throbber
Authorized licensed use limited to: UCLA Library. Downloaded on January 19,2016 at 18:54:06 UTC from IEEE Xplore. Restrictions apply.
`
`000001
`
`VIASAT 1009
`IPR of U.S. Pat. No. 5,960,074
`
`

`
`THIS PAGE WAS
`BLANK IN THE ORIGINAL
`
`Authorized licensed use limited to: UCLA Library. Downloaded on January 19,2016 at 18:54:06 UTC from IEEE Xplore. Restrictions apply.
`
`000002
`
`

`
`IEEE Std 802.10-1992
`(Includes IEEE Std 802.10b-1992)
`
`IEEE Standards for Local and
`Metropolitan Area Networks:
`
`Interoperable LAN/MAN Security
`(SILS)
`
`Currently Contains
`Secure Data Exchange (SDE) (Clause 2)
`
`Sponsor
`Technical Committee on Security and Privacy and
`Technical Committee on Computer Communications
`of the
`IEEE Computer Society
`
`Approved September 17, 1992
`IEEE Standards Board
`
`Abstract: A security protocol that can be used to protect IEEE 802 Local Area Networks (LANs)
`and Metropolitan Area Networks (MANS) is described. This Open Systems Interconnection (09)
`Layer 2 security protocol can be used to provide the security services of confidentiality and connec-
`tionless integrity. In conjunction with key management or system management, the security servic-
`es of data origin authentication and access control may also be provided.
`Keywords: decipherment; encipherment; local area networks, security; metropolitan area net-
`works, secure data exchange; security; security association
`
`The Institute of Electrical and Electronics Engineers, Inc.
`345 East 47th Street, New York, NY 10017-2394, USA
`
`Copyright 0 1993 by the Institute of Electrical and Electronics Engineers, Inc.
`All rights reserved. Published 1993. Printed in the United States of America
`
`ISBN 1-55937-254-0
`No part of this publication may be reproduced in any form, in an electronic retrieval system or otherwise, without the prior
`written permission of the publisher.
`
`Authorized licensed use limited to: UCLA Library. Downloaded on January 19,2016 at 18:54:06 UTC from IEEE Xplore. Restrictions apply.
`
`000003
`
`

`
`IEEE Standards documents are developed within the Technical Committees of
`the IEEE Societies and the Standards Coordinating Committees of the IEEE Stan-
`dards Board. Members of the committees serve voluntarily and without compensa-
`tion. They are not necessarily members of the Institute. The standards developed
`within IEEE represent a consensus of the broad expertise on the subject within the
`Institute as well as those activities outside of IEEE that have expressed an interest in
`participating in the development of the standard.
`Use of an IEEE Standard is wholly voluntary. The existence of an IEEE Standard
`does not imply that there are no other ways to produce, test, measure, purchase, mar-
`ket, or provide other goods and services related to the scope of the IEEE Standard.
`Furthermore, the viewpoint expressed at the time a standard is approved and issued is
`subject to change brought about through developments in the state of the art and
`comments received from users of the standard. Every IEEE Standard is subjected to
`review at least every five years for revision or reaffirmation. When a document is
`more than five years old and has not been reaffirmed, it is reasonable to conclude that
`its contents, although still of some value, do not wholly reflect the present state of the
`art. Users are cautioned to check to determine that they have the latest edition of any
`IEEE Standard.
`Comments for revision of IEEE Standards are welcome from any interested party,
`regardless of membership affiliation with IEEE. Suggestions for changes in docu-
`ments should be in the form of a proposed change of text, together with appropriate
`supporting comments.
`Interpretations: Occasionally questions may arise regarding the meaning of por-
`tions of standards as they relate to specific applications. When the need for interpreta-
`tions is brought to the attention of IEEE, the Institute will initiate action to prepare
`appropriate responses. Since IEEE Standards represent a consensus of all concerned
`interests, it is important to ensure that any interpretation has also received the concur-
`rence of a balance of interests. For this reason IEEE and the members of its technical
`committees are not able to provide an instant response to interpretation requests
`except in those cases where the matter has previously received formal consideration.
`Comments on standards and requests for interpretations should be addressed to:
`
`Secretary, IEEE Standards Board
`445 Hoes Lane
`P.O. Box 1331
`Piscataway, NJ 08855-1331
`USA
`
`IEEE Standards documents are adopted by the Institute of Electrical and Electron-
`ics Engineers without regard to whether their adoption may involve patents on arti-
`cles, materials, or processes. Such adoption does not assume any liability to any
`patent owner, nor does it assume any obligation whatever to parties adopting the
`standards documents.
`
`Authorized licensed use limited to: UCLA Library. Downloaded on January 19,2016 at 18:54:06 UTC from IEEE Xplore. Restrictions apply.
`
`000004
`
`

