| 信息技术 – 开放系统互连 – 号码簿 – 安全作的协议规范 |
ITU-T X.510建议书 | ISO/IEC 9594-11为设计具有内置网络安全功能的协议规范提供了工具和规范。它为加密算法选入功能和加密算法迁移提供了工具;它提供了其他规范未提供的加密算法的正式规范;它定义了一些特定的协议。最后,提供了一个附件,为加密算法的迁移提供了指导。ITU-T X.510建议书 | ISO/IEC 9594-11包括使用加密算法选入原则规定安全协议之规范的工具,允许在不对算法类型进行“硬编码”的情况下规定通信协议,但允许在不同领域利用与特定领域相关的加密算法类型来增补ITU-T X.510建议书 | ISO/IEC 9594-11。加密算法选入功能取决于如ITU-T X.509建议书 | ISO/IEC 9594-8中规定的算法,ITU-T X.510建议书 | ISO/IEC 9594-11在未存在正式算法规范的地方补充了规范,并对未遵循ITU-T X.510建议书 | ISO/IEC 9594-11所确立规则的现有正式规范进行了重组。提供了将加密算法迁移能力纳入通信协议的工具。附件为这些工具的使用提供了指导。ITU-T X.510建议书 | ISO/IEC 9594-11规定了一个称为包封协议的通用协议,为其保护对象的协议提供网络安全。包封协议提供鉴权、完整性和可选地提供保密性(加密)。包封协议允许独立于受保护协议提供网络安全,这意味着可以在不影响受保护协议规范的前提下增强安全性。包封协议利用了加密算法选入和迁移的所有功能。ITU-T X.510建议书 | ISO/IEC 9594-11还规定了使用包封协议保护的三个协议。这包括一个授权和验证清单(AVL)的维护协议、一个订购公钥证书状态的协议和一个访问信任代理的协议。 |
|
| Citation: |
https://handle.itu.int/11.1002/1000/15701 |
| Series title: |
X series: Data networks, open system communications and security X.500-X.599: Directory |
| Approval date: |
2023-10-29 |
| Identical standard: | ISO/IEC 9594-11 (Common) |
| Provisional name: | X.509prot |
| Approval process: | AAP |
|
Status: |
In force |
| Observation: | This text was produced through a joint activity with ISO and IEC. According to the agreement with our partners, this document is only available through payment. Please get in touch with sales@itu.int for more information. |
|
Maintenance responsibility: |
ITU-T Study Group 17 |
|
Further details: |
Patent statement(s)
Development history
|
|
|
| Title |
Approved on |
Download |
|
Directory Implementers' Guide for ITU-T X.500-series - Version 15, August 2001
|
2001-09-07
|
here
|
|
Directory Implementers' Guide for ITU-T X.500-series - Version 14, March 2001
|
2001-03-01
|
here
|
|
Click
here
to download all the modules of this Recommendation (zipped archive)
|
|
Click here to download all the modules needed to compile this Recommendation (zipped archive)
|
| Title |
Approved on |
Download |
|
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|