 0.(C-VOPS)ashow
631 171 gm
-0.16479 0.(C-language Virtual Operating System)ashow
659 90 gm
-0.33200 0.(DES)ashow
659 171 gm
-0.15724 0.(Data Encryption Standard)ashow
687 90 gm
-0.16352 0.(DIS)ashow
687 171 gm
-0.15777 0.(Draft International Standard)ashow
715 90 gm
-0.66310 0.(DoD)ashow
715 171 gm
-0.19657 0.(Department of Defense)ashow
743 90 gm
-0.33389 0.(DP)ashow
743 171 gm
-0.10009 0.(Draft Proposal)ashow
F T cp
%%Page: ? 2
op
30 28 xl
1 1 pen
45 288 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(133)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 469 gm
-0.07739 0.(Glossary)ashow
97 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.49853 0.(DSA)ashow
97 171 gm
-0.17156 0.(Directory Server Agent)ashow
125 90 gm
-0.49472 0.(DUA)ashow
125 171 gm
-0.15484 0.(Directory User Agent)ashow
153 90 gm
-0.26483 0.(D-VOPS)ashow
153 171 gm
-0.17935 0.(Distributed Virtual Operating System)ashow
181 90 gm
-0.16897 0.(ECB)ashow
181 171 gm
-0.13882 0.(Electronic Code Bood)ashow
209 90 gm
-0.49313 0.(EDI)ashow
209 171 gm
-0.21450 0.(Electronic Data Interchange)ashow
237 90 gm
-0.33200 0.(EDP)ashow
237 171 gm
-0.15750 0.(Electronic Data Processing)ashow
265 90 gm
(EESP)show
265 171 gm
-0.09712 0.(End-to-End Security Protocol)ashow
293 90 gm
(EESP)show
293 171 gm
-0.09712 0.(End-to-End Security Protocol)ashow
321 90 gm
-0.11160 0.(EFSA)ashow
321 171 gm
-0.17660 0.(Extended Finite State Automaton)ashow
349 90 gm
-0.16551 0.(EFT)ashow
349 171 gm
-0.09461 0.(Electronic Funds Transfer)ashow
377 90 gm
-0.33013 0.(FDDI)ashow
377 171 gm
-0.17991 0.(Fiber Distributed Data Interface)ashow
405 90 gm
-0.33135 0.(FEAL)ashow
405 171 gm
-0.13778 0.(Fast Encryption Algorithm)ashow
433 90 gm
-0.44366 0.(FTAM)ashow
433 171 gm
-0.12104 0.(File Transfer, Access and Management)ashow
461 90 gm
0.16403 0.(FTP)ashow
461 171 gm
-0.09292 0.(File Transfer Protocol)ashow
489 90 gm
0.33695 0.(Gb)ashow
489 171 gm
0.35888 0. 32 0.03588 0.(Gigabit \(1,000,000,000 bits\))awidthshow
517 90 gm
0.08476 0.(GOSIP)ashow
517 171 gm
-0.09307 0.(Government OSI Profile)ashow
545 90 gm
-0.32775 0.(IEEE)ashow
545 171 gm
-0.15733 0.(Institute of Electrical and Electronics Engineers)ashow
573 90 gm
0.33601 0.(IP)ashow
573 171 gm
-0.12277 0.(Internet Protocol)ashow
601 90 gm
0.33601 0.(IS)ashow
601 171 gm
-0.14050 0.(International Standard)ashow
629 90 gm
(ISDN)show
629 171 gm
-0.13476 0.(Integrated Services Digital Network)ashow
657 90 gm
-0.16352 0.(ISO)ashow
657 171 gm
-0.16445 0.(International Organization of Standardization)ashow
685 90 gm
-0.33010 0.(ISODE)ashow
685 171 gm
-0.17779 0.(ISO Development Environment)ashow
713 90 gm
-0.33200 0.(JTM)ashow
713 171 gm
-0.11708 0.(Job Transfer and Manipulation)ashow
741 90 gm
(kb)show
741 171 gm
-0.01683 0.(Kilobit \(1,000 bits\))ashow
F T cp
%%Page: ? 3
op
30 28 xl
1 1 pen
45 288 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(134)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 469 gm