`
`Introduction
`
`(This introduction is not a part of IEEE Std 802.10-1992, IEEE Standards for Local and Metropolitan Area Networks: Interoperable
`LANMAN Security (SILS).)
`
`This standard is part of a family of standards for local and metropolitan area networks. The relationship
`between the standard and other members of the family is shown below. (The numbers in the figure refer to
`IEEE standard numbers.)
`
`N
`
`1
`
`802.2 LOGICAL LINK
`
`802.1 BRIDGING
`
`DATA
`LINK
`LAYER
`
`PHYSICAL
`
`* Formerly IEEE Std 802.1A
`
`This family of standards deals with the Physical and Data Link Layers as defined by the IS0 Open Systems
`Interconnection Basic Reference Model (IS0 7498 : 1984). The access standards define several types of
`medium access technologies and associated physical media, each appropriate for particular applications or
`system objectives. Other types are under investigation.
`
`The standards defining these technologies are as follows:
`
`IEEE Std 802*:
`
`IEEE Std 802.1D:
`
`IEEE Std 802.1E:
`
`Overview and Architecture. This standard provides an over-
`view to the family of IEEE 802 Standards. This document
`forms part of the 802.1 scope of work.
`
`MAC Bridging. Specifies an architecture and protocol for the
`interconnection of IEEE 802 LANs below the MAC service
`boundary.
`
`System Load Protocol. Specifies a set of services and protocol
`for those aspects of management concerned with the loading of
`systems on IEEE 802 LANs.
`
`IS0 8802-2 [ANSVIEEE Std 802.21:
`
`Logical Link Control
`
`ISO/IEC 8802-3 [ANSVIEEE Std 802.31: CSMNCD Access Method and Physical Layer Specifications
`
`ISO/IEC 8802-4 [ANSVIEEE Std 802.41: Token Bus Access Method and Physical Layer Specifications
`
`'The 802 Architecture and Overview Specification, originally known as IEEE Std 802.1A. has been renumbered as IEEE Std 802. This
`has been done to accommodate recognition of the base standard in a family of standards. References to IEEE Std 802.1A should be
`considered as references to IEEE Std 802.
`
`...
`111
`
`Authorized licensed use limited to: UCLA Library. Downloaded on January 19,2016 at 18:54:06 UTC from IEEE Xplore. Restrictions apply.
`
`000005
`
`

