UNLIMITED FREE ACCESS TO THE WORLD'S BEST IDEAS

close
Already an Engineering360 user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your Engineering360 Experience

close
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

CSA ISO/IEC 11577

Information technology - Open Systems Interconnection - Network layer security protocol

active, Most Current
Buy Now
Organization: CSA
Publication Date: 1 January 1997
Status: active
Page Count: 122
ICS Code (Network layer): 35.100.30
scope:

This JTU-T Recommendation I International Standard specifies a protocol to be used by End Systems and Intermediate Systems in order to provide security services in the Network layer, which is defined by CCITT Rec. X.213 I ISODEC 8348, and IS0 8648. The protocol defined in this ITU-T Recommendation I International Standard is called the Network Layer Security Protocol (NLSP). This ITU-T Recommendation I International Standard specifies:

1) Support for the following security services defined in CClTT Rec. X.800 I ISO 7498-2:

a) peer entity authentication;

b) data origin authentication;

c) access controI;

d) connection confidentiality;

e) connectionless confidentiality;

f) traffic flow confidentiality;

g) connection integrity without recovery (including Data Unit Integrity, in which individual SDUs on a connection are integrity protected):

h) connectionless integrity.

2) The functional requirements for implementations that claim conformance to this ITU-T Recommendation 1 Inteernational Standard.

The procedures of this protocol are defined in terms of

a) requirements on the cryptographic techniques that can be used in an instance of this protocol;

b) requirements on the information carried in the security association used in an instance of communication.

Although the degree of protection afforded by some security mechanisms depends on the use of some specific cryptographic techniques, correct operation of this protocol is not dependent on the choice of any particular encipherment or decipherment algorithm. This is a local matter for the communicating systems.

Furthermore, neither the choice nor the implementation of a specific security policy are within the scope of this ITU-T Recommendation I International Standard. The choice of a specific security policy, and hence the degree of protection that will be achieved, is left as a local matter among the systems that are using a single instance of secure communications. This ITU-T Recornmendation I International Standard does not require that multiple instances of secure communications invoIving a single open system must use the same security protocol.

Annex D provides the PICS proforma for the Network Layer Security Protocol in compliance with the relevant guidance given in ISO/IEC 9646-2.

Document History

May 1, 1997
Information Technology - Open Systems Interconnection - Network Layer Security Protocol
This ITU-T Recommendation I International Standard specifies a protocol to be used by End Systems and Intermediate Systems in order to provide security services in the Network layer, which is defined...
May 1, 1997
Information Technology - Open Systems Interconnection - Network Layer Security Protocol
This ITU-T Recommendation|International Standard specifies a protocol to be used by End Systems and Intermediate Systems in order to provide security services in the Network layer, which is defined...
Information Technology - Open Systems Interconnection - Network Layer Security Protocol
This JTU-T Recommendation I International Standard specifies a protocol to be used by End Systems and Intermediate Systems in order to provide security services in the Network layer, which is defined...
CSA ISO/IEC 11577
January 1, 1997
Information technology - Open Systems Interconnection - Network layer security protocol
This JTU-T Recommendation I International Standard specifies a protocol to be used by End Systems and Intermediate Systems in order to provide security services in the Network layer, which is defined...

References

Advertisement