-0.07739 0.(Glossary)ashow
97 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.32806 0.(LAN)ashow
97 171 gm
-0.15319 0.(Local Area Network)ashow
125 90 gm
-0.33200 0.(LLC)ashow
125 171 gm
-0.15682 0.(Logical Link Control)ashow
153 90 gm
-0.66691 0.(MAC)ashow
153 171 gm
-0.16511 0.(Medium Access Control)ashow
181 90 gm
-0.49655 0.(MAN)ashow
181 171 gm
-0.16400 0.(Metropolitan Area Network)ashow
209 90 gm
-0.66708 0.(Mb)ashow
209 171 gm
-0.01345 0.(Megabit \(1,000,000 bits\))ashow
237 90 gm
(MHS)show
237 171 gm
-0.08946 0.(Message Handling System)ashow
265 90 gm
-0.33103 0.(MOTIS)ashow
265 171 gm
-0.15116 0.(Message-Oriented Text Interchange System)ashow
293 90 gm
-0.33782 0.(MS)ashow
293 171 gm
-0.10861 0.(Message Store)ashow
321 90 gm
-0.83007 0.(MTA)ashow
321 171 gm
-0.13958 0.(Message Transfer Agent)ashow
349 90 gm
-0.33406 0.(MTS)ashow
349 171 gm
-0.08819 0.(Message Transfer System)ashow
377 90 gm
0.33100 0.(NBS)ashow
377 171 gm
-0.04168 0.(National Bureau of Standards \(now NIST\))ashow
405 90 gm
0.16450 0.(NCR)ashow
405 171 gm
-0.06271 0.(Network Connection Request \(PDU\))ashow
433 90 gm
0.08570 0.(\(N\)CR)ashow
433 171 gm
-0.05981 0.(\(N\) Connection Request \(PDU\))ashow
461 90 gm
0.11196 0.(N-CR)ashow
461 171 gm
-0.10894 0.(Network Connect Request \(service primitive\))ashow
489 90 gm
0.06990 0.(\(N\)-CR)ashow
489 171 gm
-0.11174 0.(\(N\) Connect Request \(service primitive\))ashow
517 90 gm
0.11430 0.(NIST)ashow
517 171 gm
-0.10269 0.(National Institute of Standardization \(formerly NBS\))ashow
545 90 gm
(NSA)show
545 171 gm
-0.15724 0.(National Security Agency)ashow
573 90 gm
0.11329 0.(NPDU)ashow
573 171 gm
-0.10470 0.(Network Protocol Data Unit)ashow
601 90 gm
0.07070 0.(\(N\)PDU)ashow
601 171 gm
-0.10897 0.(\(N\) Protocol Data Unit)ashow
629 90 gm
0.11074 0.(NSAP)ashow
629 171 gm
-0.08407 0.(Network Service Access Point)ashow
657 90 gm
0.06912 0.(\(N\)SAP)ashow
657 171 gm
-0.08432 0.(\(N\) Service Access Point)ashow
685 90 gm
0.11329 0.(NSDU)ashow
685 171 gm
-0.12237 0.(Network Service Data Unit)ashow
713 90 gm
0.07070 0.(\(N\)SDU)ashow
713 171 gm
-0.13027 0.(\(N\) Service Data Unit)ashow
741 90 gm
-0.16897 0.(OFB)ashow
741 171 gm
-0.15361 0.(Output Feed-Back)ashow
F T cp
%%Page: ? 4
op
30 28 xl
1 1 pen
45 288 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(135)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 469 gm
-0.07739 0.(Glossary)ashow
97 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.16352 0.(OSI)ashow
97 171 gm
-0.12152 0.(Open Systems Interconnection)ashow
125 90 gm
0.32907 0.(P1)ashow
125 171 gm
-0.09703 0.(Protocol 1 \(MTA-to-MTA protocol in X.400 MHS\))ashow
153 90 gm
0.32907 0.(P2)ashow
153 171 gm
-0.03811 0.(Protocol 2 \(UA-to-UA protocol in X.400 MHS\))ashow
181 90 gm
0.33100 0.(PBX)ashow
181 171 gm
-0.13371 0.(Private Branch Exchange)ashow
209 90 gm
(PDN)show
209 171 gm
-0.12742 0.(Public Data Network)ashow
237 90 gm
(PDU)show