`
`ISOAEC 8802-5 [ANSMEEE Std 802.51: Token Ring Access Method and Physical Layer Specifications
`
`IEEE Std 802.6:
`
`IEEE Std 802.10:
`
`Metropolitan Area Network Access Method and Physical
`Layer Specifications
`
`Data
`Interoperable LAN/MAN Security (S1LS)-Secure
`Exchange (SDE) [Currently contains Secure Data Exchange
`(Clause 2)]
`
`In addition to the family of standards, the following is a recommended practice for a common technology:
`
`IEEE Std 802.7:
`
`IEEE Recommended Practice for Broadband Local Area Net-
`works
`
`Conformance Test Methodology
`
`An additional standards series, identified by the number 1802, has been established to identify the conform-
`ance test methodology documents for the 802 family of standards. This makes the correspondence between
`the various 802 standards and their applicable conformance test requirements readily apparent. Thus the
`conformance test documents for 802.3 are numbered 1802.3, the conformance test documents for 802.5 will
`be 1802.5, and so on.
`
`802.1 0-1 992
`
`The IEEE 802.10 LAN Security Working Group was formed in May of 1988 to address the security of Local
`Area Networks (LANs) and Metropolitan Area Networks (MANs). It is co-sponsored by IEEE 802 and by
`the IEEE Technical Committee on Security and Privacy. The committee has representation from vendors,
`government, and users. IEEE Std 802.10 is intended to provide a standard to address security for LANs and
`MANs. The standard is an interoperability standard that is compatible with the existing IEEE 802 and OS1
`architectures. This volume, which includes Secure Data Exchange (SDE), is the first clause to be completed.
`Additional clauses and subclauses will be published as supplements and folded into the base document
`(IEEE Std 802.10) at the appropriate time.
`
`Data networks, especially LANs and MANs, have become widespread. LANs and MANS are used by both
`industry and government for transfemng vast amounts of information in the course of daily operations.
`Because of their ever-increasing use in the private and public sectors, the capabilities of these networks are
`being expanded to encompass more and more performance requirements. As a result, there is the growing
`need to standardize network protocols wherever feasible, to ensure that data networks will interoperate
`effectively.
`
`As standardization practices evolve, several key areas will become critically important. One of these areas is
`network security. Many LANs and MANS require the capability to exchange data in a secure manner. This is
`especially important in cases where disclosure of operational information to unauthorized parties would
`severely undermine an organization’s effectiveness. It is often as critical to protect the integrity of the data as
`it is to prevent disclosure of operating information.
`
`Financial and government institutions have traditionally been most aware of the importance of security.
`However, recent widely publicized cases of computer fraud and related crimes have made security a goal for
`many other industries as well. As the need for security on LANs and MANS gains recognition, the need for a
`standardized approach to providing such a capability also becomes a priority. Much security standardization
`has already been started. Where applicable, this standard attempts to incorporate this work.
`
`iv
`
`Authorized licensed use limited to: UCLA Library. Downloaded on January 19,2016 at 18:54:06 UTC from IEEE Xplore. Restrictions apply.
`
`000006
`
`

`
`Participants
`
`A t the time this standard was completed, the 802.10 LANMAN Security Working Group had the following
`membership:
`
`Kenneth G. Alonge, Chair (1991 to present)
`Kimberly Kirkpatrick, Chair (1988-1991)
`Russell Housley, Vice Chair
`L. Kirk Barker, Technical Editor
`Peter Yee, Recording Secretary
`Alan Amdt
`Paul Lambert
`James Pyles
`Kurt Augustine
`Warren Loper
`James Randall
`Bill Bimbaum
`Eugene Reilly
`Wen-Pai Lu
`Ben Bratcher
`Brian Schanning
`Marc Mandel
`Ronald Gibson
`James Sutherland
`Ken McCoy
`Jon Graff
`Kenta Takumi
`Esther Murphy
`Tom Hunwick
`Lloyd Taylor
`Richard Parker
`Robert Kolacki
`Brian Phillips
`Joseph Williamson
`
`The following individuals also contributed review and comments:
`
`Morrie Gasser
`B.J. Herbison
`Lawrence Kilgallen
`
`John Kimmins
`Scott Lawrence
`Larry Lunsford
`
`C.E. Reaver
`Jim Sanders
`Mitch Tannenbaum
`
`The following persons were o n the balloting committee that approved this document for submission to the
`IEEE Standards Board:
`W. B. Adam
`I. F. Akyildiz
`P. Angarano
`Y. M. Baeg
`M. R. Balomiri
`T. Batten
`J. 0. Bondi
`C. E. Bouldin
`M. A. Branstad
`A. L. Bridges
`D. W. Browne
`R. Caasi
`A. L. Carrato
`A. Castaldo
`K. J. Cooper
`S . J. Covington
`R. S. Crowder
`E. A. Czarcinski
`A. M. De Alvar6
`R. Diaz
`W. C. Dube
`A. M. Dunn
`S. K. Dutta
`T. Dzik
`J. Ellis
`P. H. Enslow, Jr.
`S. A. Faviell
`J. W. Fendrich
`C. A. Finseth
`H. A. Freeman
`G. Fullerton
`R. Gagliano
`M. Gasser
`C . G. Girling
`P. Gonia
`
`H. K. Gorowara
`J. Gaff
`M. Greer
`R. M. Gross
`A. Grund
`D. Hardie
`C. M. Hay
`L. A. Hollaar
`G. L. Hollander
`R. D. Housley
`G. J. Huey
`W. J. Hunteman
`T. R. Hunwick
`B. Iggland
`T. J. Jasinski
`R. Juvonen
`K. C. Kelley
`G. C. Kessler
`F. Khatibi
`K. Kirkpatrick
`T. Korelsky
`P. Kornerup
`M. D. Krenzin
`K. Kung
`C. A. LaBarge
`L. M. Lam
`L. M. Leach
`M. E. Lee
`E. V. Leighninger
`W. A. Levy
`E. Liebman
`P. Lin
`J. Litchfield
`W. E. Loper
`w. Lu
`
`A. J. Luque
`G. Q. Maguire
`E. G. Marmol
`P. Martini
`C. McDonald
`W. C. McDonald
`G. McWilliams
`R. J. Melford
`A. Miller
`R. H. Miller
`D. S. Millman
`R. R. Moeller
`T. Mookken
`D. J. Morris
`C. E. Neblock
`R. Nelson
`D. M. Nessett
`C. Neuman
`D. O’Mahony
`E. Okamoto
`S. A. Orrell
`A. Pfitzmann
`T. E. Phillips
`T. L. Phinney
`R. L. Phipps
`A. J. Pina
`U. W. Pooch
`V. Prabhu
`Y. Qianli
`R. Ramaswamy
`E. J. Reilly
`T. E. Revello
`A. B. Richstein
`C. J. Riddick
`R. Rosenthal
`
`V
`
`Authorized licensed use limited to: UCLA Library. Downloaded on January 19,2016 at 18:54:06 UTC from IEEE Xplore. Restrictions apply.
`
`000007
`
`

