EN 300 175-7-2010

Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 7: Security features (V2.3.1)


 

 

非常抱歉,我们暂时无法提供预览,您可以试试: 免费下载 EN 300 175-7-2010 前三页,或者稍后再访问。

如果您需要购买此标准的全文,请联系:

点击下载后,生成下载文件时间比较长,请耐心等待......

 

标准号
EN 300 175-7-2010
发布日期
2010年06月01日
实施日期
2010年06月17日
废止日期
中国标准分类号
/
国际标准分类号
/
发布单位
ETSI - European Telecommunications Standards Institute
引用标准
109
适用范围
The present document is one of the parts of the specification of the Digital Enhanced Cordless Telecommunications (DECT) Common Interface (CI). The present document specifies the security architecture@ the types of cryptographic algorithms required@ the way in which they are to be used@ and the requirements for integrating the security features provided by the architecture into the DECT CI. It also describes how the features can be managed and how they relate to certain DECT fixed systems and local network configurations. The security architecture is defined in terms of the security services which are to be supported at the CI@ the mechanisms which are to be used to provide the services@ and the cryptographic parameters@ keys and processes which are associated with these mechanisms. The security processes specified in the present document are each based on one of two cryptographic algorithms: ?an authentication algorithm; and ?a key stream generator. The architecture is@ however@ algorithm independent@ and either the DECT standard algorithms@ or appropriate proprietary algorithms@ or indeed a combination of both can@ in principle@ be employed. The use of the employed algorithm is specified in the present document. Integration of the security features is specified in terms of the protocol elements and processes required at the Network (NWK) and Medium Access Control (MAC) layers of the CI. The relationship between the security features and various network elements is described in terms of where the security processes and management functions may be provided. The present document does not address implementation issues. For instance@ no attempt is made to specify whether the DSAA should be implemented in the PP at manufacture@ or whether the DSAA or a proprietary authentication algorithm should be implemented in a detachable module. Similarly@ the present document does not specify whether the DSC should be implemented in hardware in all PPs at manufacture@ or whether special PPs should be manufactured with the DSC or proprietary ciphers built into them. The security architecture supports all these options@ although the use of proprietary algorithms may limit roaming and the concurrent use of PPs in different environments. The present document includes New Generation DECT@ a further development of the DECT standard introducing wideband speech@ improved data services@ new slot types and other technical enhancements.

EN 300 175-7-2010系列标准





Copyright ©2007-2022 ANTPEDIA, All Rights Reserved
京ICP备07018254号 京公网安备1101085018 电信与信息服务业务经营许可证:京ICP证110310号