237 171 gm
-0.15522 0.(Protocol Data Unit)ashow
265 90 gm
0.33650 0.(PIN)ashow
265 171 gm
-0.08503 0.(Personal Identity Number)ashow
293 90 gm
0.33100 0.(PKC)ashow
293 171 gm
-0.05969 0.(Public Key Cryptosystem)ashow
321 90 gm
0.11074 0.(PPDU)ashow
321 171 gm
-0.13171 0.(Presentation Protocol Data Unit)ashow
349 90 gm
0.11074 0.(PSDU)ashow
349 171 gm
-0.14721 0.(Presentation Service Data Unit)ashow
377 90 gm
0.22172 0.(PSTN)ashow
377 171 gm
-0.09188 0.(Public Switched Telephone Network)ashow
405 90 gm
-0.66499 0.(RDA)ashow
405 171 gm
-0.20327 0.(Remote Database Access)ashow
433 90 gm
0.16056 0.(RFC)ashow
433 171 gm
-0.10978 0.(Request for Comment)ashow
461 90 gm
-0.16897 0.(ROS)ashow
461 171 gm
-0.18548 0.(Remote Operations)ashow
489 90 gm
-0.22259 0.(ROSE)ashow
489 171 gm
-0.18525 0.(Remote Operations Service Element)ashow
517 90 gm
-0.16897 0.(RSA)ashow
517 171 gm
-0.12332 0.(Rivest\320Shamir\320Adelman \(a public key cryptosystem\))ashow
545 90 gm
(RTS)show
545 171 gm
-0.16331 0.(Reliable Transfer)ashow
573 90 gm
-0.11160 0.(SASE)ashow
573 171 gm
-0.19781 0.(Specific Application Service Element)ashow
601 90 gm
0.10807 0.(SCSE)ashow
601 171 gm
-0.15550 0.(Secure Communications Service Element)ashow
629 90 gm
(SDU)show
629 171 gm
-0.18486 0.(Service Data Unit)ashow
657 90 gm
-0.11160 0.(SMIB)ashow
657 171 gm
-0.15011 0.(Security Management Information Base)ashow
685 90 gm
0.32907 0.(SP3)ashow
685 171 gm
-0.08660 0.(Network Layer Security Protocol)ashow
713 90 gm
0.32907 0.(SP4)ashow
713 171 gm
-0.10189 0.(Transport Layer Security Protocol)ashow
741 90 gm
(TCP)show
741 171 gm
-0.07055 0.(Transmission Control Protocol)ashow
F T cp
%%Page: ? 5
op
30 28 xl
1 1 pen
45 288 gm
(nc 30 28 811 566 6 rc)kp
1 setTxMode
0 fs
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(136)show
803 90 gm
10 fz
bu fc
2 F /|______Times-Roman fnt
bn
-0.01179 0.(Open Systems Security \320 an Architectural Framework)ashow
803 469 gm
-0.07739 0.(Glossary)ashow
97 90 gm
12 fz
bu fc
2 F /|______Times-Roman fnt
bn
(TP0)show
97 171 gm
-0.05200 0.(Class 0 Transport Protocol)ashow
125 90 gm
(TP4)show
125 171 gm
-0.05200 0.(Class 4 Transport Protocol)ashow
153 90 gm
-0.10899 0.(TPDU)ashow
153 171 gm
-0.12153 0.(Transport Protocol Data Unit)ashow
181 90 gm
-0.32623 0.(UA)ashow
181 171 gm
-0.10810 0.(User Agent)ashow
209 90 gm
-0.49472 0.(VAN)ashow
209 171 gm
-0.14547 0.(Value Added Network)ashow
237 90 gm
-0.22010 0.(VANS)ashow
237 171 gm
-0.13824 0.(Value Added Network Service)ashow
265 90 gm
-0.21910 0.(VLSI)ashow
265 171 gm
-0.16967 0.(Very Large Scale Integration)ashow
293 90 gm
-0.22259 0.(VOPS)ashow
293 171 gm
-0.18666 0.(Virtual Operating System)ashow
321 90 gm
-0.99322 0.(VT)ashow
321 171 gm
-0.26412 0.(Virtual Terminal)ashow
349 90 gm
-0.32615 0.(WAN)ashow
349 171 gm
-0.14212 0.(Wide Area Network)ashow
377 90 gm
0.50146 0.(XNS)ashow
377 171 gm
(Xerox Network Systems)show
F T cp
%%Trailer
cd
end
%%Pages: 5 0
%%EOF