`
`V. Rozentouler
`J. W. Rub
`R. A. Rueppel
`C. Ruland
`D. J. Rypka
`E. R. Schallenmuller
`B. P. Schanning
`R. R. Schell
`N. Schneidewind
`J. R. Schwab
`B. Sklar
`D. Snow
`H. P. Solomon
`
`J. Stevenson
`B. J. Stoppe
`E. Sullivan
`E. D. Sykas
`H. Tang
`B. J. Tarbox
`L. W. Taylor
`P. Thaler
`J. C. Thomas
`D. M. Topkis
`B. Tretick
`R. C. Tripi
`G. Tsudik
`D. B. Turner
`
`R. Van Houtte
`J. Vandewalle
`J. T. Vorhies
`B. Vornbrock
`S. T. Walker
`R. K. Walker
`R. Wenig
`W. J. Wenker
`J . A. West
`G. B. Wright
`J. Yang
`P. Yee
`0. Yuen
`
`When the IEEE Standards Board approved this standard on September 17, 1992, it had the following mem-
`bership:
`
`Donald C. Loughry, Vice Chair
`Marco W. Migliaro, Chair
`Andrew G. Salem, Secretary
`Donald N. Heirman
`Ben C. Johnson
`Walter J. Karplus
`Ivor N. Knight
`Joseph Koepfinger*
`Irving Kolodny
`D. N. “Jim” Logothetis
`Lawrence V. McCall
`
`T. Don Michael*
`John L. Rankine
`Wallace S. Read
`Ronald H. Reimer
`Gary S. Robinson
`Martin V. Schneider
`Terrance R. Whittemore
`Donald W. Zipse
`
`Dennis Bodson
`Paul L. Borrill
`Clyde Camp
`Donald C. Fleckenstein
`Jay Forster*
`David E Franklin
`Ramiro Garcia
`Thomas L. Hannan
`
`*Member Emeritus
`
`Also included are the following IEEE Standards Board liaisons:
`
`Satish K. Aggarwal
`James Beall
`Richard B. Engelman
`David E. Soffrin
`Stanley Warshaw
`
`Kristin M. Dittmann
`IEEE Standards Pmject Editor
`
`vi
`
`Authorized licensed use limited to: UCLA Library. Downloaded on January 19,2016 at 18:54:06 UTC from IEEE Xplore. Restrictions apply.
`
`000008
`
`

`
`Contents
`
`CLAUSE
`
`PAGE
`
`1 . Overview and model ............................................................................................................................
`
`1
`
`1.1 Scope and purpose .........................
`1.2 Acronyms and definitions ...................................
`1.3 References ............................................................
`1.4 Architecture .....................................
`
`...................................................
`1
`.......................................................
`1
`...................................................
`5
`............................................................................ 6
`
`2 . Secure Data Exchange (SDE) ..............................................................................................................
`
`7
`
`2.1 Overview
`
`.............................................................................................
`7
`........................................................................ 8
`
`2.5 SDE PDU structure ....................................................................
`2.6 SDE procedure .....................................................
`2.7 Minimum Essential Requirements (MERs) ...............................
`2.8 SDE sublayer management .....................................................................
`
`...................................
`
`11
`
`3 . Key management ............................................................................................................................... 24
`
`4 . Security management .........................................................................................................................
`
`24
`
`5 . Bibliography ...................................................................................................................................... 25
`
`FIGURES
`
`Figure 2- 1
`Figure 2-2
`Figure 2-3
`Figure 2-4
`Figure 2-5
`Figure 2-6
`Figure 2-7
`Figure 2-8
`Figure 2-9
`Figure 2- 10
`Figure 2- 1 1
`Figure 2- 12
`
`Relationship to IEEE 802 reference model ........................................................................
`7
`SDE primitives .................................................................................................................
`10
`Structure of the SDE PDU ...............................................................................................
`11
`Clear Header ....................................................................................................................
`12
`SAID format ..................................................................................................................... 12
`Construction of the SDE PDU .........................................................................................
`14
`SDE management architecture .........................................................................................
`15
`Initial exchange ................................................................................................................
`16
`Example SMIB containing security associations .............................................................
`16
`Parameters used for selecting security association ..........................................................
`16
`Transmission of an MA-UNITDATA.request ................................................................
`19
`Reception of an MA-UNITDATA.indication ................................................................. 22
`
`TABLE
`
`Figure 2- 1
`
`Security service dependencies ...........................................................................................
`
`9
`
`ANNEXES
`
`2A . Service rationale ................................................................................................................................. 27
`............................................................................................................................
`2B . Example .....
`37
`2C . Objectives of SDE .............
`..................................................................................................
`43
`2D . Rationale for placement ....
`....................................................................................................
`44
`2E . Fragmentation ...................
`..................................................................................................
`48
`
`..
`
`vii
`
`Authorized licensed use limited to: UCLA Library. Downloaded on January 19,2016 at 18:54:06 UTC from IEEE Xplore. Restrictions apply.
`
`000009
`
`

`
`THIS PAGE WAS
`BLANK IN THE ORIGINAL
`
`Authorized licensed use limited to: UCLA Library. Downloaded on January 19,2016 at 18:54:06 UTC from IEEE Xplore. Restrictions apply.
`
`000010
`
`

`
`IEEE Standards for Local and Metropolitan Area
`Networks: Interoperable LAN/MAN Security (SILS)
`
`Currently Contains
`Secure Data Exchange (SDE) (Clause 2)
`
`1. Overview and model
`
`1.1 Scope and purpose
`
`This standard was developed to provide security in IEEE 802 Local Area Networks (LANs) and Metropoli-
`tan Area Networks (MANs).
`
`The model for providing security services is described in clause 1. A Secure Data Exchange (SDE) protocol
`for IEEE 802 LANs and MANs is defined in clause 2. Key management and systedsecurity management in
`IEEE 802 LANs and MANs are described in clauses 3 and 4. While SDE is independent of any key manage-
`ment or system management implementation, the security services described in this standard depend on
`management information provided by management entities.
`
`1.2 Acronyms and definitions
`
`1.2.1 Acronyms
`
`This subclause contains acronyms that are applicable to all clauses of the standard.
`
`CMIP
`DA
`DEA
`DSAP
`ICV
`IV
`LAN
`LM
`LLC
`LSAP
`MAC
`MAN
`MDF
`MER
`MU3
`MSDU
`os1
`PDU
`
`Common Management Information Protocol
`Destination Address
`Data Encryption Algorithm
`Destination Service Access Point
`Integrity Check Value
`Initialization Vector
`Local Area Network
`Layer Manager
`Logical Link Control
`Link Service Access Point
`Medium Access Control
`Metropolitan Area Network
`Management-Defined Field
`Minimum Essential Requirements
`Management Information Base
`MAC Service Data Unit
`Open Systems Interconnection
`Protocol Data Unit
`
`1
`
`Authorized licensed use limited to: UCLA Library. Downloaded on January 19,2016 at 18:54:06 UTC from IEEE Xplore. Restrictions apply.
`
`000011
`
`

`
`IEEE
`Std 802.10-1992
`
`IEEE STANDARDS FOR LOCAL AND METROPOLITAN AREA NETWORKS:
`
`SA
`SAID
`S A P
`SDE
`SDU
`SILS
`SMAE
`SMIB
`S S A P
`TCB
`
`Source Address
`Security Association Identifier
`Service Access Point
`Secure Data Exchange
`Service Data Unit
`Standard for Interoperable LAN Security
`System Management Application Entity
`Security Management Information Base
`Source Service Access Point
`Trusted Computing Base
`
`1.2.2 Definitions
`
`This subclause contains the definitions that are applicable to all clauses of this standard. Sources for the def-
`initions are indicated. When no source is indicated, this standard is the source.
`
`1.2.2.1 access control: The prevention of unauthorized use of a resource, including the prevention of use of
`a resource in an unauthorized manner. (IS0 7498-2 : 1989l)
`
`1.2.2.2 attribute: A property of a managed object or a property of an association among OS1 entities. An
`attribute has an associated value, which may have a simple or complex structure. (ISOAEC 10040 : 1992)
`
`1.2.2.3 authentication: See: data origin authentication; peer entity authentication. Note: In this stan-
`dard, the term “authentication” is not used in connection with data integrity; the term “data integrity” is used
`instead.
`
`1.2.2.4 bootstrap SAID. Four SAID values are reserved for the purpose of establishing initial communica-
`tion with key management or system management when an SAID has not already been negotiated. These
`SAID values are called “bootstrap” SAIDs and have a preestablished security association.
`
`1.2.2.5 ciphertext: Data produced through the use of encipherment, the semantic content of which is not
`available. Note: Ciphertext may itself be input to encipherment, producing superenciphered data.
`
`1.2.2.6 cleartext: Intelligible data, the semantic content of which is available. (IS0 7498-2 : 1989)
`
`1.2.2.7 compromise: A violation of the security of a system such that an unauthorized disclosure of sensi-
`tive information may have occurred. (NCSG-TG-005 Version- 1 [B3]*)
`
`1.2.2.8 confidentiality: The property of information that is not made available or disclosed to unauthorized
`individuals, entities, or processes. (IS0 7498-2 : 1989)
`
`1.2.2.9 connection-oriented confidentiality: The protection of all (N)-service data units from unauthorized
`disclosure during communications from one (N+l)-entity to one or more (N+ 1)-entities for which a security
`association is established for the transfer of data and for the application of confidentiality service between
`the entities themselves and between each entity and the physical layer.
`
`1.2.2.10 connection-oriented integrity: A service providing for the integrity of all (N)-service data on a
`security association and detecting any modification, insertion, deletion, or replay of any data within an entire
`SDU sequence.
`
`‘Information on references can be found in 1.3.
`’The numbers in brackets preceded by the letter B correspond to those of the bibliography in clause 5
`
`2
`
`Authorized licensed use limited to: UCLA Library. Downloaded on January 19,2016 at 18:54:06 UTC from IEEE Xplore. Restrictions apply.
`
`000012
`
`

`
`LAN/MAN SECURITY (SILS)
`
`IEEE
`Std 802.10-1992
`
`1.2.2.11 connectionless confidentiality: The protection of (N)-service data units from unauthorized disclo-
`sure during transmission from one (N+l)-entity to one or more (N+l)-entities, where each entity has an
`association with the physical layer, and no association is established for the transmission of data or for the
`application of the confidentiality service between the layer peer-entities themselves.
`
`1.2.2.12 connectionless integrity: A service providing for the integrity of a single SDU. It may take the
`form of determining whether or not the received SDU has been modified.
`
`1.2.2.13 cryptographic checkvalue: Information that is derived by performing a cryptographic transforma-
`tion on the data unit. See: cryptography. (IS0 7498-2 : 1989)
`
`1.2.2.14 cryptography: The discipline embodying principles, means, and methods for the transformation of
`data in order to hide its information content, prevent its undetected modification, andor prevent its unautho-
`rized use. (IS0 7498-2 : 1989)
`
`1.2.2.15 data deciphering key: A key used for the decipherment of an (N)-layer SDU. (It is not used to
`decipher other keys.)
`
`1.2.2.16 data enciphering key: A key used for the encipherment of an (N)-layer SDU. (It is not used to
`encipher other keys.)
`
`1.2.2.17 data integrity: The condition or state in which data has not been altered or destroyed in an unau-
`thorized manner. (IS0 7498-2 : 1989)
`
`1.2.2.18 data origin authentication: The corroboration that the source of data received is as claimed. This
`service, when provided by the (N)-layer, provides the corroboration to an (N+l)-entity that the source of the
`data is the claimed peer (N+l)-entity. (IS0 7498-2 : 1989)
`
`1.2.2.19 decipherment: The reversal of a corresponding reversible encipherment. IS0 7498-2 : 1989)
`
`1.2.2.20 encipherment: The cryptographic transformation of data to produce ciphertext. See: cryptogra-
`phy. (IS0 7498-2 : 1989)
`
`1.2.2.21 Initialization Vector (IV): A binary vector used at the beginning of a cryptographic operation to
`allow cryptographic chaining. (ANSI X9.17-1985)
`
`1.2.2.22 Integrity Check Value (ICV): A value that is derived by performing an algorithmic transformation
`on the data unit for which data integrity services are provided. The ICV is sent with the protected data unit
`and is recalculated and compared by the receiver to detect data modification. See: cryptographic check-
`value.
`
`1.2.2.23 key: A sequence of symbols that controls the operations of encipherment and decipherment. (IS0
`7498-2 : 1989)
`
`1.2.2.24 key management: The generation, storage, distribution, deletion, archiving, and application of
`keys in accordance with a security policy. (IS0 7498-2 : 1989)
`
`1.2.2.25 Key Management Stack: The protocols residing above SDE that request services via an SDE SAP
`that is supported by the use of a bootstrap SAID with either of the two values reserved for key management.
`
`1.2.2.26 layer management: Functions related to the management of the (N)-layer partly performed in the
`(N)-layer itself according to the (N)-protocol of the layer, and partly performed as a subset of systems man-
`agement. (IS0 7498 : 1984)
`
`3
`
`Authorized licensed use limited to: UCLA Library. Downloaded on January 19,2016 at 18:54:06 UTC from IEEE Xplore. Restrictions apply.
`
`000013
`
`

`
`IEEE
`Std 802.10-1992
`
`IEEE STANDARDS FOR LOCAL AND METROPOLITAN AREA NETWORKS:
`
`1.2.2.27 Layer Manager (LM): A systems management service application for which a particular exchange
`of systems management information has taken a manager role of the (N)-layer. (ISOAEC 10040 : 1992)
`
`1.2.2.28 managed object: The OS1 structure of management information (ISOAEC 10165-2 : 1992) term
`used as an abstract representation of a resource. This managed object has a set of attributes. These attributes
`are equivalent to data objects.
`
`1.2.2.29 manipulation detection: A mechanism used to detect whether a data unit has been modified (either
`accidentally or intentionally). (IS0 7498-2 : 1989)
`
`1.2.2.30 masquerade: The pretense by an entity to be a different entity. (IS0 7498-2 : 1989)
`
`1.2.2.31 Management Information Base (MIB): A conceptual database of information contained in the
`collection of all the managed object classes and their instances. (ISOAEC 7498-4 : 1989)
`
`1.2.2.32 misordering data: A form of unauthorized data modification in which the reception sequence of
`data units is altered from the original transmission sequence in an unauthorized manner. This can be
`attempted by a combination of techniques involving deleting, delaying, and reinserting data; or modifying
`sequence control information; or both.
`
`1.2.2.33 object: A data object that has an identifier (name) and a value.
`
`1.2.2.34 Open Systems Interconnection (OSI) (N)-service: A capability of the (N)-layer, and the layers
`beneath it, that is provided to the (N)-entities at the boundary between the (N)-layer and the (N+l)-layer.
`(IS0 7498 : 1984)
`
`1.2.2.35 peer-entity authentication: The corroboration that a peer entity in an association is the one
`claimed. This service, when provided by the (N)-layer, provides corroboration to the (N+l)-entity that the
`peer entity is the claimed (N+l)-entity. (IS0 7498-2 : 1989) This is primarily intended for, although not lim-
`ited to, connection-oriented service and may be either unilateral or mutual.
`
`1.2.2.36 reflection: A form of data modification in which PDUs sent by an entity are returned in an unautho-
`rized manner. This can be attempted by a combination of techniques involving deleting, delaying, and rein-
`serting data; andor modifying address or sequence control information.
`
`1.2.2.37 secret key: The traditional cryptographic key known only to the communicating parties and used
`for both encipherment and decipherment.
`
`1.2.2.38 security association: A cooperative relationship between entities formed by the sharing of crypto-
`graphic keying information and security management objects. This shared information need not be identical,
`but it must be compatible.
`
`1.2.2.39 Security Association Identifier (SAID): A value placed in the clear header of the SDE PDU that
`is used to identify the security association.
`
`1.2.2.40 Security Management Information Base (SMIB): An MIB that stores security-relevant objects.
`
`1.2.2.41 security service: A service, provided by a layer of communicating open systems, that ensures ade-
`quate security of the systems or of data transfers. (IS0 7498-2 : 1989) Note that these security services need
`not be directly requested at the (N)- and (N+l)-layer boundary as is required for an OS1 (N)-service.
`
`1.2.2.42 systems management: Functions in the Application Layer related to the management of various
`OS1 resources and their status across all layers of the OS1 architecture. (IS0 7498 : 1984)
`
`4
`
`Authorized licensed use limited to: UCLA Library. Downloaded on January 19,2016 at 18:54:06 UTC from IEEE Xplore. Restrictions apply.
`
`000014
`
`

`
`LANlM AN SEC U R ITY (SI LS)
`
`IEEE
`Std 802.10-1992
`
`1.2.2.43 System Management Stack: The protocols residing above SDE that request services via an SDE
`SAP that is supported by the use of a bootstrap SAID with either of the two values reserved for system man-
`agement.
`
`1.2.2.44 threat: A potential violation of security. (IS0 7498-2 : 1989)
`
`1.2.2.45 trusted functionality: That which is perceived to be correct with respect to some criteria, e.g., as
`established by a security policy. (IS0 7498-2 : 1989)
`
`1.2.2.46 unauthorized disclosure: The process of making information available to unauthorized individu-
`als, entities, or processes. (IS0 7498-2 : 1989)
`
`1.2.2.47 unauthorized data modification: Alteration of data not consistent with the defined security policy.
`
`1.2.2.48 unauthorized resource use: Use of a resource not consistent with the defined security policy.
`(IS0 7498-2 : 1989)
`
`1.2.2.49 User Stack: The protocols residing above SDE that request services from any SDE SAP except
`those supported by the use of a bootstrap SAID.
`
`1.3 References
`
`This standard shall be used in conjunction with the following references:
`
`ANSI X9.17-1985 (R1991), Financial Institution Key Management (Wh~lesale).~
`
`IEEE Std 802-1990, IEEE Standards for Local Area Networks: Overview and Architecture (ANSI).4
`
`I S 0 7498 :